Programme: BSC Computer Security and Forensics
Academic Year: 4th Year Semester: 2
Course: 3422 PROJECT Lecturer: Prof. Anthony J. Rodrigues
S.NO | STUDENT NAME | PROJECT TITLE | SUPERVISOR | ABSTRACT | FULL TEXT |
1. | Felix Otieno Odhiambo | 1. Secure Crowd funding mobile money system | Prof. A. J. Rodrigues | Download | Download |
2. | Frank Machoka | ||||
3. | Kirimi Muchiri K | 2. Accounts Management and Control System | Dr. S. Ogara | Download | Download |
4. | Ndeto Martin | ||||
5. | Angudi Janet Julia M. | 3. Enhancing network security in Laboratory environment | Mr. P. Abuonji | Download | Download |
6. | Oliver Nyaswenta | 4. Cyber crime in Kenya: Legal Issues | Prof. A. J. Rodrigues | Download | Download |
7. | Ray Opiyo Ochieng | 5. Cybercrime trends in Kenya Organizations | Mr. P. Abuonji | Download | Download |
8. | Philip Kipkirui | 6. A Web-based Blood drive system | Mr. S. Olala | Download | Download |
9. | Wafula Angelah | ||||
10. | Ahmed M. Abdillahi | 7. Secure data transfer over the internet using steganography | Mr. C. Yoga | Download | Download |
11. | Collins Ouma | 8. Employ Me Job Portal | Dr. S. Abeka | Download | Download |
12. | Derrick Okoth | ||||
13. | Dennis Ruiru | 9. Data exfiltration in organizations covert operations | Dr. S. Ogara | Download | Download |
14. | Joseph Gitau | 10. Automated Logs analysis using AI | Prof. A. J. Rodrigues | Download | Download |
15. | Naomi Mariga | 11. Message Encryption Application | Dr. S. Ogara | Download | Download |
16. | Fridah Muthio | 12. Bandwidth Management in Small Organizations | Mr. P. Abuonji | Download | Download |
17. | Kimutai Victor | ||||
18. | Kiplagat Linus | 13. Web-based student Health Management Systems | Mr. S. Olala | Download | Download |
19. | Cavendish Wachera | 14. Ransomware mitigation: File Integrity Monitoring | Prof. A. J. Rodrigues | Download | Download |
20. | Devilyn M. Mudaki | 15. Audio Steganography Algotharim for Effective Data Security | Mr. J. Agola | Download | Download |
21. | Samson Njoroge | ||||
22. | Njoroge Macharia Albert | 16. Keystrokes Dynamics in Enhancing Password Authentication | Prof. A. J. Rodrigues | Download | Download |
23. | Nickron Kibunei Cheruiyot | ||||
24. | Collins Bunde | 17. Mitigating uncensored social media utility risks in Kenyan Enterprise | Dr. S. Liyala | Download | Download |
25. | Onyango Edward K. | ||||
26. | Onyinye Juliet Mercy A. | 18. Enhancing Network Access Control in Colleges and Universities | Mr. C. Yoga | Download | Download |
27. | Beline Ogutu | ||||
28. | Wanjiru Rosemary M. | 19. Multi-node manager | Mr. J. Agola | Download | Download |
29. | Njoroge Einstein | ||||
30. | Kamita Paul Kinuthia | 20. Syslog Server | Mr. P. Abuonji | Download | Download |
31. | Odhiambo Rodgers | ||||
32. | Michael Gitau | 21. Open Source IDS for a resource contained setup | Mr. C. Yoga | Download | Download |
33. | Rose Wambui | ||||
34. | Ngari Eustus M. | 22. SSL/TLS Certificate Tracking in Revealing Forged Certification | Mr. P. Abuonji | Download | Download |
35. | John Mwangi | 23. Message Encryption Application for Android | Mr. J. Agola | Download | Download |
36. | Lilian Mwende | ||||
37. | Kelvin Njire | 24. Offensive Network Security | Mr. C. Yoga | Download | Download |
38. | Samuel Kinuthia N. | 25. Security vulnerability in dropbox data exchange & cloud storage | Mr. J. Agola | Download | Download |
39. | Claudio Dulo | 26. Student Security Alert System | Prof. A. J. Rodrigues | Download | Download |
40. | Evans Chumba | 27. Automated Police Record Management System | Dr. S. Ogara | Download | Download |
41. | Ephantus Gitau |