You are here: Home / Past Courses / Fall 2015 - ECPE 177 / Presentations / Presentation 2 - Security and Privacy

Presentation 2 - Security and Privacy

For this assignment, you will be providing an oral presentation to your peers in the networking class.

What do I need to do?

  1. Pick a single topic related to either network privacy or security that has been in the news in 2013, 2014, or 2015.
  2. Talk to or email the instructor for topic approval by posted deadline
    1. Provide a 3-sentence summary of your proposed topic
      Topic approval will prevent overlap in topics
  3. Read about your chosen topic and understand it in detail
    1. You should know more detail than what is actually covered in your presentation, because your peers or the instructor might ask a question at the end...
  4. Prepare a presentation for the class.  You should provide enough detail and background information such that your peers (other students in the class) are able to understand and appreciate your presentation.
    1. The presentation length should be 12-13 minutes plus 1 minute for questions.
    2. You should provide 7-9 PowerPoint slides -or- use the whiteboard during the presentation to convey useful figures and diagrams. (Some of your peers are visual learners, not auditory learners, and will better appreciate your presentation by viewing a figure instead of listening to your words).
  5. Upload your PowerPoint slides to the Canvas site by the posted deadline (midnight the day before). They will be assembled into a single file on the instructor machine, so we don't need to switch laptops during the class. (and you don't need to bring your own).
  6. Present! (during normal class time)


Topics from Prior Years

(Some topics are still relevant in 2015, while others may be "old news".  You are highly encouraged to suggest topics not listed here!)

  • EverCookie (persistent cookies)
  • DNSsec (encrypted DNS starting at the root name servers)
  • IPv6 and security - What does it make easier? What does it make harder?
  • Cross-site scripting (XSS) - Why is this a problem?
  • Privacy within social media sites
  • Tor (anonymity network) and "Onion routing"
  • FreeNet - decentralized, distributed data store
  • SOPA / PROTECT laws (and implications for DNS)
  • WikiLeaks - Who are they? Arguments of proponents and opponents?
  • Future internet designs - How can we make the Internet more secure?  New architectures...
  • Cloud Computing and security implications
  • Password cracking
  • Password generation / password managers
  • Any one of numerous examples of malicious activity:
    • Spam - particular spam rings?
    • Viruses / Worms / Trojans - pick one that is network-related
    • Malware / spyware - pick one that is network-related
    • Phishing attacks - Lots of attacks on social media sites
    • DDoS attacks - Who is the latest victim? What was the largest attack in the past?
    • DNS cache poisoning or DNS cache hijacking - What is the last victim? How do these attacks work?
    • ARP cache poisoning or spoofing
    • Botnets
    • Keystroke loggers
    • Root kits
    • Man-in-the-middle attacks
    • SQL injection attacks
    • Timing attacks
    • etc...


Selected Topics / Presentation Order

Thursday, October 29th, 2015

  • James Rinaldi - Tor (anonymity network) and "Onion routing"
  • Parth Italia - Nation-state hacking (e.g. Chinese hackers attacking American targets)
  • Taylor Yatogo -
  • Mohammad Meraj - Phishing attacks (methods of attack, popular targets, methods of prevention)
  • Alexander Flores - Mobile payments
  • Francisco Tapia Martinez - RansomWare
  • Kenneth Thompson - Voice over LTE


Thursday, November 5th, 2015

  • Craig Goble - Location tracking and location hiding
  • Samuel Mills - Botnets
  • Alexander Murray - IPv6
  • Khanjan Sompura - Dridex Malware
  • Tyler Fernandez - DDOS
  • Connor Clarke - Cloud computing security


Tuesday, November 10th, 2015

  • Joseph Grant - SSL/TLS
  • Marcus Barnes - Android's Stagefright (mobile malware)
  • Kelvin Flores - ARP cache poisoning / spoofing
  • Yunpeng Zhang - Attack points (Human, physical, LAN/Insider, WAN/Remote, Wireless)
  • Kyle Shepodd - SYNful knock (router malware)
  • David De La Vega - RF hacking across the wireless spectrum (e.g. "Funtenna")