ISM 4990 PROJECT 1

DUE

MONDAY September 15th, 2003 CD FORMAT

 
 

LAST UPDATED: Thursday December 01, 2005 11:55:57 AM -0500

These are the available projects:

Please send an email to me with your top 3 choices by Thursday morning at 10:00 am. Those unable to reply by then will be assigned a project.

Don't forget your subject line should start with ISM4993/Your name/

Then check back to see what you have been assigned.

 

 

 

  Project shall be presented in class in CD format and will include

 

  1. Page 1

    1. Title of paper

    2. Student Name

    3. Student course number and course name

    4. Semester and year

    5. Name of University

    6. Name of Professor - correctly spelled

    7. Visible digital photo of yourself

  2. Page 2 Table of contents

  3. Page 3 Introduction

  4. Pages 3-15 Main body guideline - which means your paper can be from 3 pages to 15 pages or even longer.

  5. Include diagrams, photos, sketches , other visual

  6. Page last but one - References - all references from both books, library and of course the web.

  7. Last page - A one page executive Summary which should summarize your paper in one page.

 

 

Paper should be
  1. Double spaced,

  2. Fonts: Times Roman or Ariel

  3. Font size: 12

  4. Font color : black

  5. Margins should be 1" either side

  6. Spell checked

  7. MS Word 2000 or XP

  8. Any other applications should be from the MS family

  9. CBA does not support Visio or WordPerfect

  10. emailed by class time - and if necessary win zipped.

  11. Hard copy should be brought to class. 

  12. Project 1 needs to be presented in CD format  by due date

  13. Project 1 must be presented in ONE file and saved as "yourname.doc"

  14. Project 1 must have a color digital and visible photo of yourself

 

 

 MLA Check list

 

The bibliography or list of sources  is referred to as Works Cited under MLA rules.

  1. Direct quotations

    Quote directly from your source if the original words are unique and distinctive or if they add authority to your point.

  2. Ideas that are summarized or paraphrased

    Paraphrasing or summarizing a source is often preferable to quoting, for it allows you as the author to use your own style and voice in your research paper. Always remember to use parenthetical citations for such sources. just as you would if you were quoting them.

  3. Ideas and opinions associated with a particular person 

    If you refer to specific concepts adhered to by one person, you must include a reference to this person.

  4. Data that, in context of your paper, may be open to dispute

    If you cite statistics you need to include a reference to your source.

  5. Results of surveys you have conducted as part of your research

    If interviews are personal, you may mark them "personal communication" in your bibliography.

  6. Avoiding plagiarism

    Plagiarism is a serious violation of academic ethics and is grounds for severe penalty. To avoid plagiarism you must cite work that is not your own. For example, a student taking class notes, might omit to add quotation marks to a direct quote. Weeks later when they are working on their paper they may forget which words and phrases are their own and which come directly from the original source. Check with your professors which as to whether or not to cite them as sources for ideas. The individual professor might consider his ideas as part of the public domain of the class, in which case you could cite them without attribution.

     

  7. I would like to point out the following form the Student Handbook 1.02 Plagiarism. "The deliberate use and appropriation of another's work without any indication of the source and the representation of such work as the student's own. Any student who fails to give credit to ideas, expressions or materials taken from another source, including internet sources, is guilty of plagiarism. Any student helping another to plagiarize may be found guilty of academic misconduct."

  8. Works cited: Books The order is Author, Title, Publication Information:

  9. Arrange the entries alphabetically by the author's last name or, when there is no author name, by the first significant word in the title.

    One author

    McDonald, David Francis. Cyber crime on the net. New York: Harper 2002

    Two authors

    Cranley, Janet F., Shamika M. Brown. Freedom on the Internet. Miami, Uinversity of Miami Press, 2001

     

  10. Works cited: Article in a magazine or newspaper

    Mrad, Grace. "Cyber crime - Miami second in the nation" El Nuevo Herald 28 January 2002  

  11. When citing internet sources, be sure to give credit;  

The University of Florida's IT department has developed a Website that provides information about Cyber crime ( "Cyber crime is constantly increasing")

 Good luck

Last updated: Thursday December 01, 2005 11:55 AM

 

 

 

Name of Project Name of Student Description
   

If it is highlighted below in Yellow it is reserved

MacAfee and Norton differences  Rachel S Anti Virus services it provides
Zone Alarm Dacia D Firewall and other services it provides and how to install it
Verisign 1 Nestor G Verisign services it provides
Ontrack 1   Services it provides Ontrack step by step
Password Hacking software vendors   Who are the major players? - How much does it cost? - How do you use it?  
Preventing Denial of Service Attacks Alain A What are DoS attacks and how can they be prevented
Digital IDs Chanelle H How do they work? What is their use?Who are the major players? What do they offer? How can their products be used?
Digital Signatures Amina B How do they work? What is their use?
Digital Certificates 2 Fiorella L Who are the major players? What do they offer? How can their products be used?
Defaced Web Sites   The problem; Which organizations have recently been hit? Who maintains a record of defaced web sites.
Electronic cash Jon M How doe sit work? How can we secure it? Will companies use it more and more?
The Internet Renee R How many Web sites? How many email users? What is the rate of increase? How many servers? Which are the most visited web sites?
Digital Information Ric B Volume of digital information produced yearly
CERT Johnny G Who are they? Who funds it? What are the services it provides free? What are the services it provides for customers?
SANS Alain A Who are they? Who funds it? What are the services it provides free? What are the services it provides for customers?
EICAR European Debora M Who are they? Who funds it? What are the services it provides free? What are the services it provides for customers?
     
VPN Imran K What is a VPN? Is it secure? How?
Encryption Manny H How many types? How do they work? Which ones are the latest? Which ones does Government use? Which ones are used by the private sector?
Authentication Lorrie What is it? How many different forms? Who are the major players?
PKI Audrey J What is it? How is it used? Who are the major players of PKI? Who uses it?
Symmetric Key Encryption Herbert M  Encryption/decryption falls into two categories: Symmetric and Public Key
Hacking information 1 Alvaro C Magazines available; a description of these magazines, where to purchase them, Online presence.
Hacking information 2 Iggy V Current Web sites. Most visited; Top three. 
Compression Jules D How compression works; BMP, PCX, GIF, JPG, MP3
Winzip Olgine B Using winzip - step by step how to use it
Viruses 1 Jennifer M Understanding the true nature of viruses. How viruses work
Viruses 2 Ric B The latest viruses that have appeared; A description of when they appeared, who they first attacked, Vulnerabilities and fixes
Legislation before Congress   http://thomas.loc.gov/bss/d105query.html
Chain Letters Alexandra T Recognizing one, The hook, The threat, the Request, Validating the information
Cryptography David D Cryptography with coding theory
Brute force and Dictionary Hacking Ghita H What is it? What software - Is it legal?
RSA Security Duane H What is this company about?
Privacy in the Age of the Internet Yvonne D What do the Civil Liberties groups conclude?
Bureaucracy ends where IT begins    
Who owns the data that is collected off the internet?    
Ethical issues concerning IT Hans P  
How much trust can you put in the Internet? JC H What can be done about it? What are the problems, what are the possible solutions?
Internet Security Protocols Hannafer M  
Types of Security Services    
What is a VPN? Roy dde What is a virtual private network? Where is it used? Who uses it?
IP Sec Allen P Basics of IP Sec
SHA -1   Secure Hash Standard
RFC 2   RFC 2537 RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)
RFC 3   RFC 2437
RFC 4   RFC 1828
RFC 5   RFC 2411
RFC 6   RFC 2402 This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for improvements.  Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol.  Distribution of this memo is unlimited.
 
RFC 7   RFC 2404 This memo describes the use of the HMAC algorithm [RFC-2104] in conjunction with the SHA-1 algorithm [FIPS-180-1] as an authentication mechanism within the revised IPSEC Encapsulating Security Payload [ESP] and the revised IPSEC Authentication Header [AH]. HMAC with SHA-1 provides data origin authentication and integrity protection.
RFC 8   RFC 2408 This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and cryptographic keys in an Internet environment. A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options for each security mechanism. The key management protocol must be robust in order to handle public key generation for the Internet community at large and private key requirements for those private networks with that requirement. The Internet Security Association and Key Management Protocol (ISAKMP) defines the procedures for
authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). All of these are necessary to establish and maintain secure communications (via IP Security Service or any other security protocol) in an Internet environment.
RFC 9 RFC 2409 This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.
PGP Joe W Pretty Good Privacy, How does it work?
Hash Algorithms 1   MD5 Message digest algorithm
Hash Algorithms 2   SHA Secure Hash Algorithm
Hash Algorithms 3   DSS - Digital Signature Standard
Digital signature standard   FIPS 186-2 DSS Digital Signature Standard
Packetstorm    
Targa    
TFN2K   Tribal Flood Network 2000
Trinoo
Zombie Zapper and the like    
Buffer Overflow Attacks Gavin C What is it? How do they work?  Types of BOAs.
Policies, practices and Defensive Technology    
Acceptable use policies    
Computer forensics Joaquin B  
Electronic evidence    
Technology and auditing systems    
Threats, vulnerabilities and Risk exposure    
Sources of digital liability    
Privacy and data protection    
Do you have a project to suggest?- email it to me    
     
     
18 US code 875   Email threats and harassment Act - Felony 2/5/20 years
18 US code 1030 Danny B Computer Crime and Abuse Act - Felony 10/20 year $250.000
18 US code 1029 Danny B Credit Card Fraud Act
18 US code 2319 Danny B Copyrights Act
18 US code 2511 Danny B Interception of Information Act - Felony 5 years
18 US code 2701 Danny B Access to Electronic Information - Misdemeanor 6 months unless...
Child pornography Act  18 US code 2252 Imelda C Felony- 15 years +
US Patriot Act 2001 Patrico A Section 202 Gives authority to monitor voice communications in computer hacking investigations

Section 209 Gives authority to obtain stored voice communications such as voicemail

Section 210 Scope of subpoenas for electronic evidence 

Restore your identity Act 2001 David B  
Policy and procedures for the company Steven V H SANS is a great web site for info