Recherche
Nombre de résultats à afficher par page
Résultats de recherche
-
- Type:
- Student Work
- Description/Abstract:
- Companies are generally hyper-focused on releasing software quickly to meet strict deadlines or to stay ahead of the competition. This generally results in implementing security once software is near release. In applying DevSecOps best practices early, companies can not only catch and fix security problems early but train their teams in what to avoid in the future. For those organizations that implement DevSecOps, it is found to be implemented during the beginning stages of their software development projects. Most of which is focused on identifying and displaying the source of security misconfigurations. AutoDSO will base their security best practice requirements based off the OWASP DevSecOps model. AutoDSO takes DevSecOps a step further by focusing on establishing security baseline requirements and allowing the users to select metrics specific to their DevSecOps policies and procedures. The application generates an automated DevSecOps policy document which can be used by security analyst and given to auditors to monitor a company’s DevSecOps processes. This allows companies an efficient way to document their security best practices and ensuring that security becomes a part of continuous integration and continuous development (CI/CD) in their organization.
- Creator/Author:
- Eves, Dorothy; Phu, Vance, and Gantt, Chelsea
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Zendesk states that 69% of support tickets were resolved with just “one touch”, and yet many tickets require resolution times of over 24 hours[1]. Incident Management, Change Management, and Service Request management are key elements to combat with an end user's daily frustration regarding problematic or unavailable business needs. MyHelpDesk eliminates the need for an end user to reach out to Managed Services for assistance by providing a wide selection of tools to use, including, but not limited to: training videos, trusted software solutions, access to Statement of Work’s and Client/Company process documentation, and in-app scripting all in one convenient location. MyHelpDesk allows end users of any technological experience to easily operate this centralized application for all things troubleshooting, training, workflow, and support within their network scope.
- Creator/Author:
- Gautam, Tulashi; Rindler, David, and Fayaz, Samon
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- According to a 2015 survey conducted by the Pew Research Center and published in a September 2016 Internet and Technology report, 52% of adults are relatively hesitant to use digital tools because of lower levels of digital skills and trust in the online environment. As technology has evolved to become an essential part of our modern everyday lives, it is important for end users to understand how to both utilize it effectively, and keep themselves and their data safe. From email to online banking, technology has introduced new ways to organize and manage our lives. However, it has also introduced new sets of risks and challenges never before faced by users. This is where Athena Systems can help. Athena Systems is a multi-platform web application that both protects and assists users with catching up to the functionality of modern technology. It provides interactive lessons and opportunities such as registering and collaborating with a community of Athena Systems users. The security tool also provided by Athena Systems allows users to cross check websites and domains for legitimacy by running them against a blacklist database. Stay smart and stay safe with Athena Systems.
- Creator/Author:
- Wirt, David; Manasrah, Abdallah; Zorzi, Aaron, and Childred, Lionell
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Gaming has become less social than ever, with 67% of gamers strictly playing solo, while the rest are constantly connecting to games full of random players (Forbes). We want to create a way for gamers to reconnect with each other by finding out they have a similar taste in games as their friends. With the influx of new game releases, it can be difficult to keep track who wants to play what. Co-op Queue will be an application that has all new games imported into it, allowing users to tag which games they like. This marks whether or not they’re interested in playing that game. Then, once the user indicates that they are interested in a game, it will automatically inform them of their friends who are also interested in the game and give the user an opportunity to message them. Helping more people to fill their co-op queue.
- Creator/Author:
- Glaser, Cole; Howard, David, and Liston, Brianna
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- According to The Hechinger Report “On the eastern edge of Silicon Valley, school districts have gone into debt by, authorizing a $16.2 million sale of general-obligation bonds intended almost exclusively for laptop purchases.” (Marcus, 2019) CyberPods is a system designed to let high school classes delve into the world of Cyber Security, leveraging the cheap used hardware market. Designed using the existing Proxmox Virtualization platform, CyberPods provides a way of easy installation and operation of Virtual Machines, so the focus can be on learning about Cyber Security, rather than battling configuration files. By utilizing the power of the cloud, CyberPods automatically configures and installs itself on hardware. A web-based user interface provides easy management and deployment of pre-configured Virtual Machines that are ready for a classroom environment.
- Creator/Author:
- Griffith, Wade; Blakey, Dakota, and Griffiths, Henry
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Five out of every six home router devices are inadequately updated, leaving sensitive data and connected devices unprotected from known vulnerabilities. The American Consumer Institute Center for Citizen Research released this information after the FBI sent out a warning in the 2018, stating hackers from Russia had successfully compromised hundreds of thousands of routers and were collecting user information. Users treat routers as plug and play devices where, once installed, they are left sitting with no further configurations made. However, blame does not fall solely on the user. ISPs and manufacturers fail to educate their customers of the proper steps to take after installation. NetLock was created with the user in mind, to act as a guide and walkthrough after router installation. Once connected to the router and opened via desktop application, NetLock will assist the user with proper setting configuration while providing network security best practices throughout the setup
- Creator/Author:
- Conn, Austin and Hooper, Andrew
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- The Wireless Charging SmartBag is the ultimate solution for users on the go, who fail to find time to recharge devices. The combination of proprietary smart device connection cables, adapters, and battery banks into this SmartBag can substantially increase the freedom and organization of users of Qi enabled devices. Current market research shows no viable all-in-one solution that provides this ease-of-use. According to Cisco VNI, the number of networked devices per person is expected to jump to fourteen by 2022. This paper discusses the work, validation, and development of the resulting fully inclusive system utilizing a mobile application to allow users to view battery percentage data for each registered device including the backpack itself, as well as the ability to prioritize device charging based on need and available charging capacity. Additional features include a SmartBag charging dock, GPS tracking, and Global Wifi HotSpot.
- Creator/Author:
- Skipper, Cole and Patel, Mihir
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Have you ever actually completed a New Year’s Resolution? Neither have we! According to Forbes, 80% of Americans set a New Year’s Resolution, but only 8% will actually complete their goal[1]. The simple fact is that these self-improvement goals require motivation and discipline that most people lack. That’s why we’ve created Purrsistent Pet. While there are many solutions available to keep track of your study and workout habits, there are none that also give you additional inspiration towards completing those goals. Purrsistent Pet provides this by making the user responsible for their own digital pet, and to care for it the user must make progress towards their goals. We’ve built this application on the fact that it is easier to motivate yourself when your new digital friend is relying on you, too, so please give it a try and improve yourself today!
- Creator/Author:
- Aylward, Bekah; Myers, Church, and Schumaker. Carsten
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Since the year 2000, there have been on average over 400 natural disasters per year affecting rural and metropolitan areas alike. These disasters leave communications networks broken and segmented. The victims are left merely helpless while they wait for assistance and emergency first responders to save their lives. Even after these tragic events, communication services may not be restored for months or even years. This leaves families and individuals vulnerable to further hardship due to lack of supplies. Our solution aims to reconnect disaster victims faster. With our GoKits, families and emergency services will come back online in dramatically less time. A GoKit includes everything you need to connect to our emergency communications network. With this GoKit, users can connect from up to 15km away from our eNAP (Emergency Network Access Point). PEW believes access to communications networks should remain a human right.
- Creator/Author:
- Shaheen, Christian; Thomas, Nicholas, and Paul, Conner
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- How would you like to save $120 a year? By opting to purchase your router, rather than renting one from your Internet Service Provider (ISP), not only will you save money, but you will also get the best security and performance out of your broadband connection. ISP4ME is a web application that aims to be an all-in-one solution for consumers that will allow them to effortlessly make this transition, regardless of their technical background. Using a concise and intuitive user evaluation, ISP4ME will determine the most suitable broadband speed for the user’s specific situation. It will then recommend a compatible and budget-friendly router that is optimal for their network needs. ISP4ME will provide users with the information necessary to make financially wise decisions when selecting a broadband package and networking equipment, as well as everything they need to know to implement the best network security configurations for their equipment.
- Creator/Author:
- Lang, Chance and Widina, Andrew
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International