SCHOOL OF INFORMATION TECHNOLOGY


Students graduated from SoIT’s cybersecurity track are required to complete two semesters of senior design projects in their fifth year. They work with faculty advisors and industry partners to implement practical cybersecurity projects and publish their findings through course presentations and SoIT’s annual IT Expo events.


A selected list of past student publications is below


1.) Security Audit

Bridges, Kyle (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2014-04-22)


2.) Kroger Security Information and Event Management Upgrade

McDonald, Patrick (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2014-04-22)


3.) City Park Wireless and Security

Hutzel, Daniel; McDole, Austin (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2013-04-15)


4.) Data Loss Prevention Systems and Their Vulnerabilities

Middleton, Chad (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2015-04-27)


5.) The All in One Network Solution (A.I.O.N.S)

Al-Ajmi, Nadder; Demelo, Nathaniel; Fletcher, Andrew; Warren, Carla(University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2015-04-28)


6.) Addressing IPv6 Vulnerabilities on Small Business Networks

Haines, Bradley; Pullano, Vincent (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2012-06-04)


7.) Network Behavior Analytics

Batac, Emil; Johnson, Larry (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2014-04-17)


8.) Network Intrusion Prevention/Detection System:

Price, Robert; Cooper, Troy (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2012-05-21)


9.) Client-side Encryption for Dropbox

Cooklis, Nick (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2014-04-14)


10.) Creation of Pentesting Labs

Barta, Kyle (University of Cincinnati. College of Education, Criminal Justice, and Human Services; University of Cincinnati; University of Cincinnati. College of Education, Criminal Justice, and Human Services Library, 2013-04-30)