• Tidak ada hasil yang ditemukan

King Abdulaziz University

N/A
N/A
Protected

Academic year: 2025

Membagikan "King Abdulaziz University"

Copied!
4
0
0

Teks penuh

(1)

King Abdulaziz University

College of Computing and Information Technology Information Systems Department

SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY

INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project

DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014

Presentation Date: 8/4/2014

The course project is intended to evaluate your understanding of the topic of information security in general and the course itself in specific. This is a group project where each group may consist of three to four students.

Project Ideas

A list of course projects for is available below. Your group can choose any one of them. Alternatively, you can choose a topic on your own. In the latter case, you need to discuss it with me first.

Authentication Protocol

Design and implement a simple authentication protocol using the cryptographic techniques covered in the course. Your project should address the following:

 Abstract

 The implementation should include a sender and a receiver module.

 What are the limitations of the protocol

 Propose attacks against the protocol

 Conclusion

 References( Harvard style) DES-CBC

Implement DES in CBC mode.

 Abstract

 The implementation should include a sender and a receiver module.

 What are the limitations of the DES-CBC

 Propose attacks against the DES-CBC

 Conclusion

 References( Harvard style)

Diffie-Hellman Key Exchange for Additive Cipher

Implement a simple additive cipher where the key is initially distributed using the Diffie-Hellman Key Exchange algorithm.

Triple DES

Study the Triple DES problem and prepare a report. Your report should address the following:

 Abstract

 Introduction to Triple DES

(2)

King Abdulaziz University

College of Computing and Information Technology Information Systems Department

SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY

INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project

DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014

Presentation Date: 8/4/2014

 State of the art literature review: Discuss the latest techniques used in Triple DES

 Proposed solution: The proposed solution may be very simple but it should reflect your clear understanding of the problem.

 Explain the algorithm of Triple DES by drawing diagram?

 Conclusion

 References( Harvard style) Hash Algorithms

Study the Hash Algorithms and types problem and prepare a report. Your report should address the following:

 Abstract

 Introduction to Hash Algorithms

 State of the art literature review: Discuss the latest techniques used in Hash Algorithms and types

 Proposed solution: The proposed solution may be very simple but it should reflect your clear understanding of the problem.

 Conclusion

 References( Harvard style) Computer Security Incident Response

Study what is incident response and prepare a report. Your report should address the following:

 Abstract

 Introduction to incident response

 State of the art literature review: Discuss the latest techniques/plans used in incident response

 Proposed plan: The proposed plan may be very simple but it should reflect your clear understanding of the problem.

 Conclusion

 References( Harvard style) X.509 & Public Key Infrastructure

Study the X.509 & Public Key Infrastructure problem and prepare a report. Your report should address the following:

 Abstract

 Introduction to X.509 & Public Key Infrastructure

(3)

King Abdulaziz University

College of Computing and Information Technology Information Systems Department

SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY

INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project

DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014

Presentation Date: 8/4/2014

 State of the art literature review: Discuss the latest techniques used X.509 & Public Key Infrastructure

 Attacks against X.509 & Public Key Infrastructure.

 Conclusion

 References( Harvard style)

Report Requirements

Your report should address the points listed for the topic you chose. The report must not be a

copy/paste of the Wikipedia article on that topic. This does not mean that you cannot use the Internet for your research. Include proper references.

 Each group should consist of 3-5 student members. Select your own group member. The instructor will not be responsible for those who do not have a group.

 Each group must submit a report contain of:

 Softcopy of report. Name your file as <group_Name> E.g. ABC. send me it to this email

"[email protected]

 The format of report :

 Cover page with the members’ names, ID and group number (according to the list of names)

 Text times roman font 12 or equivalent

 Line spacing 1.5 and must include page numbering

 Properly bound (Do not submit loose pages in folders. The instructor will not be responsible if any of the pages are missing).

 Indent the first line of all paragraphs

 Justify all paragraphs

 The References styles according to Harvard styles

 Submission paper length: 6 pages minimum, 8 pages maximum.

Presentation

Limit your presentation to five slides only excluding any references. Each group will be assigned a 10 minutes slot where half of this time will be spend on the presentation and half on question/answers.

Grading

(4)

King Abdulaziz University

College of Computing and Information Technology Information Systems Department

SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY

INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project

DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014

Presentation Date: 8/4/2014

Grading will be based upon the following in the decreasing order of priority

 Question/Answer

 Report

 Presentation

Each student will be individually graded of his/her contribution to the project. The project is 15% of your grade and I am looking forward to a considerable effort on your part. If a student is not able to answer any of the questions asked, he/she will receive a zero in the project so be prepared for what you present and what you include in your report.

Referensi

Dokumen terkait

6 International Advisory Board of King Abdulaziz University KAU, Saudi Arabia 6.1 Introduction King Abdulaziz University KAU is a distinguished educational institution in the Middle

KINGDOM OF SAUDI ARABIA Ministry of Higher Education KING ABDULAZIZ UNIVERSITY بطلا ةيلك Faculty of Medicine ةيبصعلا مولعلا ثاحبا ةدحو Neuroscience Research

ةيلودلا ةعماجلا راعش Service contract between King Abdulaziz University Kingdom of Saudi Arabia and University / international body [...], Country [...] Introduction: This

Scientific Research Ethical Controls King Abdulaziz University 3 Foreword 4 Definitions 7 - 5 General Controls 13 - 8 Controls for Dealing with Living Creatures 16- 14 Publishing

King Abdulaziz University Faculty of Computing & Information Technology Information Systems Department Thesis Research Proposal Form بلاطلا مــسا Student name يعماجلا مقرلا Student

Full or Part Time 1994 Present King Abdulaziz University Professor Full 1998 2004 King Abdulaziz University Vice President KAU for Research & Graduate Studies Full 1988

Professor, Aeronautical Engineering Dept., King Abdulaziz University Education Degree Field Institution Year PhD Aeronautical Engineering ENSAE, Toulouse, France 1983 MS

‐ 1995 Internship year at King Abdulaziz university and King Fahad General hospital, Jeddah, Saudi Arabia.. ‐ 1998 Passed the American Na onal Board Dental