For the Cybersecurity capstone project, our team was given a webserver and website for the company Akwaaba. We were tasked to fix all vulnerabilities, keep the server up to date, and help maintain the site with uptime being the priority. After the first two milestones were complete, we were to attempt to hack another team’s server while they attempted to do the same to us. When the attack phase began on Wednesday 10/26, our team discovered the other team had not changed any of their original passwords, so we took control within thirty minutes and took it down soon after. As of 10/30, their site is still down while we haven’t noticed any issues with our own. The attack phase has two weeks to go (ending on 11/14), so our group is actively mon...
Web applications allow users to receive and communicate content from remote servers through web brow...
Cyberspace is increasingly attacked and there are limited means of mitigating this act. This is usua...
For this project, we decided to use the nopCommerce open-source eCommerce solution for our simulated...
The purpose of this capstone was to form a cyber security team to help a small business, a restauran...
Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecuri...
The team was assigned the responsibility of securing a web server. This business website is hosted o...
Our project focuses on ethical hacking and defending in the form of a red/blue team. Our project was...
This project is to showcase a real life scenario of securing a theoretical business website on Red H...
The project focuses on securing the server infrastructure of Akwaaba, a Caribbean-inspired steakhous...
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ...
The Internet servers such as DNS, mail and WWW ones play an important role in the Internet connectio...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information...
213 pagesTargeted attacks using breached credentials exploit the fact that users reuse some semantic...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Web applications allow users to receive and communicate content from remote servers through web brow...
Cyberspace is increasingly attacked and there are limited means of mitigating this act. This is usua...
For this project, we decided to use the nopCommerce open-source eCommerce solution for our simulated...
The purpose of this capstone was to form a cyber security team to help a small business, a restauran...
Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecuri...
The team was assigned the responsibility of securing a web server. This business website is hosted o...
Our project focuses on ethical hacking and defending in the form of a red/blue team. Our project was...
This project is to showcase a real life scenario of securing a theoretical business website on Red H...
The project focuses on securing the server infrastructure of Akwaaba, a Caribbean-inspired steakhous...
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ...
The Internet servers such as DNS, mail and WWW ones play an important role in the Internet connectio...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information...
213 pagesTargeted attacks using breached credentials exploit the fact that users reuse some semantic...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Web applications allow users to receive and communicate content from remote servers through web brow...
Cyberspace is increasingly attacked and there are limited means of mitigating this act. This is usua...
For this project, we decided to use the nopCommerce open-source eCommerce solution for our simulated...