Cybersecurity

Cybersecurity Alumni Capstones

Capstones demonstrate how our students apply classroom study to solve real world issues in their community


"Innocence Lost: An Analysis of Terrorist Cyber Operations Targeting American Youth" - Richard Brumfield

Terrorists and military faction leaders have utilized the ability to promulgate change through the use of social engineering and mass media outlets to further advance agendas and causes. With the use of online radicalization and the ability to train recruits without the hassle of international boundaries, jihadists quickly mastered a new version of psychological operations to connect to massive amounts of people. [Read More]

Back To Top
Back To Master of Science in Cybersecurity


"Confirming the Integrity and Utility of Open Source Forensic Tools" - Steven Morra

Open Source software tools used to investigate digital evidence need to be able to stand up to scrutiny in court. The goal of this project was to equip an investigator with documentation that can be used in court to prove the legitimacy of the OSS tool and its methods. [Read More]

Back To Top
Back To Master of Science in Cybersecurity


"An Analysis of Microsoft Event Logs" - Michelle D. Mullinix

Microsoft Windows event logs are central to conducting an investigation when determining whether or not a virus has been installed on a targeted system. This research explores forensic artifacts recovered during an investigation to determine whether virus activity may be involved, describes the relevance of the event logs, discusses various investigative techniques, and also explains best practices regarding the use of Windows event logs in an investigation. [Read More]

Back To Top
Back To Master of Science in Cybersecurity


"Forensic Recovery of Evidence from deleted Oracle virtualbox virtual machines" - Cherilyn Neal

Techniques have been developed to acquire virtual machine images for analysis and several virtual forensic platforms that are pre-built with forensic tools are freely available, but is it possible to recover evidence of the activity generated inside a virtual machine and restore recovered virtual machine files to a functioning virtual machine that could then be examined? [Read More]

Back To Top
Back To Master of Science in Cybersecurity


"The Implications of the Abandoned Property Doctrine of the Fourth Amendment on Data Deleted from the Cloud" - William C Pizio

Data that a person stores in the cloud has a layer of protection from police officers (subpoena without judicial intervention) but that protection falls well short of Fourth Amendment standards. Even though there are moves by providers to increase the level of protection, the user's data is private only so far as the privacy policy provides for... [Read More]

Back To Top
Back To Master of Science in Cybersecurity


"The Internet, A Secret Minefield For Children" - David Plude

With the proliferation of the internet, dangers such as cyberbullying, sexting, identity theft, and terrorist radicalization are hidden dangers especially for children in this virtual minefield. Children are also at risk of damaging their online reputation that will prove to be costly in the future, if they do not learn how to avoid these dangers. Are schools adequately preparing children for the online world?

Even though some states and local education agencies require Internet safety education, data indicate that this education is not happening as thoroughly as necessary to prevent or reduce the risks associated with those identified in this research. [Read More]

Back To Top
Back To Master of Science in Cybersecurity


Take the first steps to a career in cybersecurity by finding out more about the Master of Science in Cybersecurity degree program at Utica College.

Get started now by talking to a program manager at 315-732-2640 or toll free at 866-295-3106 or request more information.