Capstones demonstrate how our students apply classroom study to solve real world issues in their community
"Innocence Lost: An Analysis of Terrorist Cyber Operations Targeting American Youth" - Richard Brumfield
Terrorists and military faction leaders have utilized the ability to promulgate change through the use of social engineering and mass media outlets to further advance agendas and causes. With the use of online radicalization and the ability to train recruits without the hassle of international boundaries, jihadists quickly mastered a new version of psychological operations to connect to massive amounts of people. [Read More]
"Confirming the Integrity and Utility of Open Source Forensic Tools" - Steven Morra
Open Source software tools used to investigate digital evidence need to be able to stand up to scrutiny in court. The goal of this project was to equip an investigator with documentation that can be used in court to prove the legitimacy of the OSS tool and its methods. [Read More]
"An Analysis of Microsoft Event Logs" - Michelle D. Mullinix
Microsoft Windows event logs are central to conducting an investigation when determining whether or not a virus has been installed on a targeted system. This research explores forensic artifacts recovered during an investigation to determine whether virus activity may be involved, describes the relevance of the event logs, discusses various investigative techniques, and also explains best practices regarding the use of Windows event logs in an investigation. [Read More]
"Forensic Recovery of Evidence from deleted Oracle virtualbox virtual machines" - Cherilyn Neal
Techniques have been developed to acquire virtual machine images for analysis and several virtual forensic platforms that are pre-built with forensic tools are freely available, but is it possible to recover evidence of the activity generated inside a virtual machine and restore recovered virtual machine files to a functioning virtual machine that could then be examined? [Read More]
"The Implications of the Abandoned Property Doctrine of the Fourth Amendment on Data Deleted from the Cloud" - William C Pizio
"The Internet, A Secret Minefield For Children" - David Plude
With the proliferation of the internet, dangers such as cyberbullying, sexting, identity theft, and terrorist radicalization are hidden dangers especially for children in this virtual minefield. Children are also at risk of damaging their online reputation that will prove to be costly in the future, if they do not learn how to avoid these dangers. Are schools adequately preparing children for the online world?
Even though some states and local education agencies require Internet safety education, data indicate that this education is not happening as thoroughly as necessary to prevent or reduce the risks associated with those identified in this research. [Read More]
Get started now by talking to a program manager at 315-732-2640 or toll free at 866-295-3106 or request more information.