Seamus Bishof ( V , P ) Ethical Hacking This research explores ethical hacking , also known as penetration testing . Ethical hacking is critical in the ongoing effort to secure information systems and thwart cyber threats . After examining what ethical hackers do and their role in safeguarding organizations from malicious actors , some of the tools and techniques pen-testers use will be reviewed . The differences between white , black , and grey hat hackers will be discussed . Although black and white hat hackers use the same tools and techniques , they have very different objectives . How ethical hackers help organizations identify and resolve security vulnerabilities will be explained . Dat Bui ( P ) Neuromorphic Computing Neuromorphic computing attempts to replicate , implement , and mass produce the principles of brain computation at the cellular level to harness the secrets of billions of years of natural evolution . Using silicon photonics technology for artificial intelligence applications , these technologies offer convolutions and digital filters that enable the manipulation and processing of optical signals using fabricated integrated circuits . This manipulation facilitates the implementation of parallel multiply-accumulate ( MAC ) operations on a chip resulting in speed , energy efficiency , and bandwidth advantages over digital electronics and electronic component integration . This research will explore neuromorphic computing and its impact on AI applications .
Brogan Donovan ( V , P ) The Advancements and Challenges of Multi-Factor Authentication in Cybersecurity This project will explore the advancements and challenges of multi-factor authentication ( MFA ) in cybersecurity . After delving into the evolution of MFA , its effectiveness in thwarting threats , and the overall development of MFA in the cyber landscape will be discussed . Ways to bypass MFA such as phishing and social engineering , man-in-the-middle attacks , SIM swapping , and brute force attacks will be explained . This research seeks to expose the nature of MFA and whether it is secure enough to be the only technical control for a company ’ s cybersecurity infrastructure .
9