Class Presentation

Project Objectives

For this assignment, you will be providing an oral presentation to your peers in the Computer Network Security class.

Proposal

First, pick a topic that you would like to learn about in depth. The topic must be related to the broader field of computer security and have been in the news in 2022-2025. The topic should be technical in nature. The completed presentation should be 15 minutes in length and cover content at a technical level appropriate for students majoring in computer science or computer engineering.

Tip: The Security and Privacy News page aggregates current events from a variety of sources.

Tip: The SANS NewsBites newsletters are an excellent source of news on security. Just pick an archive issue at random, and you're almost guaranteed to find an interesting presentation topic within. Be sure to subscribe to stay current in the future!

Tip: The Security Now Podcast archives are also an excellent source of news on security. Full archives and detailed show notes are available.

Once you have picked your topic, write a proposal with the following information:

  • The title of your presentation
  • A 2 paragraph executive summary of the topic you intend to present on
  • At least 3 links providing technical reference material on the selected topic

Presentation

After your project proposal is approved, read more about your chosen topic and understand it in detail. Then, prepare your presentation. You should provide enough detail and background information such that your peers (other students in the class) are able to understand and appreciate your presentation. The presentation length should be 15 minutes. You should provide 7-9 PowerPoint slides to convey useful figures and diagrams. Some of your peers are visual learners, not auditory learners, and will better appreciate your presentation by viewing a figure instead of listening to your words.

Recorded Video

Submit a video of your oral presentation with the supporting slides.

For the recorded presentation, don't use the most rudimentary method - pointing your phone camera vaguely towards your laptop screen and hitting record. There are myriad screen recorder applications that, combined with a microphone, will produce high quality visuals and audio. Or if you want to get fancy, something like Open Broadcaster Software Studio has a lot of power.

Peer Review

Every presentation will be reviewed by 3 of your classmates (randomly assigned) through a Canvas assignment that is due after presentations are submitted. Peer reviews are anonymous.

Selected Topics

Current Topics - 2025

Name Title
Brendon Amino D-Link's 9.8 Critical Vulnerability: Upgrade or Get Hacked
Mari Anderson Using the physical properties of computers to get information from otherwise disconnected computers
Aden Boynton PlugX Malware
Christopher Chew Social Engineering Attacks: Hackers Manipulating Natural Human Behavior (MGM 2023 cyber attack)
Juan Cuevas Security Assessment of Core LTE/5G infrastructure (aka "RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces")
Sean Dang Theft of Snowflake Customer Data
Yanjun Deng The Evolution, Impact, and Technical Analysis of DDOS Attacks: Threats and Countermeasures (in 2025)
Zhao Do Juice Jacking - Compromised Cables
Lance Elliott MOVEit Supply Chain Attack
Bhanu Kovidh Epuri USB-Based Attacks: How Malicious Devices Bypass Security Measures
Qazi Haad Flipper Zero vs. The Modern Internet: How Hardware Hacking Threatens Network Security
Nicholas Henricksen RCE Attacks in Gaming
Angel Juarez How the Okta 2023 Breach Exposed MFA Weaknesses and Session Token Risks
Smit Vrajeshkumar Khakhi ...r...
Arsalan Khojazada Insomniac Games Data Breach 2023 (Rhysida)
Eojin Kim The Evolution of RICOCHET Anti-Cheat in Call of Duty: Warzone
Junah Kim Pentesting Hardware/Gadgets (LAN Turtle / Pineapple / FlipperZero)
Hongchan Li AI in Cybersecurity: Automating Threat Detection and Defense with Machine Learning
Fabian Lopez Twitter's 2022 Data Breach: Lessons in Securing User Data
Junyuan Mi Deepfake Attacks: The Rise of AI-Driven Cyber Threats
Daniel Ming Telefonica Data Breach
Emily Montoya AI-Powered Cyberattacks
Shabbir Murtaza Blue Screen of death -- CrowdStrike
Meelaud Nadem How 23andMe might've cost you more than just 50 bucks.
Benson Nguyen The Rise of AI-Driven Cyber Threats: Adversarial Attacks and Defenses
Han Nguyen Post-Quantum Cryptography: Preparing for Quantum Threat
Huu Phuoc Nguyen Cloud Security and Understanding the Shared Responsibility Model
Nathan Pader United Healthcare Ransomware Attack
Dillon Patel Cisco Suffers Cyber Attack By UNC2447, Lapsus$, & Yanluowang
Evan Phoukong Analysis of Supply Chain Attack that compromised 3CX
Ajayveer Punia US Treasury Hacked
Agustin Rodriguez Jaurgeui LLMs and Cyber Crime
Logan Salemme DeepSeek R1: Cybersecurity Risks, Jailbreaking, and Geopolitical Implications of Open-Source AI Models
Ekam Samra Quantum Computing’s effect on Cybersecurity
Rocco Seddiqi Cisco ASA XSS Vulnerability
Ayesha Shoaib Shamsi MOVEit Data Breach
Shoji Shinkawa Google's OAuth Vulnerability
Salvador Solis Rosillo DeepSeek R1 Security Vulnerabilities
Nupur Sompura Cybercrime Organization Pre-Infected Android Devices
Minghao Sun The Rise of Discord Image Scams: Exploiting Trust in Online Communities
Rei Thao Built-In Threats: Pre-Installed Malware in Android Phones and Smart TVs
Minh Huy Tran
Tyler Truong ...r...
Benjamin Wiegand CUPS - the problem when nobody cares about printers
Honglin Yao The 2022 Uber Data Breach – A Case Study in Social Engineering Attacks
Siyue You Applebot Data Scraping and AI Training: Privacy Rights vs. Technological Advancement
Guanru Zhao Breaking HTTP/2: The Mechanics Behind the 398M RPS DDoS Attack on Google

Past Topics - 2024

Title
2 Data Breaches, Less Than 6 Months - LastPass 2022 Data Breaches
The cheating epidemic in Escape from Tarkov
Unveiling the Art of Concealment: Steganography Techniques and Applications in Modern Cybersecurity
Insomniac Games ransomware (Rhysida)
Unveiling the Twitter Data Breach of 2022
Blockchain and The Cybersecurity of Cryptocurrency
There’s a Pegasus in your Phone
MGM Resort Ransomware Attack (2023)
A Cyber Attack on MGM Resorts
British Library Attacks (Rhysida)
23andMe, The Importance of Securing Old Data
Social Engineering: The Unintentional Enemy Within
ESXiArgs Exposed: A Deep Dive into the 2022 Server Security Ransomware Threat
Microsoft Summer 2023 Data Breach
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Discord Image Scams
Sandworm: Cyber Terrorism of the Kremlin
Securing the Lifelines: A Deep Dive into Ransomware Attacks on Critical Infrastructure
Deepfakes
AI-Generated Phishing Attacks
The Midnight Blizzard
Zero-Trust Architecture: Enhancing Cybersecurity Resilience
Quantum Cryptography
Digital Firepower: Cyberwar Between Ukraine and Russia
The use of digital evidence on smartphones in criminal investigations
Digital Driver’s License
Alternative exploitation of Log4J
Jenkins Vulnerabilities (CVE-2024-23897 and CVE-2024-23898)
The Quantum Cryptography Issue
Mitigating the 2023 Mailchimp Data Breach
Dollar Tree data breach
Direct Memory Access Attacks: Exploiting Vulnerabilities with MemProcFS and PCILeech

Past Topics - 2023

Title
March 2022 NVIDIA Data Breach (LAPSUS$)
ESXiArgs (ESXi ransomware)
Malicious QR Codes
ProxyLogon: A Backdoor on Microsoft Exchange Server
John Deere / Right to Repair
Cuba Ransomware attacks / Hancitor malware
Creating a Secure Password Policy for an Organization
The Impact of Supply Chain Cyber Attacks: A closer look at “NotPetya”
Honeypots
ANoM backdoor app used to arrest criminals
Password Encryption fail, LastPass Data Breach 2022
The Dangers of Deepfakes
SH1MMER - Chromebook Un-enrollment Exploit
Security Issues with the Internet of things Devices
Apache Log4j Vulnerability
LockBit 3.0 ransomware
Is private browsing actually private?
There’s a Pegasus in your Phone
Twitter data breach (2022)
Cross Site Request Forgery - Azure
Dangers of iOS vulnerabilities (2022 Zero-Day Vulns)
T-Mobile Data Breach (2021,2022)
Uber data breach (2022)

Past Topics - 2022

Title
CVE-2021-44228
Log4j
Deep Fakes
Acer Data Breach (REvil attack / Desorden attack)
Conti Ransomware Attack on Ireland’s Public Health System
Polkit Exploit (CVE-2021-4034) A.K.A. Pwnkit
Use-after-free in Google Chrome could lead to code execution
Staying Ahead of Quantum Computing
UpdateAgent second-stage payload variants
Blockchain "Bridge" Exploited for $325 million
There’s a Pegasus in your phone
Blockchain and The Cybersecurity of Cryptocurrency
Malicious QR Codes
Emotet-The deadliest trojan
The security of NFTs
Ring Doorbells
Medusa & Flubot: Android banking Trojans
Adobe Acrobat Reader Out of Bounds Read Leads to Privileged Hacker
Clop Ransomware
Project Zero (NSO Zero-click iMessage Exploit)
Microsoft Exchange Server Hacking (ProxyLogon)
Colonial Pipeline (DarkSide ransomware)
Effect of COVID-19 on WFH and awareness of cybersecurity
Vulnerabilities in DNS software (DNSpooq cache poisoning)

Grading

Proposal (10 pts)

  • Executive summary of topic - 5 pts
  • Reference links with technical information - 5 pts

Final Presentation (80 pts)

  • Communication Effectiveness - 30 pts
    • Sequencing of Information
    • Effectiveness
    • Use of Graphics
    • Text - Font choice and formatting
    • Spelling and Grammar
    • Delivery
  • Technical Content - 50 pts
    • Technical content accuracy
    • Technical content depth

Peer Review (10 pts)

  • Completion of 3 peer reviews

Submission

Submit all files to the Canvas CMS site.

There will be separate Canvas assignments for:

  1. Proposal
  2. Presentation Video (link or .mp4 upload)
  3. Presentation Slides (PDF or PPTX)