D
D
Devi12020-05-11 18:38:09
IT education
Devi1, 2020-05-11 18:38:09

The topic of the diploma in information security for ISIT?

I decided to write a diploma in the direction of Information Security and related.
I got very excited about these topics, but I don’t know where to start and which topic is better to choose.
I would be very grateful for help in choosing a topic.

Answer the question

In order to leave comments, you need to log in

2 answer(s)
D
dmshar, 2020-05-11
@dmshar

"Very fired up" is when some topic caught on so much that CAM dug up materials, CAM studied, deepened, "got" all his teachers with questions, read all the forums and yes, ... caught fire for a long time. But then the question - "and advise me the topic" does not arise.
And if it starts with this, then at best "I know what is fashionable", and not "fired up". And it is not clear if it “fired up”, but “I don’t know where to start” (i.e., I haven’t read a single book or article) - then what interested you so much?
The topic should be given to you at the department and agreed upon. What's the point of listening to advice from a forum where no one knows even if you are going to write a bachelor's or master's thesis, what languages-technologies you studied, what interests you have (if any), and what they can help you with, suggest at the department. And most importantly, what (and even more importantly - how) you studied at your university.

K
Karpion, 2020-05-12
@Karpion

As dmshar said - ask in the department. Well, look at the topics of previous works in this area.
I'll try to throw in some interesting ideas:
1) Modern systems are built on the principle of "put more cores into the processor so that they work with shared memory" (many cores in one chip - it's unrealistic to separate them into separate memory). This leads to vulnerabilities like MeltDown.
But what if we build the system as "many separate processors, each processor has few cores, each processor has its own physical memory as a separate module"? How to arrange it so as not to squander performance? How to organize data exchange? In what operating modes is it advisable to use it (hint: for example, microservices; well, or run virtual machines, they are generally isolated)?
2) Analyze this security method:
When creating a process, the system generates an encryption key. With this key, the processor encrypts the contents of the process memory in hardware. Since each process has its own key, it is impossible to access other people's data (you can only fill it with garbage).
What dangers can such technology protect against? In what cases can it not be used?
3) There are several ingredients that have been researched and found to be safe. Can it be argued that when these components are combined, a secure system will result?
In other words: is it possible to prove the security of a system piece by piece by analyzing individual components?
(The problem is similar to the mathematical proof of a theorem.)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question