Undergraduate Research

2022 Information Systems Audit and Control Association (ISACA) Virtual - Case Study: PopVote Assessing the Risks of DDOS
Erin Moran, Carlos Bonilla, Lindsey Gill, Joseph Alexander, Nikolay IIkiv, Steven Carlson
Mentors: Mr. Anar Taghiyev and Mr. Quinn Perfetto Microsoft Cybersecurity Personnel
Slideshow
2022 PopVote Case Study Incident Report and Solutions Breakdown - Tech Tycoons ISACA
Yenelle Cumberbatch, Christopher Bulkan, Christian Cadet and Kyle Ervin
Mentor: Mr. Bob Gaines - HKA
Slideshow
2021 Information Systems Audit and Control Association (ISACA)
Virtual - Case Study: Equifax Breach
Yihua Huang, Frank Coloccia, Sofia Raja, Jake Richter, Greg Tsouprakos
2021 C-Suite Security Equifax Analysis
Kevin Suckiel, Amanda Margolies, Shira Siegel, Yosef Samson, Molly Harder, Justin Cabrera
Mentor: Mr. Joe Tso
April
2017
Twenty-fourth Consortium for Computing Sciences in Colleges (CCSC)
The College of Saint Rose, Albany New York
Deadly DDoS in Depth (WIP)
Michael Tantalos & Gabriel Rivera

This poster will be an in-depth learning demonstration on the increasingly popular method of creating botnets. In particular, the focus will be on internet of things devices and their widespread abuse in major DDoS attacks. The project will focus on the methods used to infect these devices, such as vulnerable ports and protocols, what kind of devices are used to attack, the most popular pieces of malware infecting these devices, their motives, and the attacks they have carried out successfully. The effects of these attacks will be outlined, showing the financial harm they impose on companies who experience them. We will also describe the various types of DDoS attacks, and most commonly used methods.
April
2017
Theoretical and Applied Science Symposium (TAS)
Ramapo College, New Jersey
The Effect of Mobile Meditation on Mental Health
Rachel Gonzalez and Danielle Zan

The focus of our project is to create relief for stress and anxiety in two main target markets. The first being men and women ages 18-25: the college freshman who is taking 18 credits and still can’t properly make a bowl of ramen and the college graduate who is trying to find the perfect job and make their parents feel as if they did a decent job raising their kid. Our main goal with this application is to help the user on a personal level, and more than that, teach the user that helping others will always in the end help them develop another level of understanding to reach a higher tier of enlightenment.
undergraguate_research
John Guckian
My research was conducted while interning at Peckham Industries, a construction company, located in White Plains, New York. Peckham Industries consists of approximately 30 different locations with roughly 400 end users to manage. This project will allow me to study, test and control different company policies and procedures throughout the work environment. Depending on the situation will determine the correct approach for a solution. I stress the importance of policies and procedures because the pros outweigh the cons every single time. My poster will represent these topics and will be presented in full detail.
undergraguate_research
2018 The 74th Eastern Colleges Science Conference (ECSC)
Ithaca College, New York
Artificial Intelligence and the Roadmap to Cybernetic Immortality
David Bernhardt & Nicolle Francis

Artificial Intelligence (AI) and Cybersecurity are two disciplines that are advancing by leaps and bounds. In this study, we analyze how AI and Cybersecurity have been improperly merged. Analyzing these failures, we then propose an approach for merging them effectively and their application. In addition, we discuss the benefits of when Artificial Intelligence and computer security are combined correctly to combat cybercrime, as well as how to correctly use the two areas in harmony.
undergraguate_research
IMPROVING THE DELIVERY OF MEDICATION WITH INTELLIGENT AUTOMATION
Deana Conzuegra & Erika Berger

Administering hospital medications is a crucial component of a patient's recovery while staying in a hospital. Our goal is to assess quality of performance, identify deficiencies, errors, or potential optimizations, and cost-benefit analysis to determine which tasks should be automated, which tasks should involve intimate interaction between patient and robot, and which ones should rely solely on hospital staff.
undergraguate_research
April
2019
The 73rd Eastern Colleges Science Conference (ECSC)
Manhattan College on Saturday
USING CURRENT TRENDS IN TECHNOLOGY TO MAXIMIZE THREAT IDENTIFICATION IN FINANCIAL COMPANIES COMPUTER SYSTEMS
Charles Adams

New technologies such as blockchain and artificial intelligence are beginning to become viable to be utilized in production environments. These technologies provide potential benefits to cost allocation, resource utilization and security through threat identification. This can be achieved through the implementation of a proof of stake or a federated byzantine fault tolerate consensus protocol in combination with a Bayesian network. How these technologies provide a more efficient approach is the true solution. This paper discusses the areas in which blockchain and AI can be implemented in tandem to maximize threat identification.
undergraguate_research
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY AND ANTI-CYBER SECURITY SYSTEMS
Andrew J. Cabrera, Muhammad Wajid

Artificial intelligence (AI) is a growing technology that is tightly intertwined in the Internet of Things (IoT). This poster will report AI methodologies and strategies for combating security weaknesses and taking advantage of them in terms of ethical hacking. By utilizing a system that teaches itself we almost remove all traces of human error. The only remnants of human interaction would be the original code written and an update every now and again.
SEE THROUGH YOUR MEAL
Quincy Doccy
(1st place for best oral presentation)
In 2010, NYC Health Department rolled out the letter grade system for restaurants to reduce foodborne illness, increase sanitary practices and provide transparency for diners. Currently, 90% of NYC’s 24,000 restaurants hold the letter A grade (the highest score). The objective of this project is to analyze the NYC Department of Health and Mental Hygiene (DOHMH) health inspections results datasets to identify the deficiencies and limitations of the current letter grade system and determine its effectiveness. Additionally, I will implement an application prototype to explore rather extending inspection citations to restaurant goers influence their perspective on a restaurant.
undergraguate_research
PASSWORD STRENGTH
David Ferker and Mario D’Alicandro

According to Verizon Data Breach Investigations report in 2017, “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” For the last several decades the standard advice given regarding the strength of a password was to make the password complex, without using common words. It was believed that the more complex a password is the less likely it could be cracked through various hacking techniques. However, this advice has largely been deemed obsolete due to new hacking methods through more complicated computer systems.
PROMOTING GOOD PRACTICES IN CORPORATIONS FOR CYBERSECURITY
Ankit Kumar and Ryan Distelhurst

Cybersecurity attacks have been happening more frequently than they use to and are beginning to affect a larger majority of people. The poster will focus on promoting good security practices, offering suggestions on how a company can improve to help combat common cyber-attacks, as well as how to reduce the risk, or mitigate the effects of an attack.
ARTIFICIAL INTELLIGENCE: TOO INTELLIGENT?
Adriana Lobato, Sabrin Guron

According to a survey conducted by the Narrative Science and the National Business Research Institute, 61 percent of businesses in 2017 started to implement artificial intelligence (AI) in their company. AI is a machine’s capability to imitate intelligent human behavior but, due to its growth in use, there is corresponding increase in security threats. In this poster, we will discuss the security threats in AI and potential solutions to these issues.
THE BENEFITS OF ELECTRONIC HEALTH RECORDS
Tchard Pacquette

In the current time, the adoption of information systems has necessitated the deployment of robust systems in healthcare setups to enhance the overall functions of such institutions. For this case, the advantages of electronic health record (EHR) are discussed comprehensively to warrant their implementation in the first place.
THE DRIVING FORCE OF SELF-DRIVING CARS
Phuc Pham

Believe it or not, self-driving cars are on the way. It seems like everyone is jumping on the self-driving bandwagon. This technology is no longer futuristic but accessible to us and it’s going to impact our lives in a very short time. Self-driving cars will make our lives much safer while human-driven car accident is the leading cause of death overall among all causes. Also, self-driving cars will allow us to have more free time during commute time so we can be more productive. My poster will represent these topics in full detail.
SECURING THE FRAGILE FLAWS OF THE INTERNET OF THINGS
Oscar Quispe and Sandra Matailo

For this poster, we will discuss the possible solutions and opportunities for the most critical challenges that the Internet of Things (IoT) faces in terms of security and privacy. To date, the majority of the Internet application’s main goal is to provide information, interaction and entertainment for humans and businesses. To provide confidence in IoT system security and privacy, our research will be discussing how security mechanism should provide future devices an embedded security technology, why software development organizations should write stronger code, and why it is important to be aware of the latest security threats and breaches.
SMART HOME
Timmy Tenney

For this project, we will look at the development of Internet of Things (IoT) and how it has influenced the development of smart homes. Total global spending on IoT devices and appliances across all environments was an estimated $737 billion in 2016 and is projected to reach up to $1.4 trillion by 2021. Smart homes are not a new concept, and in reality, have been around for a few years. In this poster will display the possibilities of adding smart home technology into the construction of a new house. This will create a more compatible home with smart home technology that is less visible resulting in a more user friendly and astatically pleasing home. We will also talk about the future possibilities of smart home technology and what they will offer to a user.
CREATING A DIGITAL PRODIGY
Munir Yousef

This paper will focus on the application of a machine learning model that could be used in the field of data analysis and security. Machine learning algorithms are limited to four basic learning methods that are designed to optimize the learning process so that the machine may develop intelligence over time. Reinforcement learning, supervised learning, semi-supervised learning and unsupervised learning are the systems being utilized to advance the machine learning processes. This paper will seek to determine how concepts such as value, curiosity and common sense may be translated into programming algorithms in order to unlock the true potential of machines and the data at their disposal.