University Research Conference 2020 | Page 8

Robert Bruce Cattie Site-to-Site Virtual Private Networks (VPNs) Site-to-Site Virtual Private Networks (VPNs) allow organizations to access local network resources from multiple locations via the Internet. VPN technology provides additional security because it encrypts traffic as it traverses the network. Even data being transmitted over public Wi-Fi is more secure using VPN technology. This project explains how to deploy and why you may want to use VPN tunneling. Donald Hoffman Credit Card Technologies and Breaches: What’s in Your Wallet? Chip-cards were the industry’s answer to magnetic strip card breaches. However, chip-cards are not protecting consumers from skimming attacks, breached servers, and counterfeit scams. Think you are safer using a Mobile Wallet? Not if your phone is hacked or infected with malware. This research will explore credit card breaches and recommend steps to minimize your chances of being victimized. Kevin Hanuscin What Is 5G Technology and Where Is It Taking Us? The new fifth generation (5G) wireless technology for digital cellular networks offers speeds 100-400 times faster than existing 4G networks. 5G is also capable of supporting up to a million devices per square kilometer. Communication over 5G networks will be real- time, making it conducive for robotics, autonomous cars, and other devices collectively referred to as the Internet of Things (IoT). James Staas Cryptojacking – Mining My Own Business Cryptojacking can best be described as the unauthorized use of someone else’s computer to mine cryptocurrency. Access is typically gained by infecting a website or ad with JavaScript that automatically executes once it loads into the victim’s browser. Once compromised, the unwelcomed cryptomining code runs in the background virtually unnoticeable. Sean Farrell Automating Social Media Rand the Unmanned Instagram Bot (RandBot) is an application developed by CIS students to demonstrate Selenium WebDriver capabilities. Selenium is a program used for automating web applications. RandBot randomly generates words which are used to search Instagram hashtags. The top nine hashtags are then posted to the bot’s Twitter account. 6