Presentation Date |
Topic |
Student Initials |
Draft Due Date |
Live Presentation? |
11/17/08 |
Malicious File Execution |
PT |
11/3/08 |
Y |
11/17/08 |
Honeypots |
YL |
11/3/08 |
Y |
11/17/08 |
Access Control and Authentication |
JMN |
11/3/08 |
Y |
11/17/08 |
Kerberos |
DR |
11/3/08 |
Y |
11/17/08 |
Multi-level Security Involving Group Authentication |
AvB |
11/3/08 |
Y |
11/17/08 |
Google Hacking |
VB |
11/3/08 |
N |
11/17/08 |
Insecure Direct Object Reference |
AdB |
11/3/08 |
N |
11/17/08 |
Encryption Technology |
RPC |
11/3/08 |
N |
11/17/08 |
Apache Mod Security |
LHD |
11/3/08 |
N |
11/17/08 |
Steganography Tools |
AGM |
11/3/08 |
N |
11/17/08 |
Quantum Cryptography |
DM |
11/3/08 |
N |
11/17/08 |
Failure to Restrict URL Access |
ASS |
11/3/08 |
N |
11/17/08 |
Router Security |
MSS |
11/3/08 |
N |
11/24/08 |
Information Security in Software Outsourcing |
JT |
11/10/08 |
Y |
11/24/08 |
Identity Theft |
TN |
11/10/08 |
Y |
11/24/08 |
Web Application Penetration Testing |
JDC |
11/10/08 |
Y |
11/24/08 |
Digital Music Licensing and Security |
AS |
11/10/08 |
Y |
11/24/08 |
Digital Content Fingerprinting |
JA |
11/10/08 |
Y |
12/1/08 |
Network Intrusion Detection Systems |
AIC |
11/17/08 |
Y |
12/1/08 |
Secure Data Storage - Cleversafe |
ZJM |
11/17/08 |
Y |
12/1/08 |
Session Hijacking |
JJS |
11/17/08 |
Y |
12/1/08 |
Application Security with VM Technology |
EB |
11/17/08 |
Y |
12/1/08 |
Security for Wireless in Embedded Systems |
DGB |
11/17/08 |
Y |