PROJECTS ISM 4990

Home | 4990 Project 1 | 4990 Syllabus  | 4990 Class Schedule | HOMEWORK | Attendance |  Communicating with me |

Last updated: Thursday December 01, 2005 11:56 AM

Project should include

  1. Page 1

    1. Title of paper

    2. Student Name

    3. Student course number and course name

    4. Semester and year

    5. Name of University

    6. Name of Professor - correctly spelled

    7. Visible digital color photo of yourself

  2. Page 2 Table of contents

  3. Page 3 Introduction

  4. Pages 3-15 Main body guideline - which means your paper can be from 3 pages to 15 pages or even longer.

  5. Include diagrams, photos, sketches , other visual

  6. Page last but one - References - all references from both books, library and of course the web.

  7. Last page - A one page executive Summary which should summarize your paper in one page.

 

Paper should be

  1. Double spaced,

  2. Fonts: Times Roman or Ariel

  3. Font size: 12

  4. Font color : black

  5. Margins should be 1" either side

  6. Spell checked

  7. MS Word 2000 or XP

  8. Any other applications should be from the MS family

  9. CBA does not support Visio or WordPerfect

  10. emailed by class time - and if necessary win zipped.

  11. Hard copy should be brought to class. 

  12. Project 1 needs to be presented in CD format  by due date

  13. Project 1 must be presented in ONE file and saved as "yourname.doc"

  14. Project 1 must have a color digital and visible photo of yourself

 MLA Check list

The bibliography or list of sources  is referred to as Works Cited under MLA rules.

  1. Direct quotations

    Quote directly from your source if the original words are unique and distinctive or if they add authority to your point.

  2. Ideas that are summarized or paraphrased

    Paraphrasing or summarizing a source is often preferable to quoting, for it allows you as the author to use your own style and voice in your research paper. Always remember to use parenthetical citations for such sources. just as you would if you were quoting them.

  3. Ideas and opinions associated with a particular person 

    If you refer to specific concepts adhered to by one person, you must include a reference to this person.

  4. Data that, in context of your paper, may be open to dispute

    If you cite statistics you need to include a reference to your source.

  5. Results of surveys you have conducted as part of your research

    If interviews are personal, you may mark them "personal communication" in your bibliography.

  6. Avoiding plagiarism

    Plagiarism is a serious violation of academic ethics and is grounds for severe penalty. To avoid plagiarism you must cite work that is not your own. For example, a student taking class notes, might omit to add quotation marks to a direct quote. Weeks later when they are working on their paper they may forget which words and phrases are their own and which come directly from the original source. Check with your professors which as to whether or not to cite them as sources for ideas. The individual professor might consider his ideas as part of the public domain of the class, in which case you could cite them without attribution.

  7. Works cited: Books The order is Author, Title, Publication Information:
  8. Arrange the entries alphabetically by the author's last name or, when there is no author name, by the first significant word in the title.

    One author

    McDonald, David Francis. Cyber crime on the net. New York: Harper 2002

    Two authors

    Cranley, Janet F., Shamika M. Brown. Freedom on the Internet. Miami, Uinversity of Miami Press, 2001

     

  9. Works cited: Article in a magazine or newspaper

    Mrad, Grace. "Cyber crime - Miami second in the nation" El Nuevo Herald 28 January 2002  

  10. When citing internet sources, be sure to give credit;  

The University of Florida's IT department has developed a Website that provides information about Cyber crime ( "Cyber crime is constantly increasing")

 Good luck

Last updated: Thursday December 01, 2005 11:56 AM

  If there is a name in this column it is reserved If it is highlighted below in Yellow it is reserved
Project Student Description
2600 Meetings Michael S Attending meetings at Broward Mall first Friday of the month-making contact with 2600
Authentication Masifa M What is it? How many different forms? Who are the major players?
Buffer Overflow Attacks Arturo M What is it? How do they work?  Types of BOAs. 
Bureaucracy ends where IT begins    
Carnivore Dale H  
CERT Janet L Who are they? Who funds it? What are the services it provides free? What are the services it provides for customers? 
Chain Letters Alicia M Recognizing one, The hook, The threat, the Request, Validating the information
Compression Andres E How compression works; BMP, PCX, GIF, JPG, MP3 How can you hide information in photos?
Cryptography Luke H Cryptography with coding theory
Defaced Web Sites George S The problem; Which organizations have recently been hit? Who maintains a record of defaced web sites.
Digital Certificates 1 Michael R How do they work? What is their use?
Digital IDs Not available How do they work? What is their use? Who are the major players? What do they offer? How can their products be used?
Digital Information Marianela P Volume of digital information produced yearly 
Digital signature standard Marie C FIPS 186-2 DSS Digital Signature Standard
EICAR European  Indah W Who are they? Who funds it? What are the services it provides free? What are the services it provides for customers? 
Electronic cash Glenda H How doe sit work? How can we secure it? Will companies use it more and more?
Encryption Mahinder R How many types? How do they work? Which ones are the latest? Which ones does Government use? Which ones are used by the private sector? 
Ethical issues concerning IT Damian W  
Hacking information  Lovleen D Magazines and web sites available; a description of these, where to purchase them or their online presence. The best ones
Hacking passwords Laura R Brute force and dictionary Hacking
Hash Algorithms 1 MD5 Message digest algorithm
Hash Algorithms 2 SHA Secure Hash Algorithm
Hash Algorithms 3 DSS - Digital Signature Standard
How much trust can you put in the Internet? Alexander T What can be done about it? What are the problems, what are the possible solutions?
ICSA Laura D Who are they? Who funds it? What are the services it provides free? What are the services it provides for customers? Intl. Computer Security Association
Internet Security Protocols Einat U  
IP Sec  Anthony S Basics of IP Sec 
Legislation before Congress Yanisey B http://thomas.loc.gov/bss/d105query.html
MacAfee  Alan S Anti Virus services it provides
Norton - Symantec Brandon E Anti virus services it provides
Ontrack 1  Navaid A Services it provides
Packetstorm Rafael G
Password Hacking software vendors Dwight H Who are the major players? - How much does it cost? - How do you use it?   
PGP Karl C Pretty Good Privacy
PKI Rudy M What is it? How is it used? Who are the major players of PKI? Who uses it? 
Preventing Denial of Service Attacks Gregory W  
Privacy in the Age of the Internet   What do the Civil Liberties groups conclude?
RFC 2 RFC 2537 RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)
RFC 3 RFC 2437 
RFC 4 RFC 1828
RFC 5 RFC 2411
RFC 6    RFC 2408 This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and cryptographic keys in an Internet environment. A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options for each security mechanism. The key management protocol must be robust in order to handle public key generation for the Internet community at large and private key requirements for those private networks with that requirement. The Internet Security Association and Key Management Protocol (ISAKMP) defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). All of these are necessary to establish and maintain secure communications (via IP Security Service or any other security protocol) in an Internet environment.
RFC 7   RFC 2409 This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. RFC 2409
RSA Security What is this company about?
SANS Shantel H Who are they? Who funds it? What are the services it provides free? What are the services it provides for customers? 
Security policy for small companies Jean Louis R
Security policy for medium companies
Security policy for large companies Daniel B
SHA -1  Secure Hash Standard
Targa
Tempest
TFN2K Tribal Flood Network 2000 
The Internet  Jorge B How many Web sites? How many email users? What is the rate of increase? How many servers? Which are the most visited web sites?
Trinoo
Types of Security Services Yoe H  
Verisign  Carmen K Do two Verisign services it provides
Virus FAQ 1 Chung Y Frequently asked questions about viruses
Viruses Jean Marc F Understanding the true nature of viruses, how many types, how do they work? Vulnerabilities and fixes
VPN Alexandra A What is a VPN? Is it secure? How?
Webenforcer  HP's software
WEP Gabriel P The 802.11 standard describes the communication that occurs in wireless local area networks (LANs). The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network; this function is not an explicit goal in the 802.11 standard, but it is frequently considered to be a feature of WEP.
What is a VPN? DaRRen G What is a virtual private network? Where is it used? Who uses it?
Who owns the data that is collected off the internet? Julio A  
Winzip Carmen K Do two Using winzip - step by step how to use it
Zombie Zapper Maria B
Zone Alarm  Marcel K Firewall and other services it provides, how to install it
Please submit your 3  choices 1st come 1st served  
First Name
Last Name
email
Choice 1 Copy and paste from above
Choice 2
Choice 3
   

 

Home | 4990 Project 1 | 4990 Syllabus  | 4990 Class Schedule | HOMEWORK | Attendance |  Communicating with me |