Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Old Dominion University

Cybersecurity Undergraduate Research Showcase

2023

Articles 1 - 25 of 25

Full-Text Articles in Physical Sciences and Mathematics

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson Dec 2023

The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson

Cybersecurity Undergraduate Research Showcase

The RSA encryption algorithm has secured many large systems, including bank systems, data encryption in emails, several online transactions, etc. Benefiting from the use of asymmetric cryptography and properties of number theory, RSA was widely regarded as one of most difficult algorithms to decrypt without a key, especially since by brute force, breaking the algorithm would take thousands of years. However, in recent times, research has shown that RSA is getting closer to being efficiently decrypted classically, using algebraic methods, (fully cracked through limited bits) in which elliptic-curve cryptography has been thought of as the alternative that is stronger than …


The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby Dec 2023

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby

Cybersecurity Undergraduate Research Showcase

The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …


The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz Dec 2023

The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz

Cybersecurity Undergraduate Research Showcase

This paper illustrates the analysis and impact of Artificial Intelligence (AI) on job loss across various industries. This paper will discuss an overview of AI technology, a brief history of AI in industry, the positive impacts of AI, the negative impacts of AI on employment, AI considerations that contribute to job loss, the future outlook of AI, and employment loss mitigation strategies Various professional source articles and reputable blog posts will be used to finalize research on this topic.


Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow Dec 2023

Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow

Cybersecurity Undergraduate Research Showcase

This paper delves into the intricate landscape of deepfakes, exploring their genesis, capabilities, and far-reaching implications. The rise of deepfake technology presents an unprecedented threat to American national security, propagating disinformation and manipulation across various media formats. Notably, deepfakes have evolved from a historical backdrop of disinformation campaigns, merging with the advancements of artificial intelligence (AI) and machine learning to craft convincing but false multimedia content.

Examining the capabilities of deepfakes reveals their potential for misuse, evidenced by instances targeting individuals, companies, and even influencing political events like the 2020 U.S. elections. The paper highlights the direct threats posed by …


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley Dec 2023

New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley

Cybersecurity Undergraduate Research Showcase

The intersection between artificial intelligence tools and social media has opened doors to numerous opportunities and risks. This research delves into the escalating threat landscape in a society heavily dependent on social media. Despite the efforts by social media companies and cybersecurity professionals to mitigate cyber-attacks, the constant advancements of new technologies render social media platforms increasingly vulnerable. Malicious actors exploit generative AI to collect user data, enhancing cyber threats on social media. Notably, generative AI amplifies phishing attacks, disseminates false information, and propagates propaganda, posing substantial challenges to platform security. Ease access to large language models (LLMs) further complicates …


Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell Dec 2023

Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell

Cybersecurity Undergraduate Research Showcase

The regulation of sexual exploitation on social media is a pressing issue that has been addressed by government legislation. However, laws such as FOSTA-SESTA has inadvertently restricted consensual expressions of sexuality as well. In four social media case studies, this paper investigates the ways in which marginalized groups have been impacted by changing censorship guidelines on social media, and how content moderation methods can be inclusive of these groups. I emphasize the qualitative perspectives of sex workers and queer creators in these case studies, in addition to my own experiences as a content moderation and social media management intern for …


A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector Dec 2023

A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector

Cybersecurity Undergraduate Research Showcase

Bioinformatics is a steadily growing field that focuses on the intersection of biology with computer science. Tools and techniques developed within this field are quickly becoming fixtures in genomics, forensics, epidemiology, and bioengineering. The development and analysis of DNA sequencing and synthesis have enabled this significant rise in demand for bioinformatic tools. Notwithstanding, these bioinformatic tools have developed in a research context free of significant cybersecurity threats. With the significant growth of the field and the commercialization of genetic information, this is no longer the case. This paper examines the bioinformatic landscape through reviewing the biological and cybersecurity threats within …


Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad Dec 2023

Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad

Cybersecurity Undergraduate Research Showcase

This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


The Propagation And Execution Of Malware In Images, Piper Hall Nov 2023

The Propagation And Execution Of Malware In Images, Piper Hall

Cybersecurity Undergraduate Research Showcase

Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.


What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall May 2023

What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall

Cybersecurity Undergraduate Research Showcase

Large Language Models (LLMs) are artificial intelligence (AI) tools that can process, summarize, and translate texts and predict future words in a sentence, letting the LLM generate sentences similar to how humans talk and write. One concern that needs to be flagged is that, often, the content generated by different LLMs is inaccurate. LLMs are trained on code that can be used to detect data breaches, detect ransomware, and even pinpoint organizational vulnerabilities in advance of a cyberattack. LLMs are new but have unbelievable potential with their ability to generate code that brings awareness to cyber analysts and IT professionals. …


A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell Apr 2023

A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell

Cybersecurity Undergraduate Research Showcase

Data collection is a vital component in any organization in regards to keeping track of user activity, gaining statistics and improving the user experience, and user identification. While the underlying basis of data collection is understandable, the use of this data has to be closely regulated and documented. In many cases, the VCDPA (Virginia Consumer Data Protection Act) outlines the guidelines for data use, data controller responsibilities, and limitations however nonprofit organizations are exempt from compliance. Colleges and universities, although still held to some degree of limitation, range in permissiveness with what data they choose to collect and retain but …


Visual Art In The Age Of Ai, Roshnica Gurung Apr 2023

Visual Art In The Age Of Ai, Roshnica Gurung

Cybersecurity Undergraduate Research Showcase

Artists and researchers have been deeply interested in using AI programs that generate art for quite some time now. As a result, there have been many advancements in making AI more accessible and easier to use for the public. This is because AI is not just for business anymore. Nowadays an individual without a college degree with even the slightest interest in art can go on a website like Stable Diffusion and create an artistic image using a text prompt in a quick couple minutes. The only limit is your imagination- and your internet’s stability. This accessibility was a huge …


Unveiling The Dark Web And The Impact Of Revil's Cyberattacks, Tanya Sasnouskaya Apr 2023

Unveiling The Dark Web And The Impact Of Revil's Cyberattacks, Tanya Sasnouskaya

Cybersecurity Undergraduate Research Showcase

The United States Navy originally created the Dark Web for intelligence purposes, but it was later promoted by Western countries as a tool for safeguarding privacy and anonymity. Currently, the Dark Web serves as a platform for deliberate information leaks by nations that want to keep certain information out of the mainstream media. This paper provides an overview of the dark web and the browser used to access it. It covers the layers of the internet and highlights REvil ransomware and some of its technical details. By understanding these risks, users can take appropriate preventive measures to protect themselves from …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan Apr 2023

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research Showcase

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi Apr 2023

Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi

Cybersecurity Undergraduate Research Showcase

This paper addresses the issue of cybercrime in Nigeria and the possibility of creating a cybersecurity workforce development program for cyber criminals to develop their skills for the cybersecurity profession, which may facilitate Nigeria’s economic development.


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


The Linkage Between The Climate Change And The Cybercrimes, Min Kim Apr 2023

The Linkage Between The Climate Change And The Cybercrimes, Min Kim

Cybersecurity Undergraduate Research Showcase

At the beginning of the new era, the rise of the Fourth Industrial Revolution has been rapidly transforming society into a new form that has never been experienced before. While previous industrial revolutions have also contributed to societal growth through phenomenal inventions and discoveries, the Fourth Industrial Revolution has the potential to break the most conventional rule, and one that has dominated social and economic activities: physical interaction. In the near future, sitting at the office, having an in-person meeting, or going on a business trip may no longer be needed as physical barriers are destroyed by cyberspace. However, two …


Cyber Security In Cyber Space, James D. Lee Jr. Apr 2023

Cyber Security In Cyber Space, James D. Lee Jr.

Cybersecurity Undergraduate Research Showcase

For almost twenty years, the Internet has been a driving force in global communication and an integral part of people's everyday lives. As a result of technical developments and declining prices, over 3 billion people worldwide now utilize the Internet. The Internet has created a global infrastructure, and it is worth billions of dollars annually to the global economy (Judge et al.). Today's economic, commercial, cultural, social, and governmental activities and exchanges occur in Cyberspace, involving individuals, enterprises, non-profit organizations, and government and governmental agencies (Aghajani and Ghadimi 220). Cyberspace is the birthplace of much of the world's most essential …


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng Apr 2023

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research Showcase

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


The Rise And Risks Of Internet Of Things, Diamond E. Hicks Mar 2023

The Rise And Risks Of Internet Of Things, Diamond E. Hicks

Cybersecurity Undergraduate Research Showcase

Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in which many different devices communicate, connect, and share data. Though how IoT got to where it is today, the issues it faced, and how it affects our lives today is not common knowledge. Despite the fact that IoT has advanced our technology to what it is today, people do not completely understand what it does.