You are here: Home / Past Courses / Fall 2013 - ECPE 177 / Presentations / Presentation 2 - Security and Privacy

Presentation 2 - Security and Privacy

For this assignment, you will be providing an oral presentation to your peers in the networking class.

What do I need to do?

  1. Pick a single topic related to either network privacy or security that has been in the news in 2011, 2012, or 2013.
  2. Talk to or email the instructor for topic approval by posted deadline
    1. Provide a 3-sentence summary of your proposed topic
      Topic approval will prevent overlap in topics
  3. Read about your chosen topic and understand it in detail
    1. You should know more detail than what is actually covered in your presentation, because your peers or the instructor might ask a question at the end...
  4. Prepare a presentation for the class.  You should provide enough detail and background information such that your peers (other students in the class) are able to understand and appreciate your presentation.
    1. The presentation length should be 13-14 minutes plus 1 minute for questions.
    2. You should provide 7-10 PowerPoint slides -or- use the whiteboard during the presentation to convey useful figures and diagrams. (Some of your peers are visual learners, not auditory learners, and will better appreciate your presentation by viewing a figure instead of listening to your words).
  5. Upload your PowerPoint / PDF slides to the Sakai site by the posted deadline (midnight the day before). They will be assembled into a single file on the instructor machine, so we don't need to switch laptops during the class. (and you don't need to bring your own).
  6. Present! (during normal class time)

     

    Grading Breakdown

     

    Topics from Prior Years

    (Some topics are still relevant in 2013, while others may be "old news".  You are highly encouraged to suggest topics not listed here!)

    • EverCookie (persistent cookies)
    • DNSsec (encrypted DNS starting at the root name servers)
    • IPv6 and security - What does it make easier? What does it make harder?
    • Cross-site scripting (XSS) - Why is this a problem?
    • Privacy within social media sites
    • Tor (anonymity network) and "Onion routing"
    • FreeNet - decentralized, distributed data store
    • SOPA / PROTECT laws (and implications for DNS)
    • WikiLeaks - Who are they? Arguments of proponents and opponents?
    • Future internet designs - How can we make the Internet more secure?  New architectures...
    • Cloud Computing and security implications
    • Password cracking
    • Password generation / password managers
    • Any one of numerous examples of malicious activity:
      • Spam - particular spam rings?
      • Viruses / Worms / Trojans - pick one that is network-related
      • Malware / spyware - pick one that is network-related
      • Phishing attacks - Lots of attacks on social media sites
      • DDoS attacks - Who is the latest victim? What was the largest attack in the past?
      • DNS cache poisoning or DNS cache hijacking - What is the last victim? How do these attacks work?
      • ARP cache poisoning or spoofing
      • Botnets
      • Keystroke loggers
      • Root kits
      • Man-in-the-middle attacks
      • SQL injection attacks
      • etc...

     

    Selected Topics

    • Burkard - NSA spying
    • Chen - Cloud Computing (security implications)
    • Cowan - DDOS
    • Fong - EverCookie
    • Kimbrell - Rainbow Tables
    • Lee - AES (Advanced Encryption Standard)
    • Nunes - "Privacy-focused websites" (web proxies, anonymous websites, websites only in Tor)
    • Ohan - XSS (Cross-site scripting)
    • Rijhwani - Cyber-warfare (between nation states)
    • Snider - Mobile malware
    • Viebrock - SQL injection