Difference between revisions of "White Paper Projects"
From CyberSecurity
Keunwoo Lee (talk | contribs) |
|||
Line 12: | Line 12: | ||
*'''[[Privacy and Data]]''' | *'''[[Privacy and Data]]''' | ||
**[[User:Santtu|Santtu Voutilainen]] | **[[User:Santtu|Santtu Voutilainen]] | ||
+ | **[[User:Keunwoo Lee|Keunwoo Lee]] | ||
**.. | **.. | ||
*'''Encryption Policy''' | *'''Encryption Policy''' | ||
Line 34: | Line 35: | ||
*'''State-Sponsored Hacking''' | *'''State-Sponsored Hacking''' | ||
− | ** | + | **.. |
*'''Cyberterrorism''' | *'''Cyberterrorism''' | ||
**.. | **.. | ||
Line 52: | Line 53: | ||
**.. | **.. | ||
*'''Education, Exploits, Cyberculture''' | *'''Education, Exploits, Cyberculture''' | ||
− | ** | + | **.. |
*'''Offense vs. Defense''' | *'''Offense vs. Defense''' | ||
**[[Yi-Kai Liu]] | **[[Yi-Kai Liu]] |
Revision as of 21:04, 10 November 2005
PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.
- Nuclear Weapons
- ..
- Chemical Weapons
- ..
- Biological Weapons
- ..
- Radiological Weapons
- ..
- Privacy and Data
- Encryption Policy
- ..
- Open Source and Cybersecurity
- Interrogation & Torture
- Zolfaghari
- Dennis Galvin
- Chris DuPuis
- Sean Cardeno (UCB)
- Barbra Ramos (UCB)
Interrogation and Torture Group 2: Katie Veazey (UCB), Ian Richardson (UCB), Justin Delacruz (UCB), Cameron Mckenzie (UCB),
- State-Sponsored Hacking
- ..
- Cyberterrorism
- ..
- Cybersecurity and National Infrastructure
- ..
- Cybersecurity and Law
- Cyber Criminal Activity - We need a policy student
- Cyber Criminal Activity (group 2) - Could we have a second group work on this topic since the first group already closed for engineer student?
- Liability
- ..
- Education, Exploits, Cyberculture
- ..
- Offense vs. Defense
- Yi-Kai Liu
- Drew Hoskins
- Mark Ihimoyan
- Anil Relkuntwar
- Looking for a policy student... anyone interested?
- Rootkits
- The proliferation of wireless networks/devices and their security implications/vulnerabilities
- Noor-E-Gagan Singh
- Jeff Bilger
- Holly M Watson
- We are looking for one public policy student.
- Soft TargetsTopic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets.
- Full vs. Responsible Disclosure of Vulnerabilities: Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs? (http://en.wikipedia.org/wiki/Full_disclosure)
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.