Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computer Sciences

Cybersecurity Undergraduate Research Showcase

Articles 61 - 90 of 90

Full-Text Articles in Physical Sciences and Mathematics

Security Issues With Network Connected Scada Systems, Chad Holm Jan 2022

Security Issues With Network Connected Scada Systems, Chad Holm

Cybersecurity Undergraduate Research Showcase

The use of Supervisory Control and Data Acquisition (SCADA) systems has become common place and are being used in several different industries. These have evolved as the technology has progressed. The use of Internet of Things (IOT) devices makes for less human intervention to run daily operations in these industries. This can also allow hackers to gain access to these devices due to security holes that are overlooked. There have several different ways that have been exploited on SCADA networks and the goal is to recognize and secure them so hackers cannot gain access to them.


A Review Of Distributed Identity Technology In Iot Devices, Myles Perry Jan 2022

A Review Of Distributed Identity Technology In Iot Devices, Myles Perry

Cybersecurity Undergraduate Research Showcase

Distributed identity technology provides solutions to many of the faults currently found in federated identity systems. Applying this technology to internet of things devices has many possible benefits in the realm of device authentication. However, this also provides new challenges not present in existing distributed identity systems. The large number of devices that would enter and leave the system means balancing sybil attack vulnerability and linkage attack vulnerability becomes challenging. Internet of things devices also have less memory and computing power than a standard personal computer or phone. This means any protocol to execute distributed identity in these devices must …


Random Password Generation, Kirk Smith Jan 2022

Random Password Generation, Kirk Smith

Cybersecurity Undergraduate Research Showcase

This paper will discuss the topic of random generation, first by explaining the topic, followed by how the literature review was performed. Then, a literature review will be performed, followed by a discussion of human biases and the strength of random password generation.


An Analysis Of Significant Cyber Incidents And The Impact On The Past, Present, And Future, Seth E. Smith Dec 2021

An Analysis Of Significant Cyber Incidents And The Impact On The Past, Present, And Future, Seth E. Smith

Cybersecurity Undergraduate Research Showcase

This report discusses data collected on significant cybersecurity incidents from the early 2000s to present. The first part of the report addresses previously discussed information, data, and literature (e.g. case studies), pertinent to cybersecurity incidents. The findings from this study are framed by scholarly sources and information from the Federal Bureau of Investigation, a number of notable universities, and literature online, of which all support information discussed within this report. The second part of the report discusses data compiled upon analyzing significant cyber incidents and events from the Center for Strategic and International Affairs (CSIS). Finally, the last portion of …


Analytical Approach To Biometric Security And How It Affects Privacy, Torré A. Williams Dec 2021

Analytical Approach To Biometric Security And How It Affects Privacy, Torré A. Williams

Cybersecurity Undergraduate Research Showcase

In this time where the world is using technology every day, there is going to be a need for some type of security to take place to protect its citizens from unwanted harm or danger. The use of any authentication methods is becoming very essential for a lot of companies and even for your own personal belongings. The use of biometric technology has offered companies the chance to upgrade their security system. This has also provided easier ways that people authenticate themselves as who they say they are. Due to their growth of usage, there is a privacy and security …


Developing An International Framework For Addressing Non-State Actors In Cyberspace, Joanna C. Di Scipio Nov 2021

Developing An International Framework For Addressing Non-State Actors In Cyberspace, Joanna C. Di Scipio

Cybersecurity Undergraduate Research Showcase

On May 7, 2021, Colonial Pipeline shut down its operations following a ransomware attack by the criminal group DarkSide (Bordoff, 2021). It took five days to resume normal operations, but this short period led to panic buying, rising prices, and significant gas shortages. The attack underscores an emerging threat in the landscape of cybersecurity: critical infrastructure attacks carried out by non-state actors.


Internet Of Things: Cybersecurity In Small Businesses, Zobair Wali Nov 2021

Internet Of Things: Cybersecurity In Small Businesses, Zobair Wali

Cybersecurity Undergraduate Research Showcase

Small businesses are the most vital part of a nation’s economy. In today’s world, as we are moving towards digitizing almost everything around us, cybersecurity is essential and vital for our digitalized world to function. Small businesses are no exception. All businesses collect, use, and store information. They store employees’ information, tax information, customers’ information, business transaction information, and all other operational information that is needed for a business to function. Without an appropriate cybersecurity program, these businesses are vulnerable and can be easily impacted by cyber incidents and malicious attacks. Businesses are putting resources to protect their systems against …


Gdpr, Pipl & Lgpd: Privacy Regulations & Policies Across The Globe, Raymond H. Geistel Nov 2021

Gdpr, Pipl & Lgpd: Privacy Regulations & Policies Across The Globe, Raymond H. Geistel

Cybersecurity Undergraduate Research Showcase

Several privacy laws around the world are adopting similar regulations to the GPDR; this has effects on privacy policies of companies providing services in across multiple countries & continents. While these regulations share many attributes, their differing requirements can make things difficult for companies regarding said policies. Automation could be a potential solution to both analyze and compare regulations from different nations & international organizations, analyze and monitor privacy policy adherence to said regulations.


How Secure Are Android And Apple’S Operating Systems And Based Applications Against Cyber Attacks And Cyber Crime, Marlowe Cosby Jr. Nov 2021

How Secure Are Android And Apple’S Operating Systems And Based Applications Against Cyber Attacks And Cyber Crime, Marlowe Cosby Jr.

Cybersecurity Undergraduate Research Showcase

Smartphone has become an important part of our everyday life. Android and apple are the two most used operating system (OS) for smart phones. We usually store important information in our smart phone, e.g.: credit card, bank account, driving ID, SSN. As a result, Android and Apple operating systems and applications have both been subject to a wide number of vulnerabilities and attacks. This directly effects many people being that they are the global leaders of users within their platforms reaching billions of people daily. It is important that smartphones receive better defense and security. In this paper, we aim …


Self-Supervised Perceptual Ad-Blocker, Killian Robinson Nov 2021

Self-Supervised Perceptual Ad-Blocker, Killian Robinson

Cybersecurity Undergraduate Research Showcase

This project proposes a new self-supervised ad-blocker to minimize the amount of human effort required to effectively combat pushed advertisements. Current ad-blocker models are expensive to develop and not always effective in identifying advertisements. We investigated the possibility of solving these problems with the introduction of a deep learning, self-supervised ad-blocker model. More specifically, the proposed ad-blocker will be trained in a self-supervised fashion to tackle the issue of lacking labelled training data. The proposed solution was prototyped using Pytorch and achieved a detection accuracy of 81% on a diverse selection of popular websites.


Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen Nov 2021

Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen

Cybersecurity Undergraduate Research Showcase

An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.


Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett Nov 2021

Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett

Cybersecurity Undergraduate Research Showcase

The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …


Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta Oct 2021

Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta

Cybersecurity Undergraduate Research Showcase

In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …


Sql Injection & Web Application Security: A Python-Based Network Traffic Detection Model, Nyki Anderson Apr 2021

Sql Injection & Web Application Security: A Python-Based Network Traffic Detection Model, Nyki Anderson

Cybersecurity Undergraduate Research Showcase

The Internet of Things (IoT) presents a great many challenges in cybersecurity as the world grows more and more digitally dependent. Personally identifiable information (PII) (i,e., names, addresses, emails, credit card numbers) is stored in databases across websites the world over. The greatest threat to privacy, according to the Open Worldwide Application Security Project (OWASP) is SQL injection attacks (SQLIA) [1]. In these sorts of attacks, hackers use malicious statements entered into forms, search bars, and other browser input mediums to trick the web application server into divulging database assets. A proposed technique against such exploitation is convolution neural network …


Cybersecurity: Building A Better Defense With A Great Offense, David M. Cooke Jan 2021

Cybersecurity: Building A Better Defense With A Great Offense, David M. Cooke

Cybersecurity Undergraduate Research Showcase

The current industry standard for cybersecurity is risk mitigation, which is the identification, evaluation, and categorization of threats that are posed to an organization's network. The goal is to prevent attacks and if an organization is attacked popular standard is to react and remedy the attack. This form of cyber defense isn’t very reassuring to an organization and its users, once an attack is executed based on a study conducted by Booz Allen the average time an advanced persistent threat (APT) dwells on a victims’ network before it’s discovered is 200-250 days. That’s plenty of time for a malicious third …


Best Cybersecurity Practices For Companies, Post Van Buren, Mary Riley Jan 2021

Best Cybersecurity Practices For Companies, Post Van Buren, Mary Riley

Cybersecurity Undergraduate Research Showcase

Imagine this scenario: you are a small business owner, and you’ve just been informed of a network security breach. In your Zoom meeting with the IT Department, you learned the details: network activity logs revealed aberrant behavior after hours. Threat actors accessed systems containing sensitive information and downloaded copies of key files containing company trade secrets, market strategies, and customer data – all within a matter of minutes. Immediately, you review the consequences of the breach in your mind: reputational harm, monetary loss, and potential lawsuits. You ask the IT professional about the root cause of the breach. Was it …


Tackling Ai Bias With Gans, Noam Stanislawski Jan 2021

Tackling Ai Bias With Gans, Noam Stanislawski

Cybersecurity Undergraduate Research Showcase

Throughout the relatively short history of artificial intelligence (AI), there has been a significant concern surrounding AI’s ability to incorporate and maintain certain characteristics which were not inherently modeled out in its coding. These behaviors stem from the prominent usage of neural network AI, which can inherit human biases from the input data it receives. This paper argues for two possible avenues to combat these biases. The first is to rethink the traditional framework for neural network projects and retool them to be usable by a Generative Adversarial Network (GAN). In a GAN’s zero-sum game, two network techniques can combat …


Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm Jan 2021

Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm

Cybersecurity Undergraduate Research Showcase

With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …


On The Usage And Vulnerabilities Of Api Systems, Conner D. Yu Jan 2021

On The Usage And Vulnerabilities Of Api Systems, Conner D. Yu

Cybersecurity Undergraduate Research Showcase

To some, Application Programming Interface (API) is one of many buzzwords that seem to be blanketed in obscurity because not many people are overly familiar with this term. This obscurity is unfortunate, as APIs play a crucial role in today’s modern infrastructure by serving as one of the most fundamental communication methods for web services. Many businesses use APIs in some capacity, but one often overlooked aspect is cybersecurity. This aspect is most evident in the 2018 misuse case by Facebook, which led to the leakage of 50 million users’ records.1 During the 2018 Facebook data breach incident, threat actors …


Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams Dec 2020

Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams

Cybersecurity Undergraduate Research Showcase

This research is a comparative analysis of human-centric Artificial Intelligence (A.I.) in Europe and the U.S. This research establishes fundamentals that are critical to what makes A.I. human-centric. This research contains eight phases: 1) Lawful A.I.; 2) Robust A.I.; 3) Ethical A.I.; 4) Human-centric A.I.; 5) Current State of A.I.; 6) A.I. in Europe; 7) A.I. in the U.S.; 9) Importance of Human-centric A.I. This research shows that there are still ongoing changes with having a human-centric A.I. and why it is very important to society. This research is the beginning of the making of a successful and reliable human-centric …


Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel Dec 2020

Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel

Cybersecurity Undergraduate Research Showcase

The rapid growth and investment in the Internet of Things (IoT) has significantly impacted how individuals and industries operate. The Internet of Things (IoT) refers to a network of physical, technology-embedded objects that communicate, detect, and interact with their external environment or internal state (Hung, 2017). According to Tankovska (2020), IoT devices are estimated to reach 21.5 billion units by 2025. This technological boom is leading various industrial sectors to notice a quick increase in cybersecurity risks and threats. One industrial sector has been particularly vulnerable to numerous cyber threats across the globe: healthcare. Oliver Noble (2020), a data encryption …


The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah Oct 2020

The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah

Cybersecurity Undergraduate Research Showcase

Bug bounty programs are a great way for companies and organizations to help keep their systems and information secure; however, there are only a limited number of white hat hacking participant spots. With only so many seats available at the table, being able to determine the most qualified group of individuals is critical to the efficiency of the program at large. Digital natives, people born into the digital age, provide an instinctive approach when dealing with technology. On the other hand, digital immigrants, people who grew up before the digital age and had to adapt to new technology, evidently utilize …


Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore Aug 2020

Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore

Cybersecurity Undergraduate Research Showcase

The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …


Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson Jul 2020

Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson

Cybersecurity Undergraduate Research Showcase

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …


Helion’S Snapshot Module, Nii-Kwartei Quartey Jul 2020

Helion’S Snapshot Module, Nii-Kwartei Quartey

Cybersecurity Undergraduate Research Showcase

During my undergraduate research, I spent my time working with a home automation program known as Helion, specifically, its Snapshot module. I was tasked with learning new material and completing part of the webpage that were unfinished. I also had to get a little creative when working on a design that users could find appealing. There were times I found working on Helion difficult but overall, working with Helion’s Snapshot Module is something that will help me improve with my undergraduate studies.


The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes Jan 2020

The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes

Cybersecurity Undergraduate Research Showcase

This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …


The Interdisciplinary Impacts Of Technology Semantics And Communicational Bypassing In The Cybersecurity Field, Brooke Nixon Jan 2020

The Interdisciplinary Impacts Of Technology Semantics And Communicational Bypassing In The Cybersecurity Field, Brooke Nixon

Cybersecurity Undergraduate Research Showcase

In 2012, former director of the Federal Bureau of Investigation (FBI) Robert Mueller shocked many when he warned, “[t]here are only two types of companies: those that have been hacked and those that will be.” As technology and information systems develop rapidly, security has become a topic of increasing interest and concern. In 2018, it was noted that the total cost to account for cybercrime on a global scale surpassed US$1 billion (Milkovich, 2020). In the United States, a hacker attack occurs every 39 seconds, and each year, 1 in 3 Americans are personally impacted by a form of hacking …


Data And Artificial Intelligence: Mismatch Between Expectations And Uses, Diana Garcia Jan 2020

Data And Artificial Intelligence: Mismatch Between Expectations And Uses, Diana Garcia

Cybersecurity Undergraduate Research Showcase

People like to hide behind their phones when it comes to social media. Not every user has their real name or their own photo on display in their social media account. To obfuscate their identities, some users use unusual usernames and profile photos that are divorced from their true identity.


Accessibility Of Deepfakes, Andrew L. Collings Jan 2020

Accessibility Of Deepfakes, Andrew L. Collings

Cybersecurity Undergraduate Research Showcase

The danger posed by falsified media, commonly referred to as deepfakes, has been well researched and documented. The software Faceswap to was used to swap the faces of two politician (Joe Biden and Donald Trump). The testing was performed using an affordable consumer GPU (an AMD Radeon RX 570) over 100,000 iterations. The process and results for the two attempts with the best results (and largest differences) were recorded. The result was ultimately unconvincing, while the software was able to recreate the facial structure the lighting and skin tone did not blend at all.


Iot Devices In The Public Health Sector, Cayla Young Jan 2020

Iot Devices In The Public Health Sector, Cayla Young

Cybersecurity Undergraduate Research Showcase

In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive …