INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type.

Slides:



Advertisements
Similar presentations
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Advertisements

CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Advanced Topics in Next- Generation Wireless Networks Qian Zhang Department of Computer Science HKUST.
Introduction to Computers. Michael R. Izzo
Welcome to CS 450 Internet Security: A Measurement-based Approach.
CS 898N Advanced World Wide Web Technologies Lecture 1: Introduction Chin-Chih Chang
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 Introduction to CPSC Introduction to CPSC Information Technology.
Business Technology Trends Technology WWW : –Intranet, Extranet –E-Commerce Infrastructure –On-line payment, billing, account management, etc. –Customer.
Welcome 05G11389 Management Information Systems Jonathan D. Wareham
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
IS Doctoral Seminar in Systems and Technology Information Assurance James Joshi August 31, 2011.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Web-based E-commerce Architecture
Lecture 0 Anish Arora CSE 6333 Introduction to Distributed Computing.
AP Computer Science Mr. Locascio. 1 st & 2 nd Day Topics Seating Course Expectations Handout Textbooks Website Homework/Quizzes/Tests/Grading Effort &
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
1/19/2010Cyber Security Spring 2010 Introduction to Cyber Security Lab CS460 Susan Hinrichs Spring 2010.
CSE 534: Advanced Computer Networks
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
5 PR Praktikum aus Informatik Gabriele Kotsis Summer Term 2009.
1 Dr Paula Fonseca Lecturer Phone apps, Computer Software EBU4201: Introductory Java Programming (JP) EBU6042: Advanced Network Programming (JP) ECS501U:
Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Why You Should All Become Computer Engineers ECE 200 (Fall 2015) Saurabh Bagchi School of Electrical and Computer Engineering Purdue University.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
Information Security Dashboard Senior Design Spring 2008 Brian Rappach.
Advanced Topics in Computer Networks (Fall 2005) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
Sensor Networks (Spring 2004) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Welcome 06M11389 Management Information Systems Jonathan D. Wareham
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
QM/BUPT Joint Programme Final Year Projects Dr Jonathan Loo
KAIST CS710 Topics in Computational Architecture Wireless Networks and Security : Issues, Challenges and Research Trends Syllabus Network &
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
1 Project Implementation Reasonable sophistication Up to 3 people maximum Survey/Analysis type paper Comparative/tradeoff studies Current trends, challenges,
Chapter 21 Successfully Implementing The Information System.
Data and Applications Security
Proposal for Term Project Information Security, Fall 2016
Introduction to Information Security
Introduction to Information Security
Mobile Ad hoc Networks (Spring 2003)
Data and Applications Security Developments and Directions
Data and Applications Security
Phone apps, Computer Software and Multimedia
Programming Games Mouse position. Examples. Review for final quiz.
Project Implementation Survey type paper New idea/research ??
ISMS Information Security Management System
Pima Medical Institute Online Education
Information Technology Pathway Updates
Pima Medical Institute Online Education
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
CS533 Concepts of Operating Systems Class 1
Data and Applications Security
Data and Applications Security
Presentation transcript:

INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type paper Survey type paper  Comparative/tradeoff studies  Current trends, challenges, possible approaches  One person!  Number of references should be adequate (depends on area)  No introductory stuff! New idea/research ?? New idea/research ?? Others: Case studies?? Others: Case studies??

INFSCI 2935: Introduction to Computer Security2 Project Topics (not limited to these only!)  XML security  Implementation of Access Control and Authentication  Cryptographic protocols  Database security  Ad hoc network security  Cyber Security  Privacy  Web service security / Java security  Intrusion detection  Auditing Systems  Security and ethics/Usability/Economics  Smartcards and standards for smartcards  E-commerce security (secure transaction)  Multimedia security  Security in wireless/mobile environments  Case studies from a specific domain Opportunity with the CSSD Software metrics Semantic Event Manager Mapping wireless access points in University (State of secuirty)

INFSCI 2935: Introduction to Computer Security3 Project Schedule Proposal (by Nov 18) Proposal (by Nov 18)  Up to 2 pages (identify a group)  State the goals  State the significance Final project report Final project report  By the last day of the semester  Article format, or conference format Each person should state his contribution  Implementation projects should demonstrate to TA and/or me