Hack Thon
Hack Thon
Problem: Design a system that detects phishing emails and messages by analyzing
text patterns, suspicious links, and sender behavior.
Expected Output: An AI/ML model or browser extension that can flag potential
phishing attempts and alert users.
Problem: Build a scanner for Android applications that checks for security
vulnerabilities like unsecured data storage, hardcoded keys, or permissions abuse.
Expected Output: A mobile app or tool that scans APK files and reports potential
vulnerabilities.
Problem: Use machine learning to detect anomalies in network traffic that might
indicate a potential cyber attack.
Problem: Develop a tool that monitors the dark web for specific keywords related to
personal information or company data leaks.
Expected Output: An automated crawler or API that alerts users when sensitive
information is found on dark web forums.
Problem: Create a blockchain application to verify and log data changes in real-time
to prevent data tampering.
Problem: Build a browser extension that detects and blocks malware-laden websites
in real time.
Problem: Develop a poster and social media campaign to raise awareness about
common cybersecurity practices (e.g., strong passwords, multi-factor
authentication).
Expected Output: A digital comic with interactive features where users make
choices that affect the storyline, illustrating the consequences of different
cybersecurity practices.
Expected Output: An infographic or dashboard that tells the story of the breach in
an engaging, informative way, with actionable security tips.
12. Social Engineering Awareness Video Series
Problem: Create a series of short videos explaining how social engineering scams
work (e.g., phishing, pretexting) and how people can protect themselves.
Expected Output: Three or four brief, visually engaging videos that simulate
scenarios and give viewers actionable advice on identifying and avoiding scams.
Problem: Develop an app that monitors for data breaches and notifies users if their
information might have been compromised, along with steps to protect themselves.
Expected Output: A mobile app that integrates breach alert APIs and provides
recommendations on password changes, account security, and monitoring.