For COMSEC2, the project of the students is to simulate and existing vulnerability (it can be application, network etc.) and create an analysis based from research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the future.

For instance, there Vulnerability X works on Platform Y.1. Computers need to update to Platform Y.2 to become protected. However, a lot of computers didn’t update because of compatibility issues. What will happen to these “unpatched computers?” How many of them are found in critical data centers etc. Will Vulnerability X evolve into a more complex and more dangerous vulnerability?

Sample works:

Android Rooting Vulnerability – Android Rooting

iOs Jailbreak Vulnerability – iOS Jailbreak

Heartbleed Vulnerability – Heartbleed

Shellshock Vulnerability – Shellshock Vulnerability

Remote Desktop Protocol Vulnerability – RDP

Adobe Flash Vulnerability – Adobe Flash

 

 

Leave a Reply