Final Year Projects Computer Science (Information security) -2015

8
Final Year Project ideas for Computer Science Information Security Students 2015 Author: Syed Ubaid Ali Jafri Page 1 Projects Ideas Contents 1) Virtualization Through ESXI Server ..................................................................................................... 2 2) SIEM (Security Information & Event Management) Engine Development ............................................... 2 3) Mobile Log Management Tool ........................................................................................................... 2 4) Personal Device Data Encryption .......................................................................................................... 3 5) Centralized File Storage Server .......................................................................................................... 3 6) Data Tempering Through C#.Net ........................................................................................................ 3 7) Mobile Vulnerability Assessment Tool ................................................................................................ 4 8) Mobile Data Synchronization ............................................................................................................. 4 9) Data Recovery Tool for USB ............................................................................................................... 4 11) Web Alert System ............................................................................................................................. 5 12) Call center Tracker ............................................................................................................................ 6 13) Creating SysLog Server in .NET ........................................................................................................... 6 14) SOFT VPN CONCENTRATOR ............................................................................................................... 7 16) Wake On LAN ................................................................................................................................... 7 17) Network Ports Monitoring ................................................................................................................. 8

Transcript of Final Year Projects Computer Science (Information security) -2015

Page 1: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 1

Projects Ideas

Contents

1) Virtualization Through ESXI Server..................................................................................................... 2

2) SIEM (Security Information & Event Management) Engine Development ............................................... 2

3) Mobile Log Management Tool ........................................................................................................... 2

4) Personal Device Data Encryption .......................................................................................................... 3

5) Centralized File Storage Server .......................................................................................................... 3

6) Data Tempering Through C#.Net........................................................................................................ 3

7) Mobile Vulnerability Assessment Tool ................................................................................................ 4

8) Mobile Data Synchronization ............................................................................................................. 4

9) Data Recovery Tool for USB ............................................................................................................... 4

11) Web Alert System ............................................................................................................................. 5

12) Call center Tracker ............................................................................................................................ 6

13) Creating SysLog Server in .NET ........................................................................................................... 6

14) SOFT VPN CONCENTRATOR ............................................................................................................... 7

16) Wake On LAN ................................................................................................................................... 7

17) Network Ports Monitoring................................................................................................................. 8

Page 2: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 2

1) Virtualization Through ESXI Server

Aim

VMware vSphere Hypervisor is a free bare-metal hypervisor that virtualizes servers so you can

consolidate your applications on less hardware. The main idea is to minimize the cost of hardware

and increase the efficiency of the hardware by virtualized an application.

For Further Details of the above project Contact : [email protected]

2) SIEM (Security Information & Event Management) Engine Development

Aim

Security information and event management (SIEM) technology supports threat detection and

security incident response through the real-time collection and historical analysis of security events

from a wide variety of event and contextual data sources. It also supports compliance reporting and

incident investigation through analysis of historical data from these sources. The core capabilities of

SIEM technology are a broad scope of event collection and the ability to correlate and analyze events

across disparate sources.

For Further Details of the above project Contact : [email protected]

3) Mobile Log Management Tool

Aim

The aim is to provide a user management interface so that user can keep track of complete mobile

log which includes, SMS, Images, CALL, Browsing history, it should be stored in server and It should

be capable of being transferred to a server and then played back over the Web.

Page 3: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 3

4) Personal Device Data Encryption

Aim As data becomes more portable and computers are more affordable, an increasing number of

individuals are using personal devices to access, create, modify, or transport data. Failure to

properly secure the data can present risks to Unauthorized use of data, the user, and the subjects of

the data (e.g. UCSF patients, employees, research study participants), as sensitive and/or restricted

data may be exposed to those without a need-to-know. For example, if an employee’s personal

laptop (used to access and store patient protected health information (PHI)) was stolen, the patients

whose information was on the device are at risk for unauthorized access, acquisition and use of their

personal information, if the device was not properly secured. A System is required which encrypt all

the data placed in a Personal Device.

For Further Details of the above project Contact : [email protected]

5) Centralized File Storage Server

Aim

This Project has a client/Server approach in which a Client has an ID to access the server and places

his/her file on a server, Server will be maintaining the Data of each employee with respect to their

ID's, and also set the limit of uploading the total data and the limit of file uploading, furthermore, if

you want to enhance the project Specific File extensions, User data uploading history, user Logged in

time would be value added work.

For Further Details of the above project Contact : [email protected]

6) Data Tempering Through C#.Net

Aim

Data Tempering is one of the feature introduced of Mozilla Firefox, data tempering contains all the

values that are being generated by POST method. user can modify the POST packet when initiating

the request. That packet may modify for example (Extensions, Constant Values, Date Time, Fields

that are disabled on web). For Further Details of the above project Contact : [email protected]

Page 4: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 4

7) Mobile Vulnerability Assessment Tool

Aim

The aim of this project is to develop a System that test the weaknesses of a mobile phone, Identify

the exploits that are stored in a mobile phone. this system also measure the performance of mobile

application and also report the Unusual activities made the applications, similarly this system would

inform the user when any application made connectivity outside the scope of the local network.

For Further Details of the above project Contact : [email protected]

8) Mobile Data Synchronization

Aim

Being able to work offline is an expected feature of mobile applications. For data-driven applications,

it means that you — the developer — will have to store (a subset of) your application data locally,

and implement a data synchronization mechanism that keeps your local and server data in sync.

Synchronization data would contain (Messages, Contacts, Photos, Calling history) all data should be

travel encrypted on any medium suitable.

For Further Details of the above project Contact : [email protected]

9) Data Recovery Tool for USB

Aim

In software industry, the major problem is Data Lost, preventing data is one of the complex task ,

because data neither retrieved 100%, by enhancing the code an application is required to build a

system that recover the data lost in a USB device.

For Further Details of the above project Contact : [email protected]

Page 5: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 5

10) Secure DNS using Cryptography

Aim

The mapping or binding of IP addresses to host names became a major problem in the rapidly

growing Internet and the higher level binding effort went through different stages of development up

to the currently used Domain Name System (DNS).

The DNS Security is designed to provide security by combining the concept of both the Digital

Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of

Private key. The DNS security uses Message Digest Algorithm to compress the Message(text file) and

PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The

message combines with the Private key to form a Signature using DSA Algorithm, which is send

along with the Public key.

The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches

with the Signature of the message received, the message is Decrypted and read else discarded.

For Further Details of the above project Contact : [email protected]

11) Web Alert System

Aim

Web Alerts is a windows application that communicates with the web services hosted by particular

area like e-learning, stock, weather forecast etc. When you minimize, this tool disappears from the

screen and you can see a Small icon in the system tray, which can be used to re activate the tool.

Even when the tool is hidden, it works silently in the background. At some regular intervals of time, it

communicates with web services to find if there is any new alert created. If it finds a new alert, the

tool downloads the alerts and pops up a message displaying the alert. This message will include a

short description and a URL to click.

By clicking the URL, you can directly reach the web page represented by the alert. For example,

when a new article is submitted in or when an answer is posted for your question, your Web Alerts

tools will immediately popup alerting you to visit the page. For an applications like e-learning,

marketing and Query processing even a web application can be developed for entry and editing and

that can be tracked by windows, mobile and other application users thru web services. Every bank

today sends alerts to their users when an amount is credited, withdrawn or a Cheque is presented.

Similarly the alerts are generated for our application. Take an important area and design the

application. Extend the application to register for alerts based on user choice. It is one of the hot

requirements for every application today. This is one of the modern requirements for every desktop

application today

For Further Details of the above project Contact : [email protected]

Page 6: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 10

12) Call center Tracker

Aim

Call Center Tracker is an increasingly important skill as the use of call centers becomes a popular

method of centralizing information services, streamlining order taking and providing valuable

customer support. The skills required to successfully set-up and manage a call center encompass

everything from staff recruitment and personnel management, to technical understanding of the

options available, and the

all-important customer relationship management. From small customer service departments to large

call centers, the importance of developing successful Call Center Tracker is vital for building a valued

relationship with customers to support long-term business growth.

This system (Call Center Tracker) is useful to the organization, it maintains the information about the

employees and it also contains the necessary information of the customer and their phone Numbers,

their services also. It also maintains the employee roaster details.

This system will track the employee's login details. And also maintains the data the employee attend

the

call and his behavior with customer and the speech will be recorded into file. Sometimes customer

request for service to the organization. This data also maintains the system

For Further Details of the above project Contact : [email protected]

13) Creating SysLog Server in .NET

Aim

Syslog is a way for network devices to send event messages to a logging server – usually known as a

Syslog server. The Syslog protocol is supported by a wide range of devices and can be used to log

different types of events. For example, a router might send messages about users logging on to

console sessions, while a web-server might log access-denied events.Most network equipment, like

routers and switches, can send Syslog messages.

Page 7: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 10

14) SOFT VPN CONCENTRATOR

Aim

A VPN concentrator is a type of networking device that provides secure creation of VPN connections

and delivery of messages between VPN nodes.

A VPN concentrator is typically used for creating site-to-site VPN architectures. It can:

Establish and configure tunnels

Authenticate users

Assign tunnel/IP addresses to users

Encrypt and decrypt data

Ensure end-to-end delivery of data

15) User Activity Logging

Aim

The Aim is to design an Application for user logging activity started from the Login Session of

Windows to all the activities that is being made by the user Operating System Level. All the activities

sent to the Centralized database until the user logged off the session of Windows.

Example of Activity Logging :

1) Name of the Application Opened

2) Installation and Un installation applications name

3) Browser visited URL's

4) New folder , File creation Name, Date

5) Sharing Files & Folder (Access Date , Time, Name)

6) External USB Drive (Access Date , Time, Name) etc

For Further Details of the above project Contact : [email protected]

16) Wake On LAN

Aim

Wake-on-LAN (WoL) is an Ethernet computer networking standard that allows a computer to be

turned on or awakened by a network message. Ethernet connections, including home and work networks, wireless data networks and the Internet

itself, are based on packets of data sent between computers. Wake-on-LAN ("WOL") is implemented

using a specially designed packet called a magic packet, which is sent to all computers in a network,

among them the computer to be woken up.

For Further Details of the above project Contact : [email protected]

Page 8: Final Year Projects Computer Science (Information security) -2015

Final Year Project ideas for Computer Science Information Security Students 2015

Author: Syed Ubaid Ali Jafri Page 8

17) Network Ports Monitoring

Aim

This project aims at scanning the ports of Network with their respective Service Name, Network ports Scanning Informs the Total Number of Host connect to a network, No of host that are not alive on a network and No of host that are just arrived or disconnect from a network.

For Further Details of the above project Contact : [email protected]

_____________________________________________________________________