0% found this document useful (0 votes)
14 views4 pages

Hack Thon

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views4 pages

Hack Thon

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Phishing Detection System

Problem: Design a system that detects phishing emails and messages by analyzing
text patterns, suspicious links, and sender behavior.

Expected Output: An AI/ML model or browser extension that can flag potential
phishing attempts and alert users.

2. Mobile Application Vulnerability Scanner

Problem: Build a scanner for Android applications that checks for security
vulnerabilities like unsecured data storage, hardcoded keys, or permissions abuse.

Expected Output: A mobile app or tool that scans APK files and reports potential
vulnerabilities.

3. Passwordless Authentication System

Problem: Implement a passwordless authentication system using biometric, email,


or SMS-based login to increase security and user experience.

Expected Output: A web or mobile prototype demonstrating passwordless


authentication.

4. Secure File Sharing Platform

Problem: Design a secure file-sharing platform that uses end-to-end encryption to


ensure data privacy and integrity during transfer.
Expected Output: A web-based application or API that allows users to upload and
securely share files with others.

5. Machine Learning for Intrusion Detection

Problem: Use machine learning to detect anomalies in network traffic that might
indicate a potential cyber attack.

Expected Output: A trained ML model or dashboard that shows real-time threat


detection with network data logs.

6. Dark Web Monitoring Tool

Problem: Develop a tool that monitors the dark web for specific keywords related to
personal information or company data leaks.

Expected Output: An automated crawler or API that alerts users when sensitive
information is found on dark web forums.

7. Blockchain-Based Data Integrity System

Problem: Create a blockchain application to verify and log data changes in real-time
to prevent data tampering.

Expected Output: A blockchain-based proof-of-concept for tracking changes in a


dataset, ensuring integrity.
8. Anti-Malware Browser Extension

Problem: Build a browser extension that detects and blocks malware-laden websites
in real time.

Expected Output: A working browser extension that flags or blocks access to


malicious sites.

9. Cybersecurity Poster & Social Media Campaign

Problem: Develop a poster and social media campaign to raise awareness about
common cybersecurity practices (e.g., strong passwords, multi-factor
authentication).

Expected Output: Visually engaging posters, graphics, or animations suitable for


social media, encouraging users to adopt safe online practices.
10. Interactive Cybersecurity Comics

Problem: Develop a comic-style story that presents different cybersecurity


scenarios, teaching users about threats like malware or ransomware in a relatable
way.

Expected Output: A digital comic with interactive features where users make
choices that affect the storyline, illustrating the consequences of different
cybersecurity practices.

11. Visualizing Data Breaches

Problem: Develop a creative infographic or interactive visualization that explains a


recent major data breach, including how it happened, what was compromised, and
how users can protect themselves.

Expected Output: An infographic or dashboard that tells the story of the breach in
an engaging, informative way, with actionable security tips.
12. Social Engineering Awareness Video Series

Problem: Create a series of short videos explaining how social engineering scams
work (e.g., phishing, pretexting) and how people can protect themselves.

Expected Output: Three or four brief, visually engaging videos that simulate
scenarios and give viewers actionable advice on identifying and avoiding scams.

13. Data Breach Alert System for Mobile

Problem: Develop an app that monitors for data breaches and notifies users if their
information might have been compromised, along with steps to protect themselves.

Expected Output: A mobile app that integrates breach alert APIs and provides
recommendations on password changes, account security, and monitoring.

You might also like