CSCD 303 Projects

Due: See Dates Below


    Social Issues
  1. Investigate Hacker Group.Investigate a group of hackers. You can choose from an existing group such as Legion of Doom or Masters of Deception, or you can pick regionally. China, Russia, Eastern Europe, Brazil. Find out all you can about them. Motivation: White hats, money, hacktivism, etc. What success so they have? Exploits or web sites. Publications by members. Targets ... who should fear them? What if anything can be done to thwart them.
  2. Social Engineering. Research these techniques to see what is typically done.See how far you can get by doing any or all of the following: Dumpster diving, dressing up as something you are not, calling for information over the phone, shoulder surfing. If doing this at work, ask permission first. If you find actual information, you are on your honor to not abuse this. Report how successful you are. Also, report if there is some defense that could be used against your actions.
  3. User Education. Users in general don't want to be bothered with security. Come up with creative fun ways to educate them. Could be a game, quiz, video ... something fun. Try to treat security as a reward instead of negative as something to avoid. Actually try to create something, test it out and report user's reactions.
  4. Cyber Terrorism. Research this topic and report: How likely this is to happen from others views, your own views. Could even interview people to see if they are afraid of this type of thing taking place. Support your views with research including references.
  5. Laws. There are now many laws on the books. Is there a law that is missing or are the current laws hard to enforce. What laws seem to be unfair or even invasive of innocent folks right.
  6. Suggest a topic of your own
    Technical Topics
  1. Exploit a Vulnerability. Research it. Write an exploit to take advantage of it. Only for classroom use. Not to be released into the wild.
  2. Protect against an Exploit. Maybe inject packets to obfuscate traffic. Hide IP address but still allow the network to work. Or, do some other kind of hiding to fool bad guys. Must This will result in a proof of concept tool
  3. Detect intruders or exploit. How would you figure out if a computer has been compromised. Here ... like intrusion detection, log file analysis or some other way of gathering information in an automated way. Should result in a proof of concept tool.
  4. Create a lab for a class. Must coordinate with me for this to fit in your lab. Research and create a lab for this class. Must write it up, practice it and create questions for the class. You will be in charge of conducting the lab during lab time.
  5. Visualize security. Security is hidden and sometimes hard to visualize. Write something that will make data from security more visible and undestandable. Should be a tool or proof of conept.
  6. Suggest a topic of your own
  1. Turn in your selection of a topic by the due date below. Just a sho12rt couple of paragraphs
  2. Turn in a paper if it is a research topic or a project write-up if a technical or social issue topic. Papers are to be around 5 pages and have references. Project write-up should have screen shots and be 4 pages or so.
  3. Presentation. All projects or papers will have an associated presentation. Must have something visual. Slides and include demo. Think of this as teaching something to the class. More on how to do this later.
  4. If Project has code or survey results, these should be turned in as well
Due Dates

1. February 12th - Decide on a Project or Topic. Turn in a Brief description to me.