CPTR 427 Network Security

Resources

Research Ideas & Resources

 

The poster you must create for your Research/Project presentation will be graded using the standard department rubric. I encourage you to make your presentation as relevant to your major as posible. CSA students should research/implement and present some element of system adminstration such as the topics listed above. Choose something you are unfamiliar with and learn about that piece of CSA. CS and CSES majors should focus on security related theoretical constructs and/or hardware systems. For these majors I expect a programmed/designed system implementation. All students should demonstrate completion in a Poster Presentation in class and in the Semester end research presentations.

Rules to Hack by:

  1. You may not tamper with the interior of a system (that includes everything you can not see under normal conditions e.g. you can not use a boot cd since the cd tray is closed normally and consequently is in the interior).
  2. You may use any other means to compromise the system or it's performance.
  3. You may not destroy the machine beyond your own ability to repair it. If an attack is discovered or not, you may be asked to walk the owner through the process to repair any damage you did and make known the method used to compromise the system.
  4. You may only hack computers on the 10.0.0.0/8 network

A Short History of Hacking

The History of Hacking
Via: Online MBA;