Recherche
Filtrage par:
College
Education, Criminal Justice, and Human Services
Supprimer la restriction College: Education, Criminal Justice, and Human Services
Nombre de résultats à afficher par page
Résultats de recherche
-
- Type:
- Student Work
- Description/Abstract:
- Information about data ‒ known as Metadata, has the potential to provide a vast range of knowledge about data or a target in question. Metadata can provide information including the creation date, geolocation, software used to create the file and more ‒ which can be useful for many users in the information security field. We created Metaforge to fill the gap in the information gathering arsenal to provide the user with a clean and efficient program. The application includes a simple GUI that creates a dynamic HTML report with multiple pages that displays raw and filtered metadata and a useful statistics page. Current existing metadata tools are outdated and unmaintained which results in a difficult user experience. The capabilities Metaforge includes are detailed metadata analysis, a practical report, and efficient functionality with the final outcome of a positive user experience.
- Creator/Author:
- Mockbee, Collin and Morris, Christopher
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Spam Detection over Encrypted Emails with Intel SGX Emails play a pivotal role in business and everyday communication. There are millions of email messages being sent each day that contain incredibly sensitive information. This sensitive data can be easily parsed by passive attackers on an email server. Leveraging Intel’s SGX we can mitigate this problem by using enclaves. These are private regions of memory that are protected from processes running at higher privilege levels. Decrypting emails using SGX on an Encrypted mail server makes it much more difficult for passive attackers to get any useful data. On top of that this solution takes into account that sender reputation filters are not very effective since it is quite easy for an email address to be compromised. Decrypting emails via Intel SGX improves the general security of Emails on servers where it is running.
- Creator/Author:
- Efford, Reid; Welly, Jacob, and Ciepichal, Brian
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- The training that is required in the manufacturing industry is costly and dangerous. When a new employee is hired, a senior, more experienced employee must take time to train them. This leads to slower production and an increased cost in labor. There are also significant risks when the new employee is interacting with heavy machinery. The new employee does not likely have the knowledge of how to use the machinery and is at a higher risk of injuring themselves or others. Maneuvr VR is a VR solution that solves these problems. It’s simulation can supplement job training in a way that other mediums cannot. This allows for the more skilled employees to spend more time in the production environment and reduces the risk compared to traditional training. The environment will feel familiar to the new employee and will result in a higher level of professional confidence.
- Creator/Author:
- Seifker, Brandon; Powell, Caleb, and Le, Jason
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- According to mediapost.com, the average American will own 13 internet connected devices by 20211. That means a family of 4 will have close to 50 devices connected to their home network. In the current climate of large-scale vulnerabilities, ransomware, and other digital threats, how can we protect our devices, and those of their family members, when we may not even know exactly what is connected to our network? Vigil is a home network sentry that constantly monitors and scans every device connected to your wireless network and sends an alert when it detects an outdated or vulnerable device and when a new, unrecognized device connects to the network. Vigil allows its users complete transparency into the devices on their network, and also offers easy to understand, actionable information to non-technical users. This paper summarizes the process and technical details for the development of Vigil and its real-world usage data
- Creator/Author:
- Jones, Maurice; Cooley, Matthew, and Vaive, Austin
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- According to the International Agency for the Prevention of Blindness, an estimated 36 million people are blind and an additional 217 million have moderate to severe visual impairment. This means that a total of 253 million individuals must rely on their four available senses, primarily touch, in order to perceive their surroundings. One major limitation of this is that the individual must be within arm’s reach (or cane’s reach) in order to determine what is in front of them. Iris changes this by providing a mobile application with a voice-controlled user interface to improve environmental awareness for the blind. With Iris, users are able to take a picture and have the application describe it to them with additional information on specific entities within the picture if requested. Through accessibility features and the power of machine learning, Iris is an extension to the user’s senses.
- Creator/Author:
- Guckenberger, Tristan and Anderson, William
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Critical infrastructure are the systems deemed necessary to live with our current modern standards. These systems require a combination of support systems and SCADA systems that control the machinery to provide us our essentials we take for granted such as power and water. Qualified cybersecurity professionals are becoming increasingly more difficult to find to defend these networks. We created a learning tool to help facilitate college student’s knowledge of defending critical infrastructure, and as we know, the best way to defend is to learn how the attacker will think. This tool consists of a series of virtual machines within two sub scenarios, a water treatment plant and a power plant. Students will be able to conduct penetration tests of these in a simulated environment in order to learn more about critical infrastructure and how to defend it.
- Creator/Author:
- Lindquist, Chase; Alghalayani, Feras, and Barton, Nate
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Amazon Web Services (AWS) and Microsoft Azure are the two leading cloud solution services in a market worth $18.2 billion in 2016, and it is expected to worth $40 billion by the end of 2018. Microsoft’s Azure market share has grown from 8.7% in 2016 to 29.4% in 2018 thanks, in large part, to their cloud-first strategy in recent years. Many enterprises have been left cloudlocked, leaving them stuck working with either AWS or Azure due to budget and time restrictions, while some larger enterprises utilize both AWS and Azure. Being able to securely and cheaply switch between cloud services today will save companies time and money, as well as keep their options open if one works better for them than the other. Thunder Cloud will help solve this cloud lock issue between AWS and Azure for companies by taking data from one service, converting it the format of the other, and then uploading it to that platform
- Creator/Author:
- Varker, Cameron; Sherman, Alexious, and Ward, Sean
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- According to the CDC, the prevalence of obesity was 39.8% and affected about 93.3 million of US adults in 2015-2016. Our team wants to make an impact and tackle this obesity epidemic in America. Our fitness application, OneFit, will take one stride closer to finding a solution. Our objective with this application is to create an application that consolidates all health tools into one resource while providing an accessible and engaging user experience for all ages. Our team will use critical fitness data analysis and provide thorough measurable results for our end users. We will utilize custom planning, personalized work out strategy, and overall health monitoring technology to critique a wholesome health plan for each person. This application will create a fitness network to connect and build a more collaborative workout environment. We envision that this application will inspire people and progress society overall towards a healthier lifestyle.
- Creator/Author:
- Lim, Ivan; Lieser, Anthony; Bertke, Michael, and Hardwick, Adele
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Carpooling is the sharing of car journeys so that more than one person can travel in the same car. Due to the increase in population and the rapid increase in urbanization, there are many problems in transportation. This tends to problems like an increase in the number of vehicles on the road, traffic, pollution, parking problems, and stress. To overcome these hurdles, we developed “Uride” a web-based car sharing application that will allow travelers to post and search if vehicles are available for carpool in their desired path. Uride is an alternative to existing services that aims to connect travelers in order to share transportation costs and reduce stress on their next scheduled trip. This will enable people using this application to share their everyday expenditure on traveling, not worry about hiring a cab.
- Creator/Author:
- Dhital, Robin and Majid, Abdul
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Today we constantly use our phones to act as another form of verification. Unfortunately, this requires us to jump from device to device to prove that we have our phones. Dock Talk is a product that will communicate authentication codes, so the end user does not have to. This way, a user can set their phone down to charge and not have to worry about pesky authentication codes. By using NFC technology our dock will be able to receive authentication codes from the phone. If you are traveling and did not bring your dock with you, you will still be able to use old verification methods.
- Creator/Author:
- Miller, Kyle; Jones, Tyler, and Dhital, Tek
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International