Mercy College Cybersecurity Program and NSA Center for Academic Excellence
(Mercy Cybersecurity Education Center)
organizes to enhance our student skillsets and cybersecurity leaderships.
The nation's cyber infrastructure depends on well-trained professionals to
strengthen and protect its systems and assets from attacks.
DHS and NSA believes hands-on cyber competitions are a valuable learning method
for all students, regardless of skill level.
Mercy Cybersecurity Program and Mercy Center for Cybersecurity Education
has organized this Cyber Skill Competition since 2015.
Learning: Each of the topics listed below will be guided and instructed by Dr. John Yoon.
Collaboration: Among the students with the same area(s) of research interest,
there will be a collaboration to define problems, design research plans and to implement to
prove their work.
Competition: If there is a common war area among the student works, a direct competition will
be performed. If not, the robustness, the completeness and the soundness of their implementation
will be considered.
Topic in this year
This project proposes a network infrastructure that protects the IoT devices from outside attacks and identifies all network packets between IoT devices and outside Internet world. This proposed network infrastructure sits inside the home or company router.
Instead of relying on student lab on the college production network systems,
this project gives opportunities of using cost-reasonable devices
to build the similar effectiveness of network configuration.
The network configuration consists of 4 hosts:
the first host for network configuration and three client host platform.
The network server will have secure shell services, dns services, wireless Internet access point, dynamic host configuration protocol, firewall rules, etc.
The client host platforms are one typical Linux server, one Kali Linux, and another Android Linux.
Each client can communicate wirelessly the network server, which is connected the network switch.
Client hosts can talk with each other wirelessly.
All hosts can therefore transfer and receive the Internet services.
Once linux hosts and network configurations are ready to serve,
the students will be able to practice the following cybersecurity issues:
Each student who has installed and started up the four hosts can practice the skills of network and host attacks and its defense skills individually.
The students who has gained the skills of attack and defense on its own systems can attack the network systems of others.
This project is supported in part by Mercy College Faculty Senate Micro-Grant, (PI: Dr. John Yoon),
organization code, 102013, and individual activity code: MG1930.
Your input will be very important to the planning.
Please, take a few minutes to answer the following 3 questions.