Risk Assessment

An Indiana company conducts genetic research on plants. The IT manager of the company contacted us for assistance in looking into the security of their network. They already had another company that was performing monthly checks on their network. Research was done to find how that company gained access to the network to ensure safe…

Not-For-Profit Gaming Computer

The not-for-profit organization is looking to create a gaming environment for their patients in order to promote an active and engaged atmosphere. This project involves creating and documenting all security controls necessary for a public gaming computer. Once completed, the children will be able to play games while being prevented from accessing system settings. Project…

Windows and MAC Backup Solutions

Research was conducted to locate a software solution that could back up several Windows and MAC workstations. The solution found for MAC was TimeMachine and for Windows, NTBACKUP. Also, two solutions were discovered that could back up both platforms. These solutions were iBackup and Symantec Backup Exec. Project Student: Patrick G. Fisk

Hard Drive Wipe

The desired outcome for this project is to successfully wipe the computers that were taken out of two of the labs in a university department building.  To complete this project, Darik’s Boot and Nuke software was used to wipe the hard drives of the computers.      Project Student: Twila Dowell

University Department Lab Maintenance

A university department’s labs are used to allow students the ability to perform various hands on computer labs in a secured, comfortable learning environment.  In allowing the students to complete their labs in such an environment, the workstations  allow students to have administration privileges to successfully complete their tasks.  Due to these privileges, the labs…

Server Room Security

The goal of this particular project was to set up a system that monitored the motion in the server room of a university department. A webcam was used to capture images for every second that motion was detected. The software that was chosen to be used to meet the goal was VideoMonitor. Project Student: Matt…

iPad Vulnerabilities: Security

With this project the student analyzed what makes the iPad so popular despite potential security risks. The student concluded that iPads are reliable and that they increase productivity on the go. iPads offer applications such as iWork, Citrix Receiver, and Mail which allow users to easily conduct business and increase profits. However, users could lose…

iPad Vulnerabilities: iBackupBo

The purpose of this student project was to determine how safe data is on iPads. To analyze this the student determined which tools can be used to compromise data on an iPad, what types of data can be extracted, what the ramifications are, and if there are ways to mitigate these issues. The student then…

Business Client ShareFile

Sharefile is a cloud based storage service that is owned by Citrix.  To test this software the students shared information on mobile devices and limited the user access to specific files.  The students also provided access for outside users that were not on the Indiana Company’s network.  After monitoring the activity on mobile devices the…

SNORT

An intrusion detection system is a device or software that monitors network traffic for malicious activities or policy violations.  If there is malicious activity detected an output report is sent to a management station.  For this particular project students researched and tested SNORT. SNORT is a free and open source network intrusion prevention system, which…