尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 1
Projects Ideas
Contents
1) Virtualization Through ESXI Server.....................................................................................................2
2) SIEM(Security Information & Event Management) Engine Development ...............................................2
3) Mobile Log Management Tool ...........................................................................................................2
4) Personal Device Data Encryption..........................................................................................................3
5) Centralized File Storage Server..........................................................................................................3
6) Data Tempering Through C#.Net........................................................................................................3
7) Mobile Vulnerability Assessment Tool................................................................................................4
8) Mobile Data Synchronization.............................................................................................................4
9) Data Recovery Tool for USB...............................................................................................................4
11) Web Alert System.............................................................................................................................5
12) Call center Tracker............................................................................................................................6
13) Creating SysLog Server in .NET...........................................................................................................6
14) SOFT VPN CONCENTRATOR...............................................................................................................7
16) Wake On LAN ...................................................................................................................................7
17) Network Ports Monitoring.................................................................................................................8
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 2
1) Virtualization Through ESXI Server
Aim
VMware vSphere Hypervisor is a free bare-metal hypervisor that virtualizes servers so you can
consolidate your applications on less hardware. The main idea is to minimize the cost of hardware
and increase the efficiency of the hardware by virtualized an application.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
2) SIEM (Security Information & Event Management) Engine Development
Aim
Security information and event management (SIEM) technology supports threat detection and
security incident response through the real-time collection and historical analysis of security events
from a wide variety of event and contextual data sources. It also supports compliance reporting and
incident investigation through analysis of historical data from these sources. The core capabilities of
SIEM technology are a broad scope of event collection and the ability to correlate and analyze events
across disparate sources.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
3) Mobile Log Management Tool
Aim
The aim is to provide a user management interface so that user can keep track of complete mobile
log which includes, SMS, Images, CALL, Browsing history, it should be stored in server and It should
be capable of being transferred to a server and then played back over the Web.
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 3
4) Personal Device Data Encryption
Aim
As data becomes more portable and computers are more affordable, an increasing number of
individuals are using personal devices to access, create, modify, or transport data. Failure to
properly secure the data can present risks to Unauthorized use of data, the user, and the subjects of
the data (e.g. UCSF patients, employees, research study participants), as sensitive and/or restricted
data may be exposed to those without a need-to-know. For example, if an employee’s personal
laptop (used to access and store patient protected health information (PHI)) was stolen, the patients
whose information was on the device are at risk for unauthorized access, acquisition and use of their
personal information, if the device was not properly secured. A System is required which encrypt all
the data placed in a Personal Device.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
5) Centralized File Storage Server
Aim
This Project has a client/Server approach in which a Client has an ID to access the server and places
his/her file on a server, Server will be maintaining the Data of each employee with respect to their
ID's, and also set the limit of uploading the total data and the limit of file uploading, furthermore, if
you want to enhance the project Specific File extensions, User data uploading history, user Logged in
time would be value added work.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
6) Data Tempering Through C#.Net
Aim
Data Tempering is one of the feature introduced of Mozilla Firefox, data tempering contains all the
values that are being generated by POST method. user can modify the POST packet when initiating
the request. That packet may modify for example (Extensions, Constant Values, Date Time, Fields
that are disabled on web).
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 4
7) Mobile Vulnerability Assessment Tool
Aim
The aim of this project is to develop a System that test the weaknesses of a mobile phone, Identify
the exploits that are stored in a mobile phone. this system also measure the performance of mobile
application and also report the Unusual activities made the applications, similarly this system would
inform the user when any application made connectivity outside the scope of the local network.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
8) Mobile Data Synchronization
Aim
Being able to work offline is an expected feature of mobile applications. For data-driven applications,
it means that you — the developer — will have to store (a subset of) your application data locally,
and implement a data synchronization mechanism that keeps your local and server data in sync.
Synchronization data would contain (Messages, Contacts, Photos, Calling history) all data should be
travel encrypted on any medium suitable.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
9) Data Recovery Tool for USB
Aim
In software industry, the major problem is Data Lost, preventing data is one of the complex task ,
because data neither retrieved 100%, by enhancing the code an application is required to build a
system that recover the data lost in a USB device.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 5
10) Secure DNS using Cryptography
Aim
The mapping or binding of IP addresses to host names became a major problem in the rapidly
growing Internet and the higher level binding effort went through different stages of development up
to the currently used Domain Name System (DNS).
The DNS Security is designed to provide security by combining the concept of both the Digital
Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of
Private key. The DNS security uses Message Digest Algorithm to compress the Message(text file) and
PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The
message combines with the Private key to form a Signature using DSA Algorithm, which is send
along with the Public key.
The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches
with the Signature of the message received, the message is Decrypted and read else discarded.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
11) Web Alert System
Aim
Web Alerts is a windows application that communicates with the web services hosted by particular
area like e-learning, stock, weather forecast etc. When you minimize, this tool disappears from the
screen and you can see a Small icon in the system tray, which can be used to re activate the tool.
Even when the tool is hidden, it works silently in the background. At some regular intervals of time, it
communicates with web services to find if there is any new alert created. If it finds a new alert, the
tool downloads the alerts and pops up a message displaying the alert. This message will include a
short description and a URL to click.
By clicking the URL, you can directly reach the web page represented by the alert. For example,
when a new article is submitted in or when an answer is posted for your question, your Web Alerts
tools will immediately popup alerting you to visit the page. For an applications like e-learning,
marketing and Query processing even a web application can be developed for entry and editing and
that can be tracked by windows, mobile and other application users thru web services. Every bank
today sends alerts to their users when an amount is credited, withdrawn or a Cheque is presented.
Similarly the alerts are generated for our application. Take an important area and design the
application. Extend the application to register for alerts based on user choice. It is one of the hot
requirements for every application today. This is one of the modern requirements for every desktop
application today
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 10
12) Call center Tracker
Aim
Call Center Tracker is an increasingly important skill as the use of call centers becomes a popular
method of centralizing information services, streamlining order taking and providing valuable
customer support. The skills required to successfully set-up and manage a call center encompass
everything from staff recruitment and personnel management, to technical understanding of the
options available, and the
all-important customer relationship management. From small customer service departments to large
call centers, the importance of developing successful Call Center Tracker is vital for building a valued
relationship with customers to support long-term business growth.
This system (Call Center Tracker) is useful to the organization, it maintains the information about the
employees and it also contains the necessary information of the customer and their phone Numbers,
their services also. It also maintains the employee roaster details.
This system will track the employee's login details. And also maintains the data the employee attend
the
call and his behavior with customer and the speech will be recorded into file. Sometimes customer
request for service to the organization. This data also maintains the system
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
13) Creating SysLog Server in .NET
Aim
Syslog is a way for network devices to send event messages to a logging server – usually known as a
Syslog server. The Syslog protocol is supported by a wide range of devices and can be used to log
different types of events. For example, a router might send messages about users logging on to
console sessions, while a web-server might log access-denied events.Most network equipment, like
routers and switches, can send Syslog messages.
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 10
14) SOFT VPN CONCENTRATOR
Aim
A VPN concentrator is a type of networking device that provides secure creation of VPN connections
and delivery of messages between VPN nodes.
A VPN concentrator is typically used for creating site-to-site VPN architectures. It can:
 Establish and configure tunnels
 Authenticate users
 Assign tunnel/IP addresses to users
 Encrypt and decrypt data
 Ensure end-to-end delivery of data
15) User Activity Logging
Aim
The Aim is to design an Application for user logging activity started from the Login Session of
Windows to all the activities that is being made by the user Operating System Level. All the activities
sent to the Centralized database until the user logged off the session of Windows.
Example of Activity Logging :
1) Name of the Application Opened
2) Installation and Un installation applications name
3) Browser visited URL's
4) New folder , File creation Name, Date
5) Sharing Files & Folder (Access Date , Time, Name)
6) External USB Drive (Access Date , Time, Name) etc
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
16) Wake On LAN
Aim
Wake-on-LAN (WoL) is an Ethernet computer networking standard that allows a computer to be
turned on or awakened by a network message.
Ethernet connections, including home and work networks, wireless data networks and the Internet
itself, are based on packets of data sent between computers. Wake-on-LAN ("WOL") is implemented
using a specially designed packet called a magic packet, which is sent to all computers in a network,
among them the computer to be woken up.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 8
17) NetworkPorts Monitoring
Aim
This project aims at scanning the portsof Networkwith their respective Service Name,Network ports
Scanning Informs the Total Numberof Host connect to anetwork, No of host that are not alive on a
network and No of host that are just arrived ordisconnectfrom anetwork.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
_____________________________________________________________________

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Ali Kamil
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Security Architecture-Security Models
Security Architecture-Security ModelsSecurity Architecture-Security Models
Security Architecture-Security Models
Suraj Singh
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
NetProtocol Xpert
 
Internet anonymity and privacy
Internet anonymity and privacyInternet anonymity and privacy
Internet anonymity and privacy
Dooremoore
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
Nasir Bhutta
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
ForgeRock
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
Ikhtiar Khan Sohan
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business
Symantec
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
hazirma
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
phexcom1
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Application security
Application securityApplication security
Application security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security
Network security Network security
Network security
 
Security Architecture-Security Models
Security Architecture-Security ModelsSecurity Architecture-Security Models
Security Architecture-Security Models
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Internet anonymity and privacy
Internet anonymity and privacyInternet anonymity and privacy
Internet anonymity and privacy
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 

Viewers also liked

RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifsRSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
Webpatron
 
Best Final Year Projects
Best Final Year ProjectsBest Final Year Projects
Best Final Year Projects
ncct
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
VIT University
 
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
Cyrille Deruel
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
Tumennast Erdenebold
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
Sorath Asnani
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1
Abdul Basit
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2
Abdul Basit
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
Saurav Pandey
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
 

Viewers also liked (10)

RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifsRSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
 
Best Final Year Projects
Best Final Year ProjectsBest Final Year Projects
Best Final Year Projects
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 

Similar to Final Year Projects Computer Science (Information security) -2015

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
 
A017360104
A017360104A017360104
A017360104
IOSR Journals
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Java project titles
Java project titlesJava project titles
Java project titles
Ashly Liza
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
wkyra78
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
Benjamin Jolivet
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
Journal For Research
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
Jill Lyons
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
Mohammad Khreesha
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET Journal
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
Beji Jacob
 
Topic 7
Topic 7Topic 7
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
Bimpe Animashaun
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
Tina Jordan
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 

Similar to Final Year Projects Computer Science (Information security) -2015 (19)

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Java project titles
Java project titlesJava project titles
Java project titles
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
 
Topic 7
Topic 7Topic 7
Topic 7
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 

More from Syed Ubaid Ali Jafri

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Syed Ubaid Ali Jafri
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
Syed Ubaid Ali Jafri
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
Syed Ubaid Ali Jafri
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
Syed Ubaid Ali Jafri
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
Syed Ubaid Ali Jafri
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri
 
Storage area network
Storage area networkStorage area network
Storage area network
Syed Ubaid Ali Jafri
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
Syed Ubaid Ali Jafri
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
Syed Ubaid Ali Jafri
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
Syed Ubaid Ali Jafri
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 

More from Syed Ubaid Ali Jafri (18)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
 
LAN Security
LAN Security LAN Security
LAN Security
 

Recently uploaded

Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 

Recently uploaded (20)

Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 

Final Year Projects Computer Science (Information security) -2015

  • 1. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 1 Projects Ideas Contents 1) Virtualization Through ESXI Server.....................................................................................................2 2) SIEM(Security Information & Event Management) Engine Development ...............................................2 3) Mobile Log Management Tool ...........................................................................................................2 4) Personal Device Data Encryption..........................................................................................................3 5) Centralized File Storage Server..........................................................................................................3 6) Data Tempering Through C#.Net........................................................................................................3 7) Mobile Vulnerability Assessment Tool................................................................................................4 8) Mobile Data Synchronization.............................................................................................................4 9) Data Recovery Tool for USB...............................................................................................................4 11) Web Alert System.............................................................................................................................5 12) Call center Tracker............................................................................................................................6 13) Creating SysLog Server in .NET...........................................................................................................6 14) SOFT VPN CONCENTRATOR...............................................................................................................7 16) Wake On LAN ...................................................................................................................................7 17) Network Ports Monitoring.................................................................................................................8
  • 2. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 2 1) Virtualization Through ESXI Server Aim VMware vSphere Hypervisor is a free bare-metal hypervisor that virtualizes servers so you can consolidate your applications on less hardware. The main idea is to minimize the cost of hardware and increase the efficiency of the hardware by virtualized an application. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 2) SIEM (Security Information & Event Management) Engine Development Aim Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection and historical analysis of security events from a wide variety of event and contextual data sources. It also supports compliance reporting and incident investigation through analysis of historical data from these sources. The core capabilities of SIEM technology are a broad scope of event collection and the ability to correlate and analyze events across disparate sources. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 3) Mobile Log Management Tool Aim The aim is to provide a user management interface so that user can keep track of complete mobile log which includes, SMS, Images, CALL, Browsing history, it should be stored in server and It should be capable of being transferred to a server and then played back over the Web.
  • 3. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 3 4) Personal Device Data Encryption Aim As data becomes more portable and computers are more affordable, an increasing number of individuals are using personal devices to access, create, modify, or transport data. Failure to properly secure the data can present risks to Unauthorized use of data, the user, and the subjects of the data (e.g. UCSF patients, employees, research study participants), as sensitive and/or restricted data may be exposed to those without a need-to-know. For example, if an employee’s personal laptop (used to access and store patient protected health information (PHI)) was stolen, the patients whose information was on the device are at risk for unauthorized access, acquisition and use of their personal information, if the device was not properly secured. A System is required which encrypt all the data placed in a Personal Device. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 5) Centralized File Storage Server Aim This Project has a client/Server approach in which a Client has an ID to access the server and places his/her file on a server, Server will be maintaining the Data of each employee with respect to their ID's, and also set the limit of uploading the total data and the limit of file uploading, furthermore, if you want to enhance the project Specific File extensions, User data uploading history, user Logged in time would be value added work. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 6) Data Tempering Through C#.Net Aim Data Tempering is one of the feature introduced of Mozilla Firefox, data tempering contains all the values that are being generated by POST method. user can modify the POST packet when initiating the request. That packet may modify for example (Extensions, Constant Values, Date Time, Fields that are disabled on web). ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 4. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 4 7) Mobile Vulnerability Assessment Tool Aim The aim of this project is to develop a System that test the weaknesses of a mobile phone, Identify the exploits that are stored in a mobile phone. this system also measure the performance of mobile application and also report the Unusual activities made the applications, similarly this system would inform the user when any application made connectivity outside the scope of the local network. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 8) Mobile Data Synchronization Aim Being able to work offline is an expected feature of mobile applications. For data-driven applications, it means that you — the developer — will have to store (a subset of) your application data locally, and implement a data synchronization mechanism that keeps your local and server data in sync. Synchronization data would contain (Messages, Contacts, Photos, Calling history) all data should be travel encrypted on any medium suitable. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 9) Data Recovery Tool for USB Aim In software industry, the major problem is Data Lost, preventing data is one of the complex task , because data neither retrieved 100%, by enhancing the code an application is required to build a system that recover the data lost in a USB device. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 5. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 5 10) Secure DNS using Cryptography Aim The mapping or binding of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through different stages of development up to the currently used Domain Name System (DNS). The DNS Security is designed to provide security by combining the concept of both the Digital Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of Private key. The DNS security uses Message Digest Algorithm to compress the Message(text file) and PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The message combines with the Private key to form a Signature using DSA Algorithm, which is send along with the Public key. The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches with the Signature of the message received, the message is Decrypted and read else discarded. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 11) Web Alert System Aim Web Alerts is a windows application that communicates with the web services hosted by particular area like e-learning, stock, weather forecast etc. When you minimize, this tool disappears from the screen and you can see a Small icon in the system tray, which can be used to re activate the tool. Even when the tool is hidden, it works silently in the background. At some regular intervals of time, it communicates with web services to find if there is any new alert created. If it finds a new alert, the tool downloads the alerts and pops up a message displaying the alert. This message will include a short description and a URL to click. By clicking the URL, you can directly reach the web page represented by the alert. For example, when a new article is submitted in or when an answer is posted for your question, your Web Alerts tools will immediately popup alerting you to visit the page. For an applications like e-learning, marketing and Query processing even a web application can be developed for entry and editing and that can be tracked by windows, mobile and other application users thru web services. Every bank today sends alerts to their users when an amount is credited, withdrawn or a Cheque is presented. Similarly the alerts are generated for our application. Take an important area and design the application. Extend the application to register for alerts based on user choice. It is one of the hot requirements for every application today. This is one of the modern requirements for every desktop application today ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 6. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 10 12) Call center Tracker Aim Call Center Tracker is an increasingly important skill as the use of call centers becomes a popular method of centralizing information services, streamlining order taking and providing valuable customer support. The skills required to successfully set-up and manage a call center encompass everything from staff recruitment and personnel management, to technical understanding of the options available, and the all-important customer relationship management. From small customer service departments to large call centers, the importance of developing successful Call Center Tracker is vital for building a valued relationship with customers to support long-term business growth. This system (Call Center Tracker) is useful to the organization, it maintains the information about the employees and it also contains the necessary information of the customer and their phone Numbers, their services also. It also maintains the employee roaster details. This system will track the employee's login details. And also maintains the data the employee attend the call and his behavior with customer and the speech will be recorded into file. Sometimes customer request for service to the organization. This data also maintains the system ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 13) Creating SysLog Server in .NET Aim Syslog is a way for network devices to send event messages to a logging server – usually known as a Syslog server. The Syslog protocol is supported by a wide range of devices and can be used to log different types of events. For example, a router might send messages about users logging on to console sessions, while a web-server might log access-denied events.Most network equipment, like routers and switches, can send Syslog messages.
  • 7. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 10 14) SOFT VPN CONCENTRATOR Aim A VPN concentrator is a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes. A VPN concentrator is typically used for creating site-to-site VPN architectures. It can:  Establish and configure tunnels  Authenticate users  Assign tunnel/IP addresses to users  Encrypt and decrypt data  Ensure end-to-end delivery of data 15) User Activity Logging Aim The Aim is to design an Application for user logging activity started from the Login Session of Windows to all the activities that is being made by the user Operating System Level. All the activities sent to the Centralized database until the user logged off the session of Windows. Example of Activity Logging : 1) Name of the Application Opened 2) Installation and Un installation applications name 3) Browser visited URL's 4) New folder , File creation Name, Date 5) Sharing Files & Folder (Access Date , Time, Name) 6) External USB Drive (Access Date , Time, Name) etc ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 16) Wake On LAN Aim Wake-on-LAN (WoL) is an Ethernet computer networking standard that allows a computer to be turned on or awakened by a network message. Ethernet connections, including home and work networks, wireless data networks and the Internet itself, are based on packets of data sent between computers. Wake-on-LAN ("WOL") is implemented using a specially designed packet called a magic packet, which is sent to all computers in a network, among them the computer to be woken up. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 8. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 8 17) NetworkPorts Monitoring Aim This project aims at scanning the portsof Networkwith their respective Service Name,Network ports Scanning Informs the Total Numberof Host connect to anetwork, No of host that are not alive on a network and No of host that are just arrived ordisconnectfrom anetwork. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com _____________________________________________________________________
  翻译: