Data With Integrity

dc.access.optionOpen Access
dc.contributor.advisorPickard, John
dc.contributor.authorThorne, Trek E
dc.contributor.departmentTechnology Systems
dc.date.accessioned2023-07-13T16:41:29Z
dc.date.available2023-07-13T16:41:29Z
dc.date.created2023-05
dc.date.issued2023-04-26
dc.date.submittedMay 2023
dc.date.updated2023-06-30T13:44:52Z
dc.degree.departmentTechnology Systems
dc.degree.disciplineInformation and Computer Technology
dc.degree.grantorEast Carolina University
dc.degree.levelUndergraduate
dc.degree.nameBS
dc.description.abstractCybersecurity is a fundamental piece of any business. No matter how big or small your business is, neglecting to fix your business's vulnerabilities could have devastating effects on your profits, effectiveness, and success. Unfortunately, small businesses tend to neglect this need in their businesses and only view cybersecurity as a ‘means to an end’. I have partnered with Integrity Church with the mission of finding and fixing most (if not all) of their information technology vulnerabilities. The goal is to not only make sure that Integrity Church is secure from both external and internal threat actors, but also make their organization run more efficiently. I have been working with four other information and computer technology students throughout this endeavor. The project deliverables are first, running a vulnerability scanner on their network to spot potential vulnerabilities. Second, create a policy for their on-premise cameras that will mitigate as much risk as possible with resources available. Third, setup a network-attached storage (NAS) that will be able to store the cameras’ video. Fourth, fix their auditorium access point (AP) that is experiencing consistent below-expected levels of throughput. Fifth, give their employees a presentation on best practices and on some of the most common threats that bad actors will use on organizations. By the end of this project, I have gained a greater understanding for how information technology is put into practical use within small businesses and gained familiarity with the tools we were using to accomplish the above tasks.
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10342/12954
dc.publisherEast Carolina University
dc.subjectCapstone
dc.subjectCybersecurity
dc.subjectPerformance
dc.titleData With Integrity
dc.typeHonors Thesis
dc.type.materialtext

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
THORNE-HONORSTHESIS-2023.pdf
Size:
99.69 KB
Format:
Adobe Portable Document Format

Collections