Recherche
Filtrage par:
Creator/Author
Library Service, CECH
Supprimer la restriction Creator/Author: Library Service, CECH
Department
Information Technology
Supprimer la restriction Department: Information Technology
1 - 7 sur 7
Nombre de résultats à afficher par page
Résultats de recherche
-
- Type:
- Student Work
- Description/Abstract:
- Phishing Emails are a problem as ubiquitous as email itself. According to Digital Guardian, over 90% of all cyber attacks now start with a phishing message (Guest, 2017). Additionally, with over 12% of targets clicking on any given phishing message (Verizon, 13), and 95% of all attacks on enterprise networks begin as a result of spear phishing, it is critical to not only know who clicks on these links, but also when a link was clicked. While there are many tools trying to prevent the message from ever getting in, only Hypersafe will enable instant visibility and scoping when a message inevitably gets through. This is accomplished by intercepting all inbound messages to a target’s email system, and then scanning messages for spam and malicious content, and then replacing every link contained within the message with a custom link that points to the Hypersafe Link Resolution Service. When a user clicks on a link, they first go through the Link Resolution Service to ensure that the link has not been identified as a phishing or otherwise malicious message. If the link is clean, then the user is seamlessly redirected to their intended target. If the link is malicious, the user is redirected to an education and awareness page, thus hindering the attack. In order to ensure reliable service, Hypersafe is built atop the proven Amazon Web Services Platform to enable best in class availability, scalability, and security. The email processing and link resolution services are serverless, enabling Hypersafe to scale without any administrative burden and also cost very little to operate. Finally, there is a web administration portal that administrators can use to interact with the service to manually flag links, senders, and domains as malicious as well as view statistics on who has clicked on a certain link. By taking the uncertainty of email away from the user, Hypersafe will be an invaluable partner in each customer’s defense toolkit.
- Creator/Author:
- Iacobelli, Tony; Johnson, Peter; Burchette, Anthony, and Library Service, CECH
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- "Today, a public cloud is a top priority for many enterprises. Statistics show cloud infrastructure usage has grown from 29 percent in 2017 to 38 percent in 2018." With a wide variety of options, finding the right cloud solution can be inefficient and costly for companies. This is where Omni-Cloud Solutions helps during their digital transformation journey. Our organization aims to make finding the right solution simple with an easy to use web application-based wizard, which will help organizations choose between IaaS, SaaS, XaaS, PaaS, and different storage options from a variety of cloud service providers. The service we provide will allow the organization to provide specific details about them and receive a tailored cloud solution plan based around important metrics such as cost, storage, and availability. Reducing the amount of research previously devoted to migrating their organization to the cloud solution will save time and money allowing them to focus on their own projects.
- Creator/Author:
- Terle, Paul; Turner, Kevin; Price, Gordon; Library Service, CECH, and Cline, Aaron
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Passwords are not safe, and create vulnerabilities, yet, we rely heavily on them in nearly everything we do. A good password will exceed 10 characters, use a combination of numbers, upper case, lower case, and special characters. Good practice tells us not to reuse passwords. This is a lot to remember when accessing various tools and accounts in our work and private lives. Can a large company trust that a person is not using the same password when accessing company assets as they are at home? This issue is solved by using a MAGIK STICK as a multifactor authentication device that eliminates the need for employees to remember passwords for a company network. MAGIK STICK solves this conundrum by authenticating users via biometrics and generating a token for accessing applications and devices. This token is based on a TOTP (time based one-time password) algorithm.
- Creator/Author:
- Barr, Sean; Ryan, Kyle, and Library Service, CECH
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Gartner reports that there will be around 20.8 billion [IoT devices] by 2020. Among these devices are countless vulnerabilities and security concerns. As of now, there is no single device that remediates those vulnerabilities or even detects them. The Mirai botnet incident took countless websites offline and affected millions of people. What if there was a device that could have detected this sort of activity? Our product would have thwarted an attack of this type via network monitoring of each IoT device on a user’s home network. Our product would function as a plug and play device and would be able to detect abnormal IoT network activity. The objective is to ensure the devices are only operating based on necessity. This gives the owners peace of mind that their IoT devices are functioning normally. The number of IoT devices is going to surpass the number of mobile phones and computers in the coming years. This will require the need for additional security measures similar to that of antivirus. Our product is a step in the right direction for securing these devices
- Creator/Author:
- Schroeder, Michael; Library Service, CECH; Manahan, Stephan, and Lyons, Christopher
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Imagine learning a new activity or going somewhere alone without feeling social isolation, loneliness, or anxiety. With Be Epic, you will never feel that way again. Be Epic is a social app which allows the user to select interests that they are already involved with or would like to be and create a personalized profile where they can share their adventures with others in a safe space. It includes different feeds depending on their selected interests where users can post information about what they are doing, where they are going, or who they are with. Users can stay updated and meet with one another in real time. Users can meet new partners, make connections, and even learn with a more experienced user. Never fear learning something new or doing something alone again with the help of Be Epic.
- Creator/Author:
- Grosse, Sabrina; Carpenter, Todd; Library Service, CECH, and Grote, Kevin
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Many musicians and music fans currently do not have a dedicated social media platform to network with other like-minded people in their area. Because of this, users are resorting to websites not designed with music in mind, like Facebook and Craigslist, to interact. Concerto is an innovative website that looks to allow users to network, discover, and promote anything music related on its unique platform. Musicians and listeners alike can find valuable information on bands, upcoming shows, as well as receive recommendations based on their music listening preferences. Concerto is also a hub to connect fellow musicians who are looking for new band mates. By giving music fans a dedicated tool in Concerto, we strive to help strengthen musical communities and create a unique experience for our users.
- Creator/Author:
- Eiselt, Ryan; Samson, Ryan; Limbert, Cory, and Library Service, CECH
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- In modern business/enterprise environments, automation has become the driving force to improve products, workflow, and business practices. Managing where, when, and how these automated jobs are running can become an unwieldy task for many. Windows Task Scheduler, SQL Server Agent, SQL Server Report/Integration Services, and numerous other automation tasks all have their own interfaces. WAM (Windows Automation Manager) is a web-based automation application that allows users to quickly access scheduled jobs, log information, and access a job creation interface to perform a variety of automation tasks. Through it’s simplistic and to the streamlined design, WAM will allow system and network administrators to spend less time monitoring and scheduling tasks, and more time on projects and maintenance.
- Creator/Author:
- Holzman, Andrew; Library Service, CECH; Adams, Ryan, and Marshall, Alex
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
