ISM 4993 PROJECT 2

DUE

MONDAY 31st MARCH IN CLASS IN CD FORMAT

 
 

LAST UPDATED: Thursday December 01, 2005 11:55:56 AM -0500

 

Please choose one software program from the Internet which is directly related to Information Assurance. It can be either an attack or defense software for data or voice networks.

Most of theses type of software are either FREEWARE or SHAREWARE. Download it, use it, and write a paper on your experience using it. You must be able to show me and/or the class that you are adequately familiar with it, its download, its set up, how it works and any problems that you encountered.

A copy of the software must be included on the CD.

Please send an email to me with your choice by Saturday at 10:00 pm.

Those unable to cooperate by then will not have their project approved during Spring Break as I will be traveling out of the country.

Don't forget your subject line should start with ISM4993/Your name/

Then check back to see if it has been approved.

 

 

  Name Project Sent in Approved

1

Sophia B CF decrypt Monday, March 10 Monday, March 10
2 Anton A Deep Freeze Tuesday, March 11 Tuesday, March 11
3 Ana M Norton Personal Firewall Tuesday, March 11 Tuesday, March 11
4 Ariel A Ghost Keylogger v 3.5 Tuesday, March 11 Tuesday, March 11
5 Elizabeth C Data Recovery - File Data Premium Wednesday, March 12 Wednesday, March 12
6 Joseph M DVD X Wednesday, March 12 Wednesday, March 12
7 Juan L Munga Bunga's HTTP Brute Forcer version 1_0_2 (build 2) Wednesday, March 12 Wednesday, March 12
8 John V Spyware Nukers Wednesday, March 12 Wednesday, March 12
9 Betty T JoeCrypt2K3? Wednesday, March 12 Wednesday, March 12
10 Stephan L NetBus Detective Thursday, March 13 Thursday, March 13
11 Miguel C NetSupport Manager Thursday, March 13 Thursday, March 13
12 Karen B Spysweeper 1.2 Friday, March 14 Friday, March 14
13 Noriko U Zone Alarm Pro Saturday, March 15 Saturday, March 15
14 Oren K Hot Brick Sunday, March 16 Monday, March 17
15 Dimitry S Mindlink Simulator Monday, March 17 Monday, March 17
16 Danny C Norton Internet Security 2003 Monday, March 17 Tuesday, March 18
17 Denis M Network Address Translation (NAT) Tuesday, March 18 Tuesday, March 18
18 Joubert P Advanced Internet Eraser 3.5.1 Tuesday, March 18 Tuesday, March 18
19 Clifford B PC Anywhere Tuesday, March 18 Tuesday, March 18
20 Jean L Teardrops 5.7 Tuesday, March 18 Wednesday, March 19
21 Anamaria Z Norton personal Firewall Tuesday, March 18 Wednesday, March 19
22 I-Chen L Drivecrypt Tuesday, March 18 Wednesday, March 19
23 Sharmaine C Privacy defender Thursday, March 20 Thursday, March 20
24 James B Lopht Crack 4 Thursday, March 20 Thursday, March 20
25 Maiko D Ad-Aware Friday, March 21 Friday, March 21

 

26 Ivan D Sniff' em Friday, March 21

 

Friday, March 21

 

27 Ariel G Netwatcher Monday, March 24 Monday March 24
28 Alain BCI Brain computer Interface Friday, March 28 Saturday, March 29
29 Zhaila Digital envelope Sunday, March 30 Monday March 31
30 Subrina McAfee Virus scan Sunday, March 30 Monday March 31
31 Victor E Pest Patrol Monday March 31 Monday March 31
32 Carlos P Spybot Monday March 31 Monday March 31
33 Mariangelica Folder lock    

 

 Project shall be presented in class in CD format and will include

 

  1. Page 1

    1. Title of paper

    2. Student Name

    3. Student course number and course name

    4. Semester and year

    5. Name of University

    6. Name of Professor - correctly spelled

    7. Visible digital photo of yourself

  2. Page 2 Table of contents

  3. Page 3 Introduction

  4. Pages 3-15 Main body guideline - which means your paper can be from 3 pages to 15 pages or even longer.

  5. Include diagrams, photos, sketches , other visual

  6. Page last but one - References - all references from both books, library and of course the web.

  7. Last page - A one page executive Summary which should summarize your paper in one page.

 

 

Paper should be
  1. Double spaced,

  2. Fonts: Times Roman or Ariel

  3. Font size: 12

  4. Font color : black

  5. Margins should be 1" either side

  6. Spell checked

  7. MS Word 2000 or XP

  8. Any other applications should be from the MS family

  9. CBA does not support Visio or WordPerfect

  10. emailed by class time - and if necessary win zipped.

  11. Hard copy should be brought to class. 

  12. Project 1 needs to be presented in CD format  by due date

  13. Project 1 must be presented in ONE file and saved as "yourname.doc"

  14. Project 1 must have a color digital and visible photo of yourself

 

 

 MLA Check list

 

The bibliography or list of sources  is referred to as Works Cited under MLA rules.

  1. Direct quotations

    Quote directly from your source if the original words are unique and distinctive or if they add authority to your point.

  2. Ideas that are summarized or paraphrased

    Paraphrasing or summarizing a source is often preferable to quoting, for it allows you as the author to use your own style and voice in your research paper. Always remember to use parenthetical citations for such sources. just as you would if you were quoting them.

  3. Ideas and opinions associated with a particular person 

    If you refer to specific concepts adhered to by one person, you must include a reference to this person.

  4. Data that, in context of your paper, may be open to dispute

    If you cite statistics you need to include a reference to your source.

  5. Results of surveys you have conducted as part of your research

    If interviews are personal, you may mark them "personal communication" in your bibliography.

  6. Avoiding plagiarism

    Plagiarism is a serious violation of academic ethics and is grounds for severe penalty. To avoid plagiarism you must cite work that is not your own. For example, a student taking class notes, might omit to add quotation marks to a direct quote. Weeks later when they are working on their paper they may forget which words and phrases are their own and which come directly from the original source. Check with your professors which as to whether or not to cite them as sources for ideas. The individual professor might consider his ideas as part of the public domain of the class, in which case you could cite them without attribution.

     

  7. I would like to point out the following form the Student Handbook 1.02 Plagiarism. "The deliberate use and appropriation of another's work without any indication of the source and the representation of such work as the student's own. Any student who fails to give credit to ideas, expressions or materials taken from another source, including internet sources, is guilty of plagiarism. Any student helping another to plagiarize may be found guilty of academic misconduct."

  8. Works cited: Books The order is Author, Title, Publication Information:

  9. Arrange the entries alphabetically by the author's last name or, when there is no author name, by the first significant word in the title.

    One author

    McDonald, David Francis. Cyber crime on the net. New York: Harper 2002

    Two authors

    Cranley, Janet F., Shamika M. Brown. Freedom on the Internet. Miami, Uinversity of Miami Press, 2001

     

  10. Works cited: Article in a magazine or newspaper

    Mrad, Grace. "Cyber crime - Miami second in the nation" El Nuevo Herald 28 January 2002  

  11. When citing internet sources, be sure to give credit;  

The University of Florida's IT department has developed a Website that provides information about Cyber crime ( "Cyber crime is constantly increasing")

 Good luck

Last updated: Thursday December 01, 2005 11:55 AM

 

The bibliography or list of sources  is referred to as Works Cited under MLA rules.

  1. Direct quotations

    Quote directly from your source if the original words are unique and distinctive or if they add authority to your point.

  2. Ideas that are summarized or paraphrased

    Paraphrasing or summarizing a source is often preferable to quoting, for it allows you as the author to use your own style and voice in your research paper. Always remember to use parenthetical citations for such sources. just as you would if you were quoting them.

  3. Ideas and opinions associated with a particular person 

    If you refer to specific concepts adhered to by one person, you must include a reference to this person.

  4. Data that, in context of your paper, may be open to dispute

    If you cite statistics you need to include a reference to your source.

  5. Results of surveys you have conducted as part of your research

    If interviews are personal, you may mark them "personal communication" in your bibliography.

  6. Avoiding plagiarism

    Plagiarism is a serious violation of academic ethics and is grounds for severe penalty. To avoid plagiarism you must cite work that is not your own. For example, a student taking class notes, might omit to add quotation marks to a direct quote. Weeks later when they are working on their paper they may forget which words and phrases are their own and which come directly from the original source. Check with your professors which as to whether or not to cite them as sources for ideas. The individual professor might consider his ideas as part of the public domain of the class, in which case you could cite them without attribution.

  7. Works cited: Books The order is Author, Title, Publication Information:

  8. Arrange the entries alphabetically by the author's last name or, when there is no author name, by the first significant word in the title.

    One author

    McDonald, David Francis. Cyber crime on the net. New York: Harper 2002

    Two authors

    Cranley, Janet F., Shamika M. Brown. Freedom on the Internet. Miami, Uinversity of Miami Press, 2001

     

  9. Works cited: Article in a magazine or newspaper

    Mrad, Grace. "Cyber crime - Miami second in the nation" El Nuevo Herald 28 January 2002  

  10. When citing internet sources, be sure to give credit;  

The University of Florida's IT department has developed a Website that provides information about Cyber crime ( "Cyber crime is constantly increasing")

 Good luck

Last updated: Thursday December 01, 2005 11:55 AM