Class Presentation
Project Objectives
For this assignment, you will be providing an oral presentation to your peers in the Computer Network Security class.
Proposal
First, pick a topic that you would like to learn about in depth. The topic must be related to the broader field of computer security and have been in the news in 2022, 2023, or 2024. The topic should be technical in nature. The completed presentation should be 15 minutes in length and cover content at a technical level appropriate for students majoring in computer science or computer engineering.
Tip: The Security and Privacy News page aggregates current events from a variety of sources.
Tip: The SANS NewsBites newsletters are an excellent source of news on security. Just pick an archive issue at random, and you're almost guaranteed to find an interesting presentation topic within. Be sure to subscribe to stay current in the future!
Tip: The Security Now Podcast archives are also an excellent source of news on security. Full archives and detailed show notes are available.
Once you have picked your topic, write a proposal with the following information:
- The title of your presentation
- A 2 paragraph executive summary of the topic you intend to present on
- At least 3 links providing technical reference material on the selected topic
Presentation
After your project proposal is approved, read more about your chosen topic and understand it in detail. Then, prepare your presentation. You should provide enough detail and background information such that your peers (other students in the class) are able to understand and appreciate your presentation. The presentation length should be 15 minutes. You should provide 7-9 PowerPoint slides to convey useful figures and diagrams. Some of your peers are visual learners, not auditory learners, and will better appreciate your presentation by viewing a figure instead of listening to your words.
Recorded Video
Submit a video of your oral presentation with the supporting slides.
For the recorded presentation, don't use the most rudimentary method - pointing your phone camera vaguely towards your laptop screen and hitting record. There are myriad screen recorder applications that, combined with a microphone, will produce high quality visuals and audio. Or if you want to get fancy, something like Open Broadcaster Software Studio has a lot of power.
Peer Review
Every presentation will be reviewed by 3 of your classmates (randomly assigned) through a Canvas assignment that is due after presentations are submitted. Peer reviews are anonymous.
Selected Topics
Current Topics - 2024
Name | Title |
---|---|
Jacob Bejarano | 2 Data Breaches, Less Than 6 Months - LastPass 2022 Data Breaches |
Jerry Benavides | The cheating epidemic in Escape from Tarkov |
Muhammad Moiz Bukhari | Unveiling the Art of Concealment: Steganography Techniques and Applications in Modern Cybersecurity |
Kyro Carolino | Insomniac Games ransomware (Rhysida) |
Porter Carrithers | Unveiling the Twitter Data Breach of 2022 |
Emily Chacon | Blockchain and The Cybersecurity of Cryptocurrency |
Omar Comparan | There’s a Pegasus in your Phone |
Marcos Cruz | MGM Resort Ransomware Attack (2023) |
Chunjingwen Cui | A Cyber Attack on MGM Resorts |
Jeffrey Deng | |
Harvivek Dhindsa | British Library Attacks (Rhysida) |
John Gangano | |
Geoffrey Gonzales | 23andMe, The Importance of Securing Old Data |
Santi Gutierrez | Social Engineering: The Unintentional Enemy Within |
Ramis Hasanli | ESXiArgs Exposed: A Deep Dive into the 2022 Server Security Ransomware Threat |
Hunter Hawley | Microsoft Summer 2023 Data Breach |
Leah Hernandez | Cybercriminals Are Selling Access to Chinese Surveillance Cameras |
Channen Hill | Discord Image Scams |
Riley Houde | Sandworm: Cyber Terrorism of the Kremlin |
Soojal Kumar | Securing the Lifelines: A Deep Dive into Ransomware Attacks on Critical Infrastructure |
Ralph Lorenzo | Deepfakes |
Jingyi Ma | AI-Generated Phishing Attacks |
Talissa Montez | The Midnight Blizzard |
Samuel Morikang | Zero-Trust Architecture: Enhancing Cybersecurity Resilience |
Shahzaib Nadeem | Quantum Cryptography |
Keven Nguyen | Digital Firepower: Cyberwar Between Ukraine and Russia |
Anna Noto | The use of digital evidence on smartphones in criminal investigations |
Felix Pitts | Digital Driver’s License |
Zachary Reed | Alternative exploitation of Log4J |
Adeliia Salieva | Jenkins Vulnerabilities (CVE-2024-23897 and CVE-2024-23898) |
Sevastian Schlau | The Quantum Cryptography Issue |
Arpit Kumar Singh | Mitigating the 2023 Mailchimp Data Breach |
Matthew Solorio | Dollar Tree data breach |
Charles Thomas | Direct Memory Access Attacks: Exploiting Vulnerabilities with MemProcFS and PCILeech |
Vincent Von Tersch |
Past Topics - 2023
Title |
---|
March 2022 NVIDIA Data Breach (LAPSUS$) |
ESXiArgs (ESXi ransomware) |
Malicious QR Codes |
ProxyLogon: A Backdoor on Microsoft Exchange Server |
John Deere / Right to Repair |
Cuba Ransomware attacks / Hancitor malware |
Creating a Secure Password Policy for an Organization |
The Impact of Supply Chain Cyber Attacks: A closer look at “NotPetya” |
Honeypots |
ANoM backdoor app used to arrest criminals |
Password Encryption fail, LastPass Data Breach 2022 |
The Dangers of Deepfakes |
SH1MMER - Chromebook Un-enrollment Exploit |
Security Issues with the Internet of things Devices |
Apache Log4j Vulnerability |
LockBit 3.0 ransomware |
Is private browsing actually private? |
There’s a Pegasus in your Phone |
Twitter data breach (2022) |
Cross Site Request Forgery - Azure |
Dangers of iOS vulnerabilities (2022 Zero-Day Vulns) |
T-Mobile Data Breach (2021,2022) |
Uber data breach (2022) |
Past Topics - 2022
Title |
---|
CVE-2021-44228 |
Log4j |
Deep Fakes |
Acer Data Breach (REvil attack / Desorden attack) |
Conti Ransomware Attack on Ireland’s Public Health System |
Polkit Exploit (CVE-2021-4034) A.K.A. Pwnkit |
Use-after-free in Google Chrome could lead to code execution |
Staying Ahead of Quantum Computing |
UpdateAgent second-stage payload variants |
Blockchain "Bridge" Exploited for $325 million |
There’s a Pegasus in your phone |
Blockchain and The Cybersecurity of Cryptocurrency |
Malicious QR Codes |
Emotet-The deadliest trojan |
The security of NFTs |
Ring Doorbells |
Medusa & Flubot: Android banking Trojans |
Adobe Acrobat Reader Out of Bounds Read Leads to Privileged Hacker |
Clop Ransomware |
Project Zero (NSO Zero-click iMessage Exploit) |
Microsoft Exchange Server Hacking (ProxyLogon) |
Colonial Pipeline (DarkSide ransomware) |
Effect of COVID-19 on WFH and awareness of cybersecurity |
Vulnerabilities in DNS software (DNSpooq cache poisoning) |
Grading
Proposal (10 pts)
- Executive summary of topic - 5 pts
- Reference links with technical information - 5 pts
Final Presentation (80 pts)
- Communication Effectiveness - 30 pts
- Sequencing of Information
- Effectiveness
- Use of Graphics
- Text - Font choice and formatting
- Spelling and Grammar
- Delivery
- Technical Content - 50 pts
- Technical content accuracy
- Technical content depth
Peer Review (10 pts)
- Completion of 3 peer reviews
Submission
Submit all files to the Canvas CMS site.
There will be separate Canvas assignments for:
- Proposal
- Presentation Video (link or .mp4 upload)
- Presentation Slides (PDF or PPTX)