Securing the Future: Introduction to My Senior Project on IoT Cybersecurity

Maleea m -

IoT technology - IoT devices

Hello and welcome to my senior project!

My name is Maleea, I’m a senior at BASIS Flagstaff with a passion for cybersecurity.

Before I get into my master plan of becoming a hacker (the legal kind, don’t worry) and what I’m doing to launch my career, here’s a little about me. I moved to Flagstaff in 2021 and have since embraced my passions for hammocking, sports, education, and computer science—the first two offsetting my nerdiness nature in the last two. I love thrifting for new-old clothes, cliff jumping in Winslow, and going to cheap concerts. After graduation, I plan to pursue a Bachelor of Science in Computer Science with a focus on cybersecurity at a yet-to-be-determined university.

Whenever I share my passion for cybersecurity, I am often asked how and why I chose a relatively niche subject. I was first exposed to the works of cybersecurity at the dinner table with both my parents working in tech. However, my personal experiences cemented my commitment. My grandfather fell victim to identity theft, and my aunt’s company suffered a ransomware attack that left thousands unemployed. Witnessing these events firsthand made me realize that cybercrime isn’t just a corporate problem—it affects real people. To deepen my understanding, I took AP Computer Science A, attended a cybersecurity camp at Johns Hopkins, completed a month-long embedded security and hardware hacking program at MIT, and traveled across the Southwest competing in hackathons. Now, I’m pushing my skills further through my senior project.

For my research, I’m diving into the security risks of IoT (Internet of Things) devices—things like smart home assistants, security cameras, and even internet-connected refrigerators. These devices make life easier, but they’re also wide open doors for cyberattacks. Many IoT devices are vulnerable to cyberattacks, which can put personal data and even entire networks at risk. My project aims to identify these vulnerabilities and develop a way to detect and prevent cyberattacks using a secure DNS (Domain Name System) server (like Google). In simpler terms, I’m exploring how hackers could potentially break into these devices and how we can stop them before they do.

To complete this project, I’ll be shadowing a Senior Cybersecurity Engineer at GoDaddy, Mr. Whipple, who specializes in protecting digital systems from cyber threats. Through this internship, I’ll gain hands-on experience in cybersecurity techniques, ethical hacking, and real-world protection strategies. This experience will help me refine my research and develop a working system that could improve the security of everyday devices. If you’d like to learn more about my mentor and the work being done at GoDaddy, you can visit GoDaddy’s website.

I’m pumped to get started, break (and fix) some things, and hopefully stop the robot uprising before it begins. Stay tuned for updates!

Research Proposal MaleeaM

More Posts

Comments:

All viewpoints are welcome but profane, threatening, disrespectful, or harassing comments will not be tolerated and are subject to moderation up to, and including, full deletion.

    mason_t
    Hi Maleea, this project looks like it will have important implications for home cyber security, especially in the world we live in today. Will you be constructing specific code for this project that could be used in real home security situations based on what you learn from shadowing Mr. Whipple? Thanks!
      Maleea_M
      Hello Mason, for my final project, I’ll be working with Mr. Whipple to build a "secured" (for whatever that’s worth these days) DNS server. I plan to connect my personal IoT devices to it as an extra layer of protection. Technically, I could share access—but that would also mean handing over an easy opportunity for someone to hack my devices.
    samantha_g
    Hi Maleea, I'm excited to follow you through this journey of becoming a legal hacker! On that note, do you have a quick explanation on how hackers break into devices in the first place? Thanks!
      Maleea_M
      Hello Sam, there are many ways to break into IoT devices—far too many for comfort—but my project will focus more on exploiting vulnerabilities. One major weakness is that many IoT devices communicate over unencrypted or weakly encrypted networks, making them susceptible to man-in-the-middle (MITM) attacks. Hackers can intercept or manipulate data before it reaches the device, which is why your phone warns you before connecting to public Wi-Fi. Another method is exploiting unpatched vulnerabilities. IoT devices frequently receive updates to add new features or fix security flaws that were overlooked before release. However, flaws can be missed and users can neglect updates, leaving their devices exposed.
    mae_b
    Hey Maleea, your project looks really cool. Being an ethical hacker sounds almost oxymoronic, and I'm excited to see how you make it happen! What kinds of devices or software do you plan to hack? Will you be getting volunteers to offer up their devices or programs for you to hack into?
      Maleea_M
      Hey Mae, ethical hacking is such a fascinating and often overlooked topic! In my next post, I’ll dive deeper into how it’s all around us. For my project, I’ll be focusing on hacking networks (like Wi-Fi), smart home devices (such as smart locks and home security cameras), and any other IoT devices I can get my hands on. I’ll be working with devices I already have at home, ones I can purchase online, and some I’ll be borrowing from my mentor. Additionally, I’ll be using a sandbox environment with simulated IoT devices to test different hacking techniques in a controlled setting. Can't wait to share more soon!!
    eugene_j
    Hey Maleea, This is an extremely interesting topic. Hacking and cybersecurity have long been in conflict, with both sides constantly developing and improving. Do you intend to learn about or research historically significant hacks, data breaches, viruses, exploits, etc.? For example, Stuxnet is a CIA computer worm that tried to stop Iran's nuclear program.

Leave a Reply to mason_t Cancel reply

Your email address will not be published. Required fields are marked *