Security Analyst – IDS/IPS

The university course’s campus network already has an Intrusion Detection System in place. The intrusion detection system’s current status is that it is not functioning properly in some regards. The system produces “false positives”, or alerts that are triggered by harmless sources on the network at an aggressive level.  The system could also be improved…

Qualtrics Risk Analysis Questionnaire: Design and Implement Feedback System using a Risk Matrix

This project is the “Qualtrics Risk Analysis”.  This project was started to create an easy to use questionnaire that could be used by both IT professionals and non-professionals alike.  The questionnaire uses the NIST 800-53 framework.  This questionnaire has been created for a cybersecurity committee. This semester’s project goals were to: Update the questionnaire Reduce…

Security Analysis & Risk Assessment

This project was requested by the Water/ Wastewater Committee of the Indiana Executive Council on Cybersecurity. The project’s purpose is to conduct an information security analysis via questionnaire and an on-site risk assessment of Indiana’s relatively smaller water management companies. The questionnaire was created via Qualtrics, a surveying and data analysis software. Once the assessments…

Jagwarz CTF Expansion

The purpose of this project is to enable students in networking and security track to practice their skills in using the Jagwarz CTF Expansion, Jagwarz website has multiple games such as a Capture-The-Flag(CTF) game , and Red vs Blue game. In addition, each game will have multiple challenges for users to complete to earn points…

Malware Analysis Lab

This project in the Lab is a Malware analysis Lab. The lab is supposed to aloe students to upload and research any malware they may find. The project uses Cuckoo, an automated sandbox for uploading said malware to analyze. Cuckoo analyzes the malware for the student and gives them a detailed report of what the…

The Living Lab’s PC Donation Build

For the PC Donations Build, we have worked on fixing (if needed) computers and getting ready the ones that are eligible to be donated. Since the start of the project, we have worked hard at inventorying around 500 computers so we can start the main project. Over the course of the PC donation build, we…

Wazuh: An Intrusion Detection System

Wazuh is an open-source intrusion detection system that uses individual agents to monitor user and network activities on a host-basis.   Suspicious activity is reported using alerts via email.  Agents were deployed to the workstations in the Living Lab through the use of group policy management.  The Auto-OSSEC tool developed by Binary Defense Systems provides automatically provisioning for agents in order…

IDS Network Security

The objective of the project is to install an intrusion detection system (IDS) for a University Course.  The client wanted an IDS installed and configured within the server room overseeing the computer lab that I.T. students uses for both classes and lab.  However, due to the level of knowledge of the students, the administration wanted…

Network / Security Analysts

This group’s project integrates multiple programs and software to enhance the security and monitoring of the Living Lab network. Some tools such as Proxmox, GRR, Spiceworks, OSquery, Veyon are used in order to create the proper environment to be able to monitor and examine the lab network and PCs. Using the tools allow for monitoring…

Qbot, A Linux Botnet Honeypot Analysis

The botnet honeypot project consists of a honeypot that has been created and left open on the web to entice botnet activity.  The honeypot is meant to attract curious criminals who are looking to attack open ports.  The project includes capturing the IP address, open port, and date of the inquiry.  The analysis includes looking up…