Applied computing professionals develop, create and modify computer applications and specialized utility programs. They often analyze user needs and develop software solutions to meet those needs, analyze and design databases within an application area and contribute to web development. Graduates will obtain positions as software developers, web developers, software engineers and android engineers.
Footprint Finder is a product that allows clients to have their digital footprint scanned and scored. This score is then put into a report for the client to review along with the Footprint Finder team.
Wireless networks continue to be a prominent attack vector in today鈥檚 threat landscape. Open Wi-Fi networks continue to be exploited by malicious actors, and wardriving is one aspect that is often overlooked by those attempting to protect their systems. Enterprise security teams will inevitably need to assess and secure their wireless infrastructure. The coverage provided by this design looks to solve this issue in a manner that supports modularity and concealability. Many different approaches were considered, such as a briefcase, backpack, or delivery robot. After investigation of each method, it was determined that the most crucial factor was adaptability. The idea is that the kit can be easily adapted to any situation that the security team needs. The final decision was the backpack design as it would be the most inconspicuous, versatile, and modular design. This was tested by running wardriving exercises and rating the effectiveness of these tests regarding efficiency and modularity of what was able to work within the kit. Presenting it to the customer yielded positive reactions, and with its improved modularity, the lifetime expectancy of the kit can be deemed near limitless. The wardriving toolkit will transform the way security teams assess wireless infrastructure. The adaptability and modularity of the design will allow quick, easy, and versatile use of the kit in a wide range of environments. Further improvements could be made regarding the medium of containment, such as an apparatus that allows for transport in more than just a backpack.
We are the Social Sentinels, and our aim is to better the way businesses or universities hold events and gather feedback from those events. We will be starting with 暗网禁区破解版 (Wichita State University) Recruiting and Marketing, they will be the first to implement our Social Media Amplification Meter to receive feedback on their events and better them down the line. Our approach is to implement the APIs of Instagram and X with AWS geofencing location software to build a tool that aggregates data from social media to analyze the opinions of the event鈥檚 participants. The end goal of this project is to use X(Twitter) and Instagram as our subjects for aggregation. We intend to be able to access their API鈥檚 and connect them to a location service such as the AWS location services. All the data will then be streamlined to a database where it will then be ported to a web-based application so that our customers can perform their own analysis and draw their own conclusions that will help them in their business ventures. We hope businesses will use this tool to gain insight into how others view their events so they can improve in the future.
Cybraphy, an education firm specializing in cybersecurity training, offers a groundbreaking
phishing email simulation service aimed at assessing and enhancing organizational
cybersecurity posture. This project focuses on developing a comprehensive phishing
email simulation platform to determine the need for phishing prevention training among
clients' employees.
The purpose of this project is to provide organizations with a practical and effective
means of evaluating their susceptibility to phishing attacks and identifying areas
for improvement in cybersecurity awareness and defenses. Through simulated phishing
email campaigns, Cybraphy aims to replicate real-world phishing scenarios and assess
employees' responses to phishing attempts.
The approach involves the creation of a sophisticated phishing email simulation platform,
Cybraphy utilizes advanced techniques such as fake domain creation, DNS server domain
setup, and attachment-based phishing emails to emulate diverse phishing attack vectors.
Additionally, educational modules covering email header analysis, URL inspection,
attachment analysis, and social engineering techniques are integrated to provide comprehensive
training to employees.
The result is a robust and scalable phishing email simulation program capable of accurately
assessing employees' susceptibility to phishing attacks and providing targeted cybersecurity
training based on the identified needs. By utilizing this platform, organizations
can proactively identify and address vulnerabilities in their cybersecurity defenses,
ultimately enhancing their resilience against phishing threats.
Cybraphy's phishing email simulation service offers organizations a proactive approach
to cybersecurity training and awareness, empowering them to mitigate the risks associated
with phishing attacks effectively. Through continuous refinement and improvement,
Cybraphy strives to deliver cutting-edge solutions to address the evolving cybersecurity
landscape.
The demand for innovative solutions continues to drive sports science and engineering. Our entry for Engineering Open House is a performance enhancing product: cooling insoles designed to increase the performance of endurance athletes. These insoles utilize phase change materials (PCMs) along with selected additives to create a new type of insole within the sports industry. Our cooling insoles' main objective is to address the critical need of effective temperature regulation during prolonged physical activity. Endurance athletes are constantly pushing their limits in demanding environments and often face challenges related to heat buildup, leading to discomfort and performance degradation. Our approach integrates advanced PCM technology from MicroTek Laboratories, known for its thermal energy storage properties, with additives to assist with durability, flexibility, and overall performance. The key innovation lies in the strategic incorporation of PCMs, which undergo phase transitions at specific temperatures, effectively absorbing excess heat from the athlete's feet during exercise from the pressure of the feet hitting the ground. This active cooling approach helps with the risk of heat-related injuries and allows athletes to maintain peak performance levels for extended amounts of time. There are scientific studies that support that cooling during activities more than 30 minutes has an exponential effect on increased performance. Our cooling insoles represent an advancement in sports engineering, utilizing the fusion of materials to elevate the performance and endurance of athletes in their search for optimal performance.
To create a device which can monitor network traffic, ie packet sniff, networks from a concealed location. This allows cybersecurity analysts to better perform their job as others in excersises will not be able to screen peak and thus patch vulnerabilities before their exploited. Our microcomputer has a 2 buisness day lifespan on mobile battery pack, a full desktop interface and makes no noise. Additionally, it can be hidden in bags, in drawers, or use our example fake book safe.
In today鈥檚 information age, cybercrime is more rampant than ever, yet companies often find their employees lacking the necessary skills to defend against it. This is due to ineffective and outdated cybersecurity training 鈥 an issue that plagues IT departments across the world. A new style of training, one that is more engaging, is needed to ensure employees can protect themselves and their organizations against the threats of today. Our proposed solution works to solve this demand. Our new training software contains learning segments comprised of three main components: learning content, simulation activity, and real-world example. Through presenting these components in a gamified format, the software encourages the user to remain actively engaged with the training content. Gamification has been proven to increase user engagement by up to 48%. With an increase in user engagement, it鈥檚 believed increased retention of the learning material will follow. Additionally, the software will continually reinforce the importance of the content. Development of the software is currently in progress. Once completed, tests will be done comparing the software to traditional training programs to determine if the solution is an improvement in terms of engagement and retention and, if so, by what percentage. These tests will involve users partaking in both and completing surveys and tests based on the content and their experience with the training format. The expectation is that it will be enough of an improvement to warrant IT departments to switch to our solution.
The Carpacity project aims to tackle the common issue of finding parking on campus, which affects both students and faculty, especially during peak hours. This challenge often leads to traffic congestion and frustration due to high demand for parking spaces. Carpacity employs open-source software to monitor and analyze traffic within parking lots, using camera feeds to track the entrance and exits. This data helps determine real-time parking lot occupancy, enabling students to find parking more efficiently and allowing Parking Services to obtain valuable metrics for decision-making and resource allocation. Through heatmapping, the system can indicate the popularity of specific lots, aiding in better management of parking resources. Currently, Carpacity successfully monitors traffic flows and calculates the real-time capacity of parking lots, demonstrating the potential of image detection technology to enhance the parking search process and improve overall campus life.
Sly Fox Camera Co. seeks to bridge the gap between security assessment and implementation, addressing a critical challenge faced by security teams worldwide: the need for discreet and accurate company badge capture. Through innovative technologies, the application will empower cyber penetration teams and law enforcement agencies to capture company identification badges while remaining discreet. It's not merely about capturing data; it's about enhancing the efficiency of security assessments by quantifiably reducing the manual effort required to obtain critical information. The project's key insights revolve around optimizing the ID data capture process, ensuring the application or physical device a stealthy operation, and quantifying the time savings it offers, while ideally keeping costs down. The next steps in this project include rigorous testing and refinement, aiming to establish the reliability, security, and effectiveness of the app in various security testing scenarios.