Sydney Robinson * Search Engine Optimization ( SEO ) This research will examine how Search Engine Optimization ( SEO ) is used by web developers to increase website traffic . Using metadata , alt tags , keywords , usability checks and technical optimization , web developers can manipulate a site ’ s rank position on the search engine results page ( SERP ). After examining the benefits of Search Engine Optimization , an
overview of SEO methods will be explained .
Joshua Urbach * Fuzz Testing : Detecting Unknown Vulnerabilities in a Program When writing software , there are known and unknown vulnerabilities in all programs . We have already developed protection against the known vulnerabilities , but the unknown can be dangerous . Fuzzing is a technique that allows us to find many of these unknown bugs before potential attackers can find and exploit them . This research will explore fuzz testing and its security benefits .
Francis Wakefield * Denial-of-Service ( DoS ) Attacks This study of Denial-of-Service ( DoS ) attacks seeks to understand exactly what DoS attacks are , how they work , who they target , and the best mitigation strategies . With an increasing dependency on connectivity , it is important to understand the damage a DoS attack can do to businesses and others who rely on the network .
Jonathan Walsh * Nation-State Attacks Against the Power Grid : The New Battlefield Thousands of high-voltage power lines transmit electricity across the United States . This complex network of cables is vulnerable to natural disasters , human error , and cyberattacks . The U . S . has experienced a 100 % increase in nation-state attacks over the last three years . This research will explore these attacks and what impact an attack might have . Finally , mitigation strategies will be examined .
David West * Nation-State Hacking : A Closer Look at China ’ s APT1 Hackers China ’ s state-sponsored hackers have been targeting U . S . military , commercial , financial , medical , and educational institutions , stealing research and sensitive data for years . Highly skilled Chinese hackers were first exposed in Mandiant ’ s 2014 , APT1 report . This research will survey China ’ s global espionage campaign . Discussed will be the recent escalation in attacks and the national security threat they present .
9