Ian Gordynskiy * Penetration Testing and Ethical Hacking This research will explore penetration-testing and ethical hacking . What does a pen-tester probe and why ? After looking at different methods and tools pen-testers use , what happens when an ethical hacker or pen-tester exploits a target will be presented . How can end-users and organizations protect themselves from malicious attacks . Finally , why a penetration-tester should think like a hacker will be discussed .
Kevin Hanuscin and Joseph Duffy * Geolocation Technology : Helpful or Harmful ? Satellite tracking , or geolocation , makes our lives easier but can also introduce undesired results . By default , many devices and applications have geolocation enabled . People are not always aware that they are being tracked . Apple ’ s newest product Air Tag provides a perfect tool for stalkers and marketers . This research explores geolocation technologies and how to determine if you are being followed .
Justin Henderson * Accelerated Mobile Pages Accelerated Mobile Pages ( AMP ), is an open-source HTML Framework designed by Google . With AMP , webpages are cached by proxy servers and datacenters called content distribution networks . These proxies enable webpages to load faster , making AMP ideal for mobile devices and streaming content . This research takes a deeper look at how AMP works and if it is beneficial and cost effective .
Gianluca Isabella * Web Vulnerabilities This study will examine web vulnerabilities , specifically those that have been exploited in the past against nearly half of all web applications . The main exploits covered include cross-site scripting ( XSS ), SQL injections , and redirects . I hope to bring awareness to how these exploits are used , how widespread they are , and how end-users and businesses can avoid becoming victims .
Kevin Kirschenmann * Mobile Phone Malware The research will explore mobile phone malware . After reviewing the history of past attacks , the definition of malware , common phones used , and their vulnerabilities will be discussed . News articles on mobile phone malware will be used for demonstration purposes . Finally , steps to improve security on phones , including added security on email applications and recommendations for antivirus applications , will be provided .
7