Size: 1454
Comment:
|
← Revision 6 as of 2015-02-19 15:36:23 ⇥
Size: 1510
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
Research Topics: '''Examples''' '''Authentication Systems''': Give a taxonomy of authentication systems by evaluating the different types {(username, password), (User Certificates), (Single Sign-on systems)} and uses {(Open ID for use across multiple systems), (Enterprise Systems for silod or closed environments), (Single computer environments), {public vs. private access)}. The question you are answering: What is the state of the art for authentication systems in the different environments? Must See Systems: Open LDAP, Active Directory, Open ID, Google and Facebook authentication, certificates (server and user) etc. '''Firewalls''': Evaluate single system vs. small networks vs. large multi-location enterprises. Give a taxonomy across types and sizes. Our book has a good discussion of firewalls and you should start there. Don’t forget to differentiate between software vs. hardware as well. Routing plays a key role in firewalls. Evaluate routing options as well including bridging firewalls. '''More Topics:''' | = Research Topics = ---- == Examples == '''Authentication Systems''': Give a taxonomy of authentication systems by evaluating the different types {(username, password), (User Certificates), (Single Sign-on systems)} and uses {(Open ID for use across multiple systems), (Enterprise Systems for silod or closed environments), (Single computer environments), {public vs. private access)}. |
Line 3: | Line 6: |
* · Intrusion Detection/Prevention Systems * · Personal encryption solutions for disk drives, email etc. * · Identity protection solutions * · Virus protection solutions * · Security Appliances appropriate for Autonomous systems * · Enterprise wireless security systems * · SNMP management systems |
The question you are answering: What is the state of the art for authentication systems in the different environments? Must See Systems: Open LDAP, Active Directory, Open ID, Google and Facebook authentication, certificates (server and user) etc. '''Firewalls''': Evaluate single system vs. small networks vs. large multi-location enterprises. Give a taxonomy across types and sizes. Our book has a good discussion of firewalls and you should start there. Don’t forget to differentiate between software vs. hardware as well. Routing plays a key role in firewalls. Evaluate routing options as well including bridging firewalls. == More Topics == * Intrusion Detection/Prevention Systems * Personal encryption solutions for disk drives, email etc. * Identity protection solutions * Virus protection solutions * Security Appliances appropriate for Autonomous systems * Enterprise wireless security systems * Cross Site Scripting (see: https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet) * SNMP management systems |
Research Topics
Examples
Authentication Systems: Give a taxonomy of authentication systems by evaluating the different types {(username, password), (User Certificates), (Single Sign-on systems)} and uses {(Open ID for use across multiple systems), (Enterprise Systems for silod or closed environments), (Single computer environments), {public vs. private access)}.
The question you are answering: What is the state of the art for authentication systems in the different environments? Must See Systems: Open LDAP, Active Directory, Open ID, Google and Facebook authentication, certificates (server and user) etc.
Firewalls: Evaluate single system vs. small networks vs. large multi-location enterprises. Give a taxonomy across types and sizes. Our book has a good discussion of firewalls and you should start there. Don’t forget to differentiate between software vs. hardware as well.
Routing plays a key role in firewalls. Evaluate routing options as well including bridging firewalls.
More Topics
- Intrusion Detection/Prevention Systems
- Personal encryption solutions for disk drives, email etc.
- Identity protection solutions
- Virus protection solutions
- Security Appliances appropriate for Autonomous systems
- Enterprise wireless security systems
Cross Site Scripting (see: https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet)
- SNMP management systems
- You may also propose your own topic.