SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 1
Projects Ideas
Contents
1) Virtualization Through ESXI Server.....................................................................................................2
2) SIEM(Security Information & Event Management) Engine Development ...............................................2
3) Mobile Log Management Tool ...........................................................................................................2
4) Personal Device Data Encryption..........................................................................................................3
5) Centralized File Storage Server..........................................................................................................3
6) Data Tempering Through C#.Net........................................................................................................3
7) Mobile Vulnerability Assessment Tool................................................................................................4
8) Mobile Data Synchronization.............................................................................................................4
9) Data Recovery Tool for USB...............................................................................................................4
11) Web Alert System.............................................................................................................................5
12) Call center Tracker............................................................................................................................6
13) Creating SysLog Server in .NET...........................................................................................................6
14) SOFT VPN CONCENTRATOR...............................................................................................................7
16) Wake On LAN ...................................................................................................................................7
17) Network Ports Monitoring.................................................................................................................8
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 2
1) Virtualization Through ESXI Server
Aim
VMware vSphere Hypervisor is a free bare-metal hypervisor that virtualizes servers so you can
consolidate your applications on less hardware. The main idea is to minimize the cost of hardware
and increase the efficiency of the hardware by virtualized an application.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
2) SIEM (Security Information & Event Management) Engine Development
Aim
Security information and event management (SIEM) technology supports threat detection and
security incident response through the real-time collection and historical analysis of security events
from a wide variety of event and contextual data sources. It also supports compliance reporting and
incident investigation through analysis of historical data from these sources. The core capabilities of
SIEM technology are a broad scope of event collection and the ability to correlate and analyze events
across disparate sources.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
3) Mobile Log Management Tool
Aim
The aim is to provide a user management interface so that user can keep track of complete mobile
log which includes, SMS, Images, CALL, Browsing history, it should be stored in server and It should
be capable of being transferred to a server and then played back over the Web.
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 3
4) Personal Device Data Encryption
Aim
As data becomes more portable and computers are more affordable, an increasing number of
individuals are using personal devices to access, create, modify, or transport data. Failure to
properly secure the data can present risks to Unauthorized use of data, the user, and the subjects of
the data (e.g. UCSF patients, employees, research study participants), as sensitive and/or restricted
data may be exposed to those without a need-to-know. For example, if an employee’s personal
laptop (used to access and store patient protected health information (PHI)) was stolen, the patients
whose information was on the device are at risk for unauthorized access, acquisition and use of their
personal information, if the device was not properly secured. A System is required which encrypt all
the data placed in a Personal Device.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
5) Centralized File Storage Server
Aim
This Project has a client/Server approach in which a Client has an ID to access the server and places
his/her file on a server, Server will be maintaining the Data of each employee with respect to their
ID's, and also set the limit of uploading the total data and the limit of file uploading, furthermore, if
you want to enhance the project Specific File extensions, User data uploading history, user Logged in
time would be value added work.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
6) Data Tempering Through C#.Net
Aim
Data Tempering is one of the feature introduced of Mozilla Firefox, data tempering contains all the
values that are being generated by POST method. user can modify the POST packet when initiating
the request. That packet may modify for example (Extensions, Constant Values, Date Time, Fields
that are disabled on web).
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 4
7) Mobile Vulnerability Assessment Tool
Aim
The aim of this project is to develop a System that test the weaknesses of a mobile phone, Identify
the exploits that are stored in a mobile phone. this system also measure the performance of mobile
application and also report the Unusual activities made the applications, similarly this system would
inform the user when any application made connectivity outside the scope of the local network.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
8) Mobile Data Synchronization
Aim
Being able to work offline is an expected feature of mobile applications. For data-driven applications,
it means that you — the developer — will have to store (a subset of) your application data locally,
and implement a data synchronization mechanism that keeps your local and server data in sync.
Synchronization data would contain (Messages, Contacts, Photos, Calling history) all data should be
travel encrypted on any medium suitable.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
9) Data Recovery Tool for USB
Aim
In software industry, the major problem is Data Lost, preventing data is one of the complex task ,
because data neither retrieved 100%, by enhancing the code an application is required to build a
system that recover the data lost in a USB device.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 5
10) Secure DNS using Cryptography
Aim
The mapping or binding of IP addresses to host names became a major problem in the rapidly
growing Internet and the higher level binding effort went through different stages of development up
to the currently used Domain Name System (DNS).
The DNS Security is designed to provide security by combining the concept of both the Digital
Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of
Private key. The DNS security uses Message Digest Algorithm to compress the Message(text file) and
PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The
message combines with the Private key to form a Signature using DSA Algorithm, which is send
along with the Public key.
The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches
with the Signature of the message received, the message is Decrypted and read else discarded.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
11) Web Alert System
Aim
Web Alerts is a windows application that communicates with the web services hosted by particular
area like e-learning, stock, weather forecast etc. When you minimize, this tool disappears from the
screen and you can see a Small icon in the system tray, which can be used to re activate the tool.
Even when the tool is hidden, it works silently in the background. At some regular intervals of time, it
communicates with web services to find if there is any new alert created. If it finds a new alert, the
tool downloads the alerts and pops up a message displaying the alert. This message will include a
short description and a URL to click.
By clicking the URL, you can directly reach the web page represented by the alert. For example,
when a new article is submitted in or when an answer is posted for your question, your Web Alerts
tools will immediately popup alerting you to visit the page. For an applications like e-learning,
marketing and Query processing even a web application can be developed for entry and editing and
that can be tracked by windows, mobile and other application users thru web services. Every bank
today sends alerts to their users when an amount is credited, withdrawn or a Cheque is presented.
Similarly the alerts are generated for our application. Take an important area and design the
application. Extend the application to register for alerts based on user choice. It is one of the hot
requirements for every application today. This is one of the modern requirements for every desktop
application today
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 10
12) Call center Tracker
Aim
Call Center Tracker is an increasingly important skill as the use of call centers becomes a popular
method of centralizing information services, streamlining order taking and providing valuable
customer support. The skills required to successfully set-up and manage a call center encompass
everything from staff recruitment and personnel management, to technical understanding of the
options available, and the
all-important customer relationship management. From small customer service departments to large
call centers, the importance of developing successful Call Center Tracker is vital for building a valued
relationship with customers to support long-term business growth.
This system (Call Center Tracker) is useful to the organization, it maintains the information about the
employees and it also contains the necessary information of the customer and their phone Numbers,
their services also. It also maintains the employee roaster details.
This system will track the employee's login details. And also maintains the data the employee attend
the
call and his behavior with customer and the speech will be recorded into file. Sometimes customer
request for service to the organization. This data also maintains the system
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
13) Creating SysLog Server in .NET
Aim
Syslog is a way for network devices to send event messages to a logging server – usually known as a
Syslog server. The Syslog protocol is supported by a wide range of devices and can be used to log
different types of events. For example, a router might send messages about users logging on to
console sessions, while a web-server might log access-denied events.Most network equipment, like
routers and switches, can send Syslog messages.
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 10
14) SOFT VPN CONCENTRATOR
Aim
A VPN concentrator is a type of networking device that provides secure creation of VPN connections
and delivery of messages between VPN nodes.
A VPN concentrator is typically used for creating site-to-site VPN architectures. It can:
 Establish and configure tunnels
 Authenticate users
 Assign tunnel/IP addresses to users
 Encrypt and decrypt data
 Ensure end-to-end delivery of data
15) User Activity Logging
Aim
The Aim is to design an Application for user logging activity started from the Login Session of
Windows to all the activities that is being made by the user Operating System Level. All the activities
sent to the Centralized database until the user logged off the session of Windows.
Example of Activity Logging :
1) Name of the Application Opened
2) Installation and Un installation applications name
3) Browser visited URL's
4) New folder , File creation Name, Date
5) Sharing Files & Folder (Access Date , Time, Name)
6) External USB Drive (Access Date , Time, Name) etc
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
16) Wake On LAN
Aim
Wake-on-LAN (WoL) is an Ethernet computer networking standard that allows a computer to be
turned on or awakened by a network message.
Ethernet connections, including home and work networks, wireless data networks and the Internet
itself, are based on packets of data sent between computers. Wake-on-LAN ("WOL") is implemented
using a specially designed packet called a magic packet, which is sent to all computers in a network,
among them the computer to be woken up.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 8
17) NetworkPorts Monitoring
Aim
This project aims at scanning the portsof Networkwith their respective Service Name,Network ports
Scanning Informs the Total Numberof Host connect to anetwork, No of host that are not alive on a
network and No of host that are just arrived ordisconnectfrom anetwork.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
_____________________________________________________________________

Weitere ähnliche Inhalte

Was ist angesagt?

CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
pkaviya
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 

Was ist angesagt? (20)

Networking in cloud computing
Networking in cloud computingNetworking in cloud computing
Networking in cloud computing
 
Canteen automation system (updated) revised
Canteen automation system (updated) revisedCanteen automation system (updated) revised
Canteen automation system (updated) revised
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Cloud computing benefits
Cloud computing benefitsCloud computing benefits
Cloud computing benefits
 
Google cloud computing
Google cloud computingGoogle cloud computing
Google cloud computing
 
Splunk HTTP Event Collector
Splunk HTTP Event CollectorSplunk HTTP Event Collector
Splunk HTTP Event Collector
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | EdurekaCloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
 
Unit 4
Unit 4Unit 4
Unit 4
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
 
Fog computing
Fog computingFog computing
Fog computing
 
SplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNowSplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNow
 

Andere mochten auch

Best Final Year Projects
Best Final Year ProjectsBest Final Year Projects
Best Final Year Projects
ncct
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
Tumennast Erdenebold
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
 

Andere mochten auch (10)

RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifsRSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
RSE : Réseaux Sociaux d'Entreprise, nouveaux outils collaboratifs
 
Best Final Year Projects
Best Final Year ProjectsBest Final Year Projects
Best Final Year Projects
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
Comment j'ai amélioré mon Kanban grâce à Bison futé - KanbanDay FR 2015
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 

Ähnlich wie Final Year Projects Computer Science (Information security) -2015

Java project titles
Java project titlesJava project titles
Java project titles
Ashly Liza
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
wkyra78
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
Journal For Research
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
Jill Lyons
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
Beji Jacob
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
Bimpe Animashaun
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 

Ähnlich wie Final Year Projects Computer Science (Information security) -2015 (19)

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Java project titles
Java project titlesJava project titles
Java project titles
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
 
Topic 7
Topic 7Topic 7
Topic 7
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 

Mehr von Syed Ubaid Ali Jafri

Mehr von Syed Ubaid Ali Jafri (18)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
 
LAN Security
LAN Security LAN Security
LAN Security
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Final Year Projects Computer Science (Information security) -2015

  • 1. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 1 Projects Ideas Contents 1) Virtualization Through ESXI Server.....................................................................................................2 2) SIEM(Security Information & Event Management) Engine Development ...............................................2 3) Mobile Log Management Tool ...........................................................................................................2 4) Personal Device Data Encryption..........................................................................................................3 5) Centralized File Storage Server..........................................................................................................3 6) Data Tempering Through C#.Net........................................................................................................3 7) Mobile Vulnerability Assessment Tool................................................................................................4 8) Mobile Data Synchronization.............................................................................................................4 9) Data Recovery Tool for USB...............................................................................................................4 11) Web Alert System.............................................................................................................................5 12) Call center Tracker............................................................................................................................6 13) Creating SysLog Server in .NET...........................................................................................................6 14) SOFT VPN CONCENTRATOR...............................................................................................................7 16) Wake On LAN ...................................................................................................................................7 17) Network Ports Monitoring.................................................................................................................8
  • 2. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 2 1) Virtualization Through ESXI Server Aim VMware vSphere Hypervisor is a free bare-metal hypervisor that virtualizes servers so you can consolidate your applications on less hardware. The main idea is to minimize the cost of hardware and increase the efficiency of the hardware by virtualized an application. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 2) SIEM (Security Information & Event Management) Engine Development Aim Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection and historical analysis of security events from a wide variety of event and contextual data sources. It also supports compliance reporting and incident investigation through analysis of historical data from these sources. The core capabilities of SIEM technology are a broad scope of event collection and the ability to correlate and analyze events across disparate sources. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 3) Mobile Log Management Tool Aim The aim is to provide a user management interface so that user can keep track of complete mobile log which includes, SMS, Images, CALL, Browsing history, it should be stored in server and It should be capable of being transferred to a server and then played back over the Web.
  • 3. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 3 4) Personal Device Data Encryption Aim As data becomes more portable and computers are more affordable, an increasing number of individuals are using personal devices to access, create, modify, or transport data. Failure to properly secure the data can present risks to Unauthorized use of data, the user, and the subjects of the data (e.g. UCSF patients, employees, research study participants), as sensitive and/or restricted data may be exposed to those without a need-to-know. For example, if an employee’s personal laptop (used to access and store patient protected health information (PHI)) was stolen, the patients whose information was on the device are at risk for unauthorized access, acquisition and use of their personal information, if the device was not properly secured. A System is required which encrypt all the data placed in a Personal Device. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 5) Centralized File Storage Server Aim This Project has a client/Server approach in which a Client has an ID to access the server and places his/her file on a server, Server will be maintaining the Data of each employee with respect to their ID's, and also set the limit of uploading the total data and the limit of file uploading, furthermore, if you want to enhance the project Specific File extensions, User data uploading history, user Logged in time would be value added work. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 6) Data Tempering Through C#.Net Aim Data Tempering is one of the feature introduced of Mozilla Firefox, data tempering contains all the values that are being generated by POST method. user can modify the POST packet when initiating the request. That packet may modify for example (Extensions, Constant Values, Date Time, Fields that are disabled on web). ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 4. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 4 7) Mobile Vulnerability Assessment Tool Aim The aim of this project is to develop a System that test the weaknesses of a mobile phone, Identify the exploits that are stored in a mobile phone. this system also measure the performance of mobile application and also report the Unusual activities made the applications, similarly this system would inform the user when any application made connectivity outside the scope of the local network. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 8) Mobile Data Synchronization Aim Being able to work offline is an expected feature of mobile applications. For data-driven applications, it means that you — the developer — will have to store (a subset of) your application data locally, and implement a data synchronization mechanism that keeps your local and server data in sync. Synchronization data would contain (Messages, Contacts, Photos, Calling history) all data should be travel encrypted on any medium suitable. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 9) Data Recovery Tool for USB Aim In software industry, the major problem is Data Lost, preventing data is one of the complex task , because data neither retrieved 100%, by enhancing the code an application is required to build a system that recover the data lost in a USB device. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 5. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 5 10) Secure DNS using Cryptography Aim The mapping or binding of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through different stages of development up to the currently used Domain Name System (DNS). The DNS Security is designed to provide security by combining the concept of both the Digital Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of Private key. The DNS security uses Message Digest Algorithm to compress the Message(text file) and PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The message combines with the Private key to form a Signature using DSA Algorithm, which is send along with the Public key. The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches with the Signature of the message received, the message is Decrypted and read else discarded. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 11) Web Alert System Aim Web Alerts is a windows application that communicates with the web services hosted by particular area like e-learning, stock, weather forecast etc. When you minimize, this tool disappears from the screen and you can see a Small icon in the system tray, which can be used to re activate the tool. Even when the tool is hidden, it works silently in the background. At some regular intervals of time, it communicates with web services to find if there is any new alert created. If it finds a new alert, the tool downloads the alerts and pops up a message displaying the alert. This message will include a short description and a URL to click. By clicking the URL, you can directly reach the web page represented by the alert. For example, when a new article is submitted in or when an answer is posted for your question, your Web Alerts tools will immediately popup alerting you to visit the page. For an applications like e-learning, marketing and Query processing even a web application can be developed for entry and editing and that can be tracked by windows, mobile and other application users thru web services. Every bank today sends alerts to their users when an amount is credited, withdrawn or a Cheque is presented. Similarly the alerts are generated for our application. Take an important area and design the application. Extend the application to register for alerts based on user choice. It is one of the hot requirements for every application today. This is one of the modern requirements for every desktop application today ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 6. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 10 12) Call center Tracker Aim Call Center Tracker is an increasingly important skill as the use of call centers becomes a popular method of centralizing information services, streamlining order taking and providing valuable customer support. The skills required to successfully set-up and manage a call center encompass everything from staff recruitment and personnel management, to technical understanding of the options available, and the all-important customer relationship management. From small customer service departments to large call centers, the importance of developing successful Call Center Tracker is vital for building a valued relationship with customers to support long-term business growth. This system (Call Center Tracker) is useful to the organization, it maintains the information about the employees and it also contains the necessary information of the customer and their phone Numbers, their services also. It also maintains the employee roaster details. This system will track the employee's login details. And also maintains the data the employee attend the call and his behavior with customer and the speech will be recorded into file. Sometimes customer request for service to the organization. This data also maintains the system ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 13) Creating SysLog Server in .NET Aim Syslog is a way for network devices to send event messages to a logging server – usually known as a Syslog server. The Syslog protocol is supported by a wide range of devices and can be used to log different types of events. For example, a router might send messages about users logging on to console sessions, while a web-server might log access-denied events.Most network equipment, like routers and switches, can send Syslog messages.
  • 7. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 10 14) SOFT VPN CONCENTRATOR Aim A VPN concentrator is a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes. A VPN concentrator is typically used for creating site-to-site VPN architectures. It can:  Establish and configure tunnels  Authenticate users  Assign tunnel/IP addresses to users  Encrypt and decrypt data  Ensure end-to-end delivery of data 15) User Activity Logging Aim The Aim is to design an Application for user logging activity started from the Login Session of Windows to all the activities that is being made by the user Operating System Level. All the activities sent to the Centralized database until the user logged off the session of Windows. Example of Activity Logging : 1) Name of the Application Opened 2) Installation and Un installation applications name 3) Browser visited URL's 4) New folder , File creation Name, Date 5) Sharing Files & Folder (Access Date , Time, Name) 6) External USB Drive (Access Date , Time, Name) etc ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com 16) Wake On LAN Aim Wake-on-LAN (WoL) is an Ethernet computer networking standard that allows a computer to be turned on or awakened by a network message. Ethernet connections, including home and work networks, wireless data networks and the Internet itself, are based on packets of data sent between computers. Wake-on-LAN ("WOL") is implemented using a specially designed packet called a magic packet, which is sent to all computers in a network, among them the computer to be woken up. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
  • 8. Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 8 17) NetworkPorts Monitoring Aim This project aims at scanning the portsof Networkwith their respective Service Name,Network ports Scanning Informs the Total Numberof Host connect to anetwork, No of host that are not alive on a network and No of host that are just arrived ordisconnectfrom anetwork. ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com _____________________________________________________________________