Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security
Final Year Projects Computer Science (Information security) -2015
1. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 1
Projects Ideas
Contents
1) Virtualization Through ESXI Server.....................................................................................................2
2) SIEM(Security Information & Event Management) Engine Development ...............................................2
3) Mobile Log Management Tool ...........................................................................................................2
4) Personal Device Data Encryption..........................................................................................................3
5) Centralized File Storage Server..........................................................................................................3
6) Data Tempering Through C#.Net........................................................................................................3
7) Mobile Vulnerability Assessment Tool................................................................................................4
8) Mobile Data Synchronization.............................................................................................................4
9) Data Recovery Tool for USB...............................................................................................................4
11) Web Alert System.............................................................................................................................5
12) Call center Tracker............................................................................................................................6
13) Creating SysLog Server in .NET...........................................................................................................6
14) SOFT VPN CONCENTRATOR...............................................................................................................7
16) Wake On LAN ...................................................................................................................................7
17) Network Ports Monitoring.................................................................................................................8
2. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 2
1) Virtualization Through ESXI Server
Aim
VMware vSphere Hypervisor is a free bare-metal hypervisor that virtualizes servers so you can
consolidate your applications on less hardware. The main idea is to minimize the cost of hardware
and increase the efficiency of the hardware by virtualized an application.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
2) SIEM (Security Information & Event Management) Engine Development
Aim
Security information and event management (SIEM) technology supports threat detection and
security incident response through the real-time collection and historical analysis of security events
from a wide variety of event and contextual data sources. It also supports compliance reporting and
incident investigation through analysis of historical data from these sources. The core capabilities of
SIEM technology are a broad scope of event collection and the ability to correlate and analyze events
across disparate sources.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
3) Mobile Log Management Tool
Aim
The aim is to provide a user management interface so that user can keep track of complete mobile
log which includes, SMS, Images, CALL, Browsing history, it should be stored in server and It should
be capable of being transferred to a server and then played back over the Web.
3. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 3
4) Personal Device Data Encryption
Aim
As data becomes more portable and computers are more affordable, an increasing number of
individuals are using personal devices to access, create, modify, or transport data. Failure to
properly secure the data can present risks to Unauthorized use of data, the user, and the subjects of
the data (e.g. UCSF patients, employees, research study participants), as sensitive and/or restricted
data may be exposed to those without a need-to-know. For example, if an employee’s personal
laptop (used to access and store patient protected health information (PHI)) was stolen, the patients
whose information was on the device are at risk for unauthorized access, acquisition and use of their
personal information, if the device was not properly secured. A System is required which encrypt all
the data placed in a Personal Device.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
5) Centralized File Storage Server
Aim
This Project has a client/Server approach in which a Client has an ID to access the server and places
his/her file on a server, Server will be maintaining the Data of each employee with respect to their
ID's, and also set the limit of uploading the total data and the limit of file uploading, furthermore, if
you want to enhance the project Specific File extensions, User data uploading history, user Logged in
time would be value added work.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
6) Data Tempering Through C#.Net
Aim
Data Tempering is one of the feature introduced of Mozilla Firefox, data tempering contains all the
values that are being generated by POST method. user can modify the POST packet when initiating
the request. That packet may modify for example (Extensions, Constant Values, Date Time, Fields
that are disabled on web).
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
4. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 4
7) Mobile Vulnerability Assessment Tool
Aim
The aim of this project is to develop a System that test the weaknesses of a mobile phone, Identify
the exploits that are stored in a mobile phone. this system also measure the performance of mobile
application and also report the Unusual activities made the applications, similarly this system would
inform the user when any application made connectivity outside the scope of the local network.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
8) Mobile Data Synchronization
Aim
Being able to work offline is an expected feature of mobile applications. For data-driven applications,
it means that you — the developer — will have to store (a subset of) your application data locally,
and implement a data synchronization mechanism that keeps your local and server data in sync.
Synchronization data would contain (Messages, Contacts, Photos, Calling history) all data should be
travel encrypted on any medium suitable.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
9) Data Recovery Tool for USB
Aim
In software industry, the major problem is Data Lost, preventing data is one of the complex task ,
because data neither retrieved 100%, by enhancing the code an application is required to build a
system that recover the data lost in a USB device.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
5. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 5
10) Secure DNS using Cryptography
Aim
The mapping or binding of IP addresses to host names became a major problem in the rapidly
growing Internet and the higher level binding effort went through different stages of development up
to the currently used Domain Name System (DNS).
The DNS Security is designed to provide security by combining the concept of both the Digital
Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of
Private key. The DNS security uses Message Digest Algorithm to compress the Message(text file) and
PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The
message combines with the Private key to form a Signature using DSA Algorithm, which is send
along with the Public key.
The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches
with the Signature of the message received, the message is Decrypted and read else discarded.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
11) Web Alert System
Aim
Web Alerts is a windows application that communicates with the web services hosted by particular
area like e-learning, stock, weather forecast etc. When you minimize, this tool disappears from the
screen and you can see a Small icon in the system tray, which can be used to re activate the tool.
Even when the tool is hidden, it works silently in the background. At some regular intervals of time, it
communicates with web services to find if there is any new alert created. If it finds a new alert, the
tool downloads the alerts and pops up a message displaying the alert. This message will include a
short description and a URL to click.
By clicking the URL, you can directly reach the web page represented by the alert. For example,
when a new article is submitted in or when an answer is posted for your question, your Web Alerts
tools will immediately popup alerting you to visit the page. For an applications like e-learning,
marketing and Query processing even a web application can be developed for entry and editing and
that can be tracked by windows, mobile and other application users thru web services. Every bank
today sends alerts to their users when an amount is credited, withdrawn or a Cheque is presented.
Similarly the alerts are generated for our application. Take an important area and design the
application. Extend the application to register for alerts based on user choice. It is one of the hot
requirements for every application today. This is one of the modern requirements for every desktop
application today
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
6. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 10
12) Call center Tracker
Aim
Call Center Tracker is an increasingly important skill as the use of call centers becomes a popular
method of centralizing information services, streamlining order taking and providing valuable
customer support. The skills required to successfully set-up and manage a call center encompass
everything from staff recruitment and personnel management, to technical understanding of the
options available, and the
all-important customer relationship management. From small customer service departments to large
call centers, the importance of developing successful Call Center Tracker is vital for building a valued
relationship with customers to support long-term business growth.
This system (Call Center Tracker) is useful to the organization, it maintains the information about the
employees and it also contains the necessary information of the customer and their phone Numbers,
their services also. It also maintains the employee roaster details.
This system will track the employee's login details. And also maintains the data the employee attend
the
call and his behavior with customer and the speech will be recorded into file. Sometimes customer
request for service to the organization. This data also maintains the system
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
13) Creating SysLog Server in .NET
Aim
Syslog is a way for network devices to send event messages to a logging server – usually known as a
Syslog server. The Syslog protocol is supported by a wide range of devices and can be used to log
different types of events. For example, a router might send messages about users logging on to
console sessions, while a web-server might log access-denied events.Most network equipment, like
routers and switches, can send Syslog messages.
7. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 10
14) SOFT VPN CONCENTRATOR
Aim
A VPN concentrator is a type of networking device that provides secure creation of VPN connections
and delivery of messages between VPN nodes.
A VPN concentrator is typically used for creating site-to-site VPN architectures. It can:
Establish and configure tunnels
Authenticate users
Assign tunnel/IP addresses to users
Encrypt and decrypt data
Ensure end-to-end delivery of data
15) User Activity Logging
Aim
The Aim is to design an Application for user logging activity started from the Login Session of
Windows to all the activities that is being made by the user Operating System Level. All the activities
sent to the Centralized database until the user logged off the session of Windows.
Example of Activity Logging :
1) Name of the Application Opened
2) Installation and Un installation applications name
3) Browser visited URL's
4) New folder , File creation Name, Date
5) Sharing Files & Folder (Access Date , Time, Name)
6) External USB Drive (Access Date , Time, Name) etc
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
16) Wake On LAN
Aim
Wake-on-LAN (WoL) is an Ethernet computer networking standard that allows a computer to be
turned on or awakened by a network message.
Ethernet connections, including home and work networks, wireless data networks and the Internet
itself, are based on packets of data sent between computers. Wake-on-LAN ("WOL") is implemented
using a specially designed packet called a magic packet, which is sent to all computers in a network,
among them the computer to be woken up.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
8. Final Year Project ideas for Computer Science
Information Security Students 2015
Author: Syed Ubaid Ali Jafri Page 8
17) NetworkPorts Monitoring
Aim
This project aims at scanning the portsof Networkwith their respective Service Name,Network ports
Scanning Informs the Total Numberof Host connect to anetwork, No of host that are not alive on a
network and No of host that are just arrived ordisconnectfrom anetwork.
ForFurther Details of the above project Contact : ubaidalijaffery@hotmail.com
_____________________________________________________________________