L
L
Labunsky2015-09-24 13:23:43
IT education
Labunsky, 2015-09-24 13:23:43

Topic for a term paper in the field of information security?

Good day
For term paper it was required to come up with a topic with a clear practical application in the field of information security. At first, I sinned against steganography, but in it, for the most part, everything has long been invented and there is nothing to peck at.
In this regard, the question is: what current areas in this area can be chosen for term paper?

Answer the question

In order to leave comments, you need to log in

6 answer(s)
V
Vladimir Martyanov, 2015-09-24
@vilgeforce

Factorization in integers. Then he will go to a diploma, to doctoral and candidate degrees, to other prestigious titles and awards. It just won't work :-)

D
Dmitry Kovalsky, 2015-09-24
@dmitryKovalskiy

Number, examples and possible consequences of vulnerabilities on the official website of the institute/faculty

M
Maxim Kuznetsov, 2015-09-24
@max-kuznetsov

A promising direction now is PKI. The private key infrastructure is now penetrating both government offices and medium-sized businesses. In large business, it is already impossible without it.
Take some company (well, if it's real) and work on the PKI topic for it. There is nowhere more practical. And there is a perspective. If you do everything right, the job will be a good recommendation for you when applying for a job.
But keep in mind that this work is serious, you will have to sweat.

T
Timur, 2015-09-24
@faserschreiber

Eh-eh-eh. Where to start something?
What is your level of knowledge? What should be the result of the course? A computer program (web service) that does something that is somehow related to information security?
The first thing that comes to mind is that an electronic signature is everywhere now. All existing solutions, especially in terms of usability, correspond to the natural curvature of the hands of domestic "programmers" (in the worst possible sense).
Start simple. Take openssl, make a pair of X509 sender-receiver certificates (Alice-Bob;). Sign the doc file. Check the validity of the signature. Encrypt the file. Decipher. Try different attacks on signed and encrypted files. The result is a simple electronic document management system.
ps: If it works, fire up CryptoPros with their curvy OfficeSignature, file the FSB certificate - and forward to the green meadows of state contracts :)))

D
Dmitry K, 2015-09-24
@gospodinmir

With practical application and an interesting topic can be taken using, for example, Raspberry Pi.
Fedora, Ubuntu, but better a specialized PwnPi distribution, released by craftsmen specifically for installation on the Raspberry Pi. It already contains all the necessary hacker tools. In addition, the craftsmen willingly share their experience of installing a hidden server on it in the anonymous I2P network, installing Metasploit, creating a hardware sniffer, and much more.

D
dero2084, 2015-09-25
@dero2084

A tool for classifying information and labeling it.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question