College

College of Engineering and Polymer Science

Date of Last Revision

2025-04-26 12:11:20

Major

Computer Information Systems

Honors Course

CISS 491

Number of Credits

3

Degree Name

Bachelor of Science

Date of Expected Graduation

Spring 2025

Abstract

Cyber-attacks are becoming increasingly common and damaging as technology advances each year. Many businesses cannot afford the latest security technologies, and even with the highest security measures, there can still be room for employee error or insider threats that are not taken into account. It is crucial to keep these factors in mind when securing a business network of any size or financial standing.This project will aim to simulate a business environment by first building a small network with three routers and a switch, and implementing some of the common best practices for network hardening from credible organizations like NIST and the NSA. It will also showcase commonly overlooked vulnerabilities when configuring a network, and how they can be exploited or advantageous to threat actors.

Research Sponsor

Nadhem Ebrahim

First Reader

Stanley Smith

Second Reader

John C. Hoag

Honors Faculty Advisor

Janet Kropff

Proprietary and/or Confidential Information

No

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.