iPad Vulnerabilities: iBackupBo

The purpose of this student project was to determine how safe data is on iPads. To analyze this the student determined which tools can be used to compromise data on an iPad, what types of data can be extracted, what the ramifications are, and if there are ways to mitigate these issues. The student then…

iPad Vulnerabilities: iFunBox

With this student project, the student was responsible for trouble shooting an iPad that would not mount as a usable disk. To resolve this issue the student installed iExplorer which allows users to view the iPad within Windows Explorer. However, iExplorer is prone to crashes as well as causing other software to crash. The student…

Storage Area Network

For this project the students were responsible for configuring one of the SANs and making it accessible on the network. The students evaluated the performance of the SAN based on the storage capacity, the high-speed access using fiber optic cable, as well as hot-swappable drives. After evaluating the performance the students eliminated power redundancy by…

Not-For-Profit Remote Access

Within this projects the students were responsible for analyzing different methods for remote access. By gaining remote access the students would then be able to maintain all networking equipment and services which includes: updating software, ensuring antivirus software is up to date, and ensuring that any technical problems are resolved efficiently. However, the students also…

Business Client ShareFile

Sharefile is a cloud based storage service that is owned by Citrix.  To test this software the students shared information on mobile devices and limited the user access to specific files.  The students also provided access for outside users that were not on the Indiana Company’s network.  After monitoring the activity on mobile devices the…

SNORT

An intrusion detection system is a device or software that monitors network traffic for malicious activities or policy violations.  If there is malicious activity detected an output report is sent to a management station.  For this particular project students researched and tested SNORT. SNORT is a free and open source network intrusion prevention system, which…

Syslog/Event Log Server

With this project the student was responsible for configuring audit policies on the host machines.  To do this the student had to turn on Success and Failure auditing for the Audit Logon Events policy, as well as configure the Special Logon/Logoff and Other Logon/Logoff policies.  The student was also required to configure the firewall on…

Lync PC Project

The goals for this project were to build a new desktop, install Microsoft Lync, configure the computer speakers to automatically turn on and off on specific days throughout the week, and to configure the desktop to automatically log on and lock right afterwards.  Specifications that were required:  Windows 7 Professional Edition, an Intel Core 2…

Dual OS Deployment

A university department is an approved testing facility for a regional testing group.  For this particular project the students purchased new hard drives and partitioned them into two separate partitions.  The students then created an image of Windows 7, Office 2010, Visual Studio 2010, and accounting software.  A second image contained a network image for…