University Research Conference 2021 | Page 9

Joseph Amper Black-Box Trading : How Algorithms are Transforming the Stock Market Algorithmic trading refers to computer scripts that can predict when to buy and sell stocks . These automated pre-programmed instructions include variables like price , time , and volume . The speed these trading bots are capable of could never be achieved by humans . With advancements in Artificial Intelligence , machines are using historical data , patterns , and behaviors to transform the trading industry .
Erik Askerov Cookie Logging Exploits Cookie logging is a technique used by hackers to access sensitive information . By exploiting the users ’ trust for a website , malicious actors employ suspicious extensions or trick users with cookielogging JavaScript . This research will explain what cookies and cookie logging are , describe how they can be exploited , and teach end users how to prevent these types of attacks .
Bridget Dixon A Critical Analysis of Steganography Steganography is the technique of hiding messages in plain sight . These messages can be hidden in pictures , videos , documents , and even audios . Information is hidden in a file by replacing some parts of the file or by creating new parts . Because steganography is increasingly being employed by hackers , it has become a critical concern for cybersecurity practitioners .
Jennifer Eisemann Snapchat : Where do your photos go after 24 hours ? Snapchat is a multimedia messaging app . One popular feature of Snapchat is that pictures and messages are only available for a short time . The app also features a person-to-person photo sharing option called Stories . Once snaps are viewed , they cannot be seen again . This research asks the question “ Where do Snapchat photos actually go after they are viewed ?”
Daniel Hack Benefits and Risks of Cloud Technology in Healthcare Advancements in technology make our lives easier and more convenient . For example , the healthcare industry utilizes cloud technologies to store and instantly retrieve medical records . While there is no doubt that the benefits of cloud computing are numerous , how is protected health information ( PHI ) secured ? This research will examine cloud technology vulnerabilities and how patients can safeguard their data .
7