Difference between revisions of "White Paper Projects"
From CyberSecurity
(Project page to help team formation) |
|||
Line 1: | Line 1: | ||
− | *Nuclear Weapons | + | '''PLEASE READ'''<br> |
− | ** | + | Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''. |
− | *Chemical Weapons | + | |
− | ** | + | *'''Nuclear Weapons''' |
− | *Biological Weapons | + | **.. |
− | ** | + | *'''Chemical Weapons''' |
− | *Radiological Weapons | + | **.. |
− | ** | + | *'''Biological Weapons''' |
− | *Privacy and Data | + | **.. |
− | ** | + | *'''Radiological Weapons''' |
− | *Encryption Policy | + | **.. |
− | ** | + | *'''Privacy and Data''' |
− | *Open Source and Cybersecurity | + | **.. |
− | ** | + | *'''Encryption Policy''' |
− | *Interrogation & Torture | + | **.. |
− | ** | + | *'''Open Source and Cybersecurity''' |
− | *State-Sponsored Hacking | + | **.. |
− | ** | + | *'''Interrogation & Torture''' |
− | *Cyberterrorism | + | **.. |
− | ** | + | *'''State-Sponsored Hacking''' |
− | *Cybersecurity and National Infrastructure | + | **.. |
− | ** | + | *'''Cyberterrorism''' |
− | *Cybersecurity and Law | + | **.. |
− | ** | + | *'''Cybersecurity and National Infrastructure''' |
− | *Cyber Criminal Activity | + | **.. |
− | ** | + | *'''Cybersecurity and Law''' |
− | *Liability | + | **.. |
− | ** | + | *'''Cyber Criminal Activity''' |
− | *Education, Exploits, Cyberculture | + | **Avichal Singh |
− | ** | + | **.. |
− | *Offense vs. Defense | + | *'''Liability''' |
− | ** | + | **.. |
+ | *'''Education, Exploits, Cyberculture''' | ||
+ | **.. | ||
+ | *'''Offense vs. Defense''' | ||
+ | **.. | ||
+ | |||
+ | This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks. |
Revision as of 18:44, 2 November 2005
PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.
- Nuclear Weapons
- ..
- Chemical Weapons
- ..
- Biological Weapons
- ..
- Radiological Weapons
- ..
- Privacy and Data
- ..
- Encryption Policy
- ..
- Open Source and Cybersecurity
- ..
- Interrogation & Torture
- ..
- State-Sponsored Hacking
- ..
- Cyberterrorism
- ..
- Cybersecurity and National Infrastructure
- ..
- Cybersecurity and Law
- ..
- Cyber Criminal Activity
- Avichal Singh
- ..
- Liability
- ..
- Education, Exploits, Cyberculture
- ..
- Offense vs. Defense
- ..
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.