Difference between revisions of "White Paper Projects"
From CyberSecurity
James Xiao (talk | contribs) |
|||
Line 59: | Line 59: | ||
**[[Michael A. Laurenzano]] | **[[Michael A. Laurenzano]] | ||
**[[Elijah Esquibel]] | **[[Elijah Esquibel]] | ||
+ | *'''[[Cyber Criminal Activity (group 10)]]''' - group closed | ||
+ | **[[Khaled Sedky]] | ||
+ | **[[Manish Mittal]] | ||
+ | **[[Ahmed Tolba]] | ||
+ | **[[Pamela Mae Davis]] | ||
+ | **[[Nilkund Aseef]] | ||
*'''Liability''' | *'''Liability''' | ||
**.. | **.. |
Latest revision as of 08:08, 4 December 2005
PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.
- Full vs. Responsible Disclosure of Vulnerabilities: Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs?
- Tony Chan (UW)
- Kelvin Yu (UW)
- Andrew Cencini (UW)
- ***Looking for policy student(s)***
- Nuclear Weapons
- Elena Rodriguez-Vieitez (UCB)
- Chemical Weapons
- ..
- Biological Weapons
- ..
- Radiological Weapons
- ..
- Privacy and Data
- Santtu Voutilainen
- ***Seeking policy student(s)***
- Encryption Policy
- ..
- Open Source and Cybersecurity
- Interrogation & Torture
- Zolfaghari
- Dennis Galvin
- Chris DuPuis
- Sean Cardeno (UCB)
- Barbra Ramos (UCB)
Interrogation and Torture Group 2: Katie Veazey (UCB), Ian Richardson (UCB), Justin Delacruz (UCB), Cameron Mckenzie (UCB),
- State-Sponsored Hacking
- ..
- Cyberterrorism
- ..
- Cybersecurity and National Infrastructure
- ..
- Cybersecurity and Law
- Cyber Criminal Activity - group closed
- Cyber Criminal Activity (group 2) - We still need one to three students(at least one policy student)
- Cyber Criminal Activity (group 10) - group closed
- Liability
- ..
- Education, Exploits, Cyberculture
- ..
- Offense vs. Defense
- Yi-Kai Liu
- Drew Hoskins
- Anil Relkuntwar
- WhiteTeam3: Rob Anderson, Bhavjit Walha, Brian Lum, Josefina Valdez
- Looking for a policy student... anyone interested?
- Rootkits
- The proliferation of wireless networks/devices and their security implications/vulnerabilities
- Noor-E-Gagan Singh
- Jeff Bilger
- Holly M Watson
- We are looking for one public policy student.
- Soft Targets: Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets.
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.