2022 |
Information Systems Audit and Control Association (ISACA) Virtual -
Case Study: PopVote Assessing the Risks of DDOS
Erin Moran, Carlos Bonilla, Lindsey Gill, Joseph Alexander, Nikolay IIkiv, Steven Carlson Mentors: Mr. Anar Taghiyev and Mr. Quinn Perfetto Microsoft Cybersecurity Personnel Slideshow |
2022 |
PopVote Case Study Incident Report and Solutions Breakdown - Tech
Tycoons ISACA Yenelle Cumberbatch, Christopher Bulkan, Christian Cadet and Kyle Ervin Mentor: Mr. Bob Gaines - HKA Slideshow |
2021 |
Information Systems Audit and Control Association (ISACA) Virtual - Case Study: Equifax Breach Yihua Huang, Frank Coloccia, Sofia Raja, Jake Richter, Greg Tsouprakos |
2021 |
C-Suite Security Equifax Analysis Kevin Suckiel, Amanda Margolies, Shira Siegel, Yosef Samson, Molly Harder, Justin Cabrera Mentor: Mr. Joe Tso |
April 2017 |
Twenty-fourth Consortium for Computing Sciences in Colleges (CCSC) The College of Saint Rose, Albany New York |
Deadly DDoS in Depth (WIP) Michael Tantalos & Gabriel Rivera This poster will be an in-depth learning demonstration on the increasingly popular method of creating botnets. In particular, the focus will be on internet of things devices and their widespread abuse in major DDoS attacks. The project will focus on the methods used to infect these devices, such as vulnerable ports and protocols, what kind of devices are used to attack, the most popular pieces of malware infecting these devices, their motives, and the attacks they have carried out successfully. The effects of these attacks will be outlined, showing the financial harm they impose on companies who experience them. We will also describe the various types of DDoS attacks, and most commonly used methods. |
|
April 2017 |
Theoretical and Applied Science Symposium (TAS) Ramapo College, New Jersey |
The Effect of Mobile Meditation on Mental Health
Rachel Gonzalez and Danielle Zan The focus of our project is to create relief for stress and anxiety in two main target markets. The first being men and women ages 18-25: the college freshman who is taking 18 credits and still can’t properly make a bowl of ramen and the college graduate who is trying to find the perfect job and make their parents feel as if they did a decent job raising their kid. Our main goal with this application is to help the user on a personal level, and more than that, teach the user that helping others will always in the end help them develop another level of understanding to reach a higher tier of enlightenment. |
|
John Guckian
My research was conducted while interning at Peckham Industries, a construction company, located in White Plains, New York. Peckham Industries consists of approximately 30 different locations with roughly 400 end users to manage. This project will allow me to study, test and control different company policies and procedures throughout the work environment. Depending on the situation will determine the correct approach for a solution. I stress the importance of policies and procedures because the pros outweigh the cons every single time. My poster will represent these topics and will be presented in full detail. |
|
2018 |
The 74th Eastern Colleges Science Conference (ECSC) Ithaca College, New York |
Artificial Intelligence and the Roadmap to Cybernetic
Immortality
David Bernhardt & Nicolle Francis Artificial Intelligence (AI) and Cybersecurity are two disciplines that are advancing by leaps and bounds. In this study, we analyze how AI and Cybersecurity have been improperly merged. Analyzing these failures, we then propose an approach for merging them effectively and their application. In addition, we discuss the benefits of when Artificial Intelligence and computer security are combined correctly to combat cybercrime, as well as how to correctly use the two areas in harmony. |
|
IMPROVING THE DELIVERY OF MEDICATION WITH INTELLIGENT
AUTOMATION
Deana Conzuegra & Erika Berger Administering hospital medications is a crucial component of a patient's recovery while staying in a hospital. Our goal is to assess quality of performance, identify deficiencies, errors, or potential optimizations, and cost-benefit analysis to determine which tasks should be automated, which tasks should involve intimate interaction between patient and robot, and which ones should rely solely on hospital staff. |
|
April 2019 |
The 73rd Eastern Colleges Science Conference (ECSC) Manhattan College on Saturday |
USING CURRENT TRENDS IN TECHNOLOGY TO MAXIMIZE THREAT
IDENTIFICATION IN FINANCIAL COMPANIES COMPUTER SYSTEMS
Charles Adams New technologies such as blockchain and artificial intelligence are beginning to become viable to be utilized in production environments. These technologies provide potential benefits to cost allocation, resource utilization and security through threat identification. This can be achieved through the implementation of a proof of stake or a federated byzantine fault tolerate consensus protocol in combination with a Bayesian network. How these technologies provide a more efficient approach is the true solution. This paper discusses the areas in which blockchain and AI can be implemented in tandem to maximize threat identification. |
|
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY AND ANTI-CYBER SECURITY
SYSTEMS
Andrew J. Cabrera, Muhammad Wajid Artificial intelligence (AI) is a growing technology that is tightly intertwined in the Internet of Things (IoT). This poster will report AI methodologies and strategies for combating security weaknesses and taking advantage of them in terms of ethical hacking. By utilizing a system that teaches itself we almost remove all traces of human error. The only remnants of human interaction would be the original code written and an update every now and again. |
|
SEE THROUGH YOUR MEAL
Quincy Doccy (1st place for best oral presentation) In 2010, NYC Health Department rolled out the letter grade system for restaurants to reduce foodborne illness, increase sanitary practices and provide transparency for diners. Currently, 90% of NYC’s 24,000 restaurants hold the letter A grade (the highest score). The objective of this project is to analyze the NYC Department of Health and Mental Hygiene (DOHMH) health inspections results datasets to identify the deficiencies and limitations of the current letter grade system and determine its effectiveness. Additionally, I will implement an application prototype to explore rather extending inspection citations to restaurant goers influence their perspective on a restaurant. |
|
PASSWORD STRENGTH
David Ferker and Mario D’Alicandro According to Verizon Data Breach Investigations report in 2017, “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” For the last several decades the standard advice given regarding the strength of a password was to make the password complex, without using common words. It was believed that the more complex a password is the less likely it could be cracked through various hacking techniques. However, this advice has largely been deemed obsolete due to new hacking methods through more complicated computer systems. |
|
PROMOTING GOOD PRACTICES IN CORPORATIONS FOR CYBERSECURITY
Ankit Kumar and Ryan Distelhurst Cybersecurity attacks have been happening more frequently than they use to and are beginning to affect a larger majority of people. The poster will focus on promoting good security practices, offering suggestions on how a company can improve to help combat common cyber-attacks, as well as how to reduce the risk, or mitigate the effects of an attack. |
|
ARTIFICIAL INTELLIGENCE: TOO INTELLIGENT?
Adriana Lobato, Sabrin Guron According to a survey conducted by the Narrative Science and the National Business Research Institute, 61 percent of businesses in 2017 started to implement artificial intelligence (AI) in their company. AI is a machine’s capability to imitate intelligent human behavior but, due to its growth in use, there is corresponding increase in security threats. In this poster, we will discuss the security threats in AI and potential solutions to these issues. |
|
THE BENEFITS OF ELECTRONIC HEALTH RECORDS
Tchard Pacquette In the current time, the adoption of information systems has necessitated the deployment of robust systems in healthcare setups to enhance the overall functions of such institutions. For this case, the advantages of electronic health record (EHR) are discussed comprehensively to warrant their implementation in the first place. |
|
THE DRIVING FORCE OF SELF-DRIVING CARS
Phuc Pham Believe it or not, self-driving cars are on the way. It seems like everyone is jumping on the self-driving bandwagon. This technology is no longer futuristic but accessible to us and it’s going to impact our lives in a very short time. Self-driving cars will make our lives much safer while human-driven car accident is the leading cause of death overall among all causes. Also, self-driving cars will allow us to have more free time during commute time so we can be more productive. My poster will represent these topics in full detail. |
|
SECURING THE FRAGILE FLAWS OF THE INTERNET OF THINGS
Oscar Quispe and Sandra Matailo For this poster, we will discuss the possible solutions and opportunities for the most critical challenges that the Internet of Things (IoT) faces in terms of security and privacy. To date, the majority of the Internet application’s main goal is to provide information, interaction and entertainment for humans and businesses. To provide confidence in IoT system security and privacy, our research will be discussing how security mechanism should provide future devices an embedded security technology, why software development organizations should write stronger code, and why it is important to be aware of the latest security threats and breaches. |
|
SMART HOME
Timmy Tenney For this project, we will look at the development of Internet of Things (IoT) and how it has influenced the development of smart homes. Total global spending on IoT devices and appliances across all environments was an estimated $737 billion in 2016 and is projected to reach up to $1.4 trillion by 2021. Smart homes are not a new concept, and in reality, have been around for a few years. In this poster will display the possibilities of adding smart home technology into the construction of a new house. This will create a more compatible home with smart home technology that is less visible resulting in a more user friendly and astatically pleasing home. We will also talk about the future possibilities of smart home technology and what they will offer to a user. |
|
CREATING A DIGITAL PRODIGY
Munir Yousef This paper will focus on the application of a machine learning model that could be used in the field of data analysis and security. Machine learning algorithms are limited to four basic learning methods that are designed to optimize the learning process so that the machine may develop intelligence over time. Reinforcement learning, supervised learning, semi-supervised learning and unsupervised learning are the systems being utilized to advance the machine learning processes. This paper will seek to determine how concepts such as value, curiosity and common sense may be translated into programming algorithms in order to unlock the true potential of machines and the data at their disposal. |