Comp690 Research Paper Topics

 

Note:  The numerals represent categories, not topics.  The bullets under the numerals are topics.

 

1) Legal environment

  • Current U.S. laws on cybercrime
  • International laws on cybercrime
  • Intellectual property laws
  • Recent cybercrime cases
  • Cybercrime cases involving college campuses
  • Child internet pornography laws
  • Legislation in progress

 

2) Computer Viruses

  • Pick one virus and document its history including efforts to combat it
  • Virus protection software in depth

 

3) Internet issues

  • Describe DNS and its weaknesses
  • Email security
  • Spam and its prevention
  • Phishing

 

4) Spyware

  • Document case where spyware was used for economic subversion
  • Keystroke recorders

 

5) Operating Systems - Describe in depth the security protections provided by different operating systems:

 

  • Windows XT
  • Unix
  • PDA’s, cell phones

 

6) Encryption

  • Public key systems
  • Authentication – digital signature
  • Biometrics
  • Encoding – RSA, PGP, etc.
  • Steganography

 

7) Cyber stalking and internet crime

  • Cyber stalking and the law
  • Child legal protections and cases
  • Internet auction fraud

 

8) Industrial espionage

  • Embezzlement using  internet
  • Employee sabotage
  • Theft by internet
  • Compromise of trade secrets
  • Computer forensics

 

9) Military espionage

  • Cyberattack - Disabling enemy computer systems
  • Defending against cyberattack
  • Cyber terrorism
  • Spying

 

10) Invasion of privacy

  • U.S. privacy legislation
  • Credit histories
  • Medical and genetic privacy

 

11) The computer security industry

  • Jobs available – Job titles and skills required
  • Anti-virus companies
  • Security hardware
  • Security software

 

12) Security models

  • Bell- LaPadula
  • Biba Model
  • Clark Wilson Model

 

13) Database Security

  • Access control using views and stored procedures
  • Statistical database security

 

14) Security assessment

  • The Rainbow Series from NSA
  • Security requirements for government contractors
  • Security audit
  • Intrusion detection