10:15-11:45 AM Oral Competition Presentations
B4: Computer Science / Mathematics and Statistics / Cyber Security and Information Assurance (Mulder Hall 220)
10:15-11:45 AM Oral Competition Presentations
B4: Computer Science / Mathematics and Statistics / Cyber Security and Information Assurance (Mulder Hall 220)
10:15-10:27 Improving student understanding of IP subnetting through use of a web-based instruction tool
Abhishek Amgain (ULM)
Abhishek Amgain, Paul Wiedemeier
IP subnetting is a computer networking activity that breaks a large block of IP addresses into smaller blocks to create broadcast domains and is fundamental to understanding the organization of today’s Internet. College students are often introduced to this topic through enrollment in a data communications or computer networking class.
The process of IP subnetting is fairly straightforward, and many methods currently exist to help students learn how to subnet IP address blocks. Regardless of the method used, proficiency in IP subnetting is attained through consistent practice, which is often accomplished by working through textbook problems or by answering computer-generated questions.
Many web-based tools are available to perform IP subnetting. Generally called IP subnet calculators, these tools generate the characteristics of a broadcast domain once a user enters an IP address and a subnet mask IP address or a CIDR value. These tools exist to assist computer networking professionals when creating new broadcast domains. They are of some use in helping students learn about the basic characteristics of broadcast domains.
A small number of web-based tools exist that allow students to practice IP subnetting. Of those identified, only a few provide feedback when students make mistakes. In this presentation, we will discuss a web-based tool we built to help students practice IP subnetting and provide them with needed feedback when they make mistakes.
10:30-10:42 Review of Penetration Testing Techniques, their Strengths and Weaknesses
Dennis Telemacque (GSU)
Dennis Telemacque
In an era where technological advancements are rapidly transforming our lives—from smart homes and IoT devices to cloud-based infrastructure—the threat landscape is equally evolving. Cyber attackers are continuously honing their skills, making it imperative to adopt robust security measures. Penetration Testing, or pen testing, emerges as a critical defense mechanism. This security testing method simulates real-world cyberattacks to identify and address vulnerabilities within a system before malicious actors can exploit them. The benefits of pen testing are manifold, including enhanced protection of security infrastructure, compliance with regulatory standards, and improved incident response preparedness. However, challenges such as the diversity of IoT devices, varying protocols, and the complexity of interconnected systems can complicate the process. Additionally, emerging technologies like artificial intelligence and machine learning are being integrated into pen testing to automate vulnerability detection and improve accuracy. As cyber threats grow more sophisticated, pen testing remains an indispensable tool in safeguarding our increasingly digital world.