Google Answers Logo
View Question
 
Q: Dissertation subject ( Answered 5 out of 5 stars,   1 Comment )
Question  
Subject: Dissertation subject
Category: Computers > Security
Asked by: electron-ga
List Price: $15.00
Posted: 03 Nov 2002 14:55 PST
Expires: 03 Dec 2002 14:55 PST
Question ID: 97588
I am looking for a nice dissertation subject for my MSc.(MSc in DATA
COMMUNICATIONS SYSTEMS)
Because of my work I am interested in computer security. Off course I
am looking for a subject with some resources in the net.
I don't want from you to write my dissertation, just a nice subject.
Thank you!

Request for Question Clarification by ephraim-ga on 03 Nov 2002 17:02 PST
How much math do you feel comfortable using in your dissertation?

Is your interest area more mathematical (i.e. discrete math,
statistics, game theory) or more technical (network engineering,
issues in employee security, etc.)?

/ephraim

Clarification of Question by electron-ga on 04 Nov 2002 06:15 PST
Hello,

thank you for your reply.
I am interested more in technical .(network engineering,
issues in employee security, etc.)

Thank you
Answer  
Subject: Re: Dissertation subject
Answered By: ephraim-ga on 05 Nov 2002 05:54 PST
Rated:5 out of 5 stars
 
Electron,

Here are three potential thesis topics. I hope that these sound
interesting to you!


1) What implications does the anonymity available from projects like
Freenet have for computer security and privacy?

From the Freenet FAQ:

“Freenet is free software designed to ensure true freedom of
communication over the Internet. It allows anybody to publish and read
information with complete anonymity. Nobody controls Freenet, not even
its creators, meaning that the system is not vulnerable to
manipulation or shutdown. Freenet is also very efficient in how it
deals with information, adaptively replicating content in response to
demand.”

Freenet is file sharing software intended to be a secure, anonymous,
and fast method for distributing information on the internet. Its most
controversial feature is the ability to publish and distribute *any*
information completely anonymously. This has positive implications for
people in countries like China who may wish to view information that
their government has blocked them from viewing over the WWW.
Unfortunately, it also means that less ethical people can publish
information that is rightfully illegal and immoral. Your thesis could
examine the benefits and hazards of completely anonymous
communication. If you’re creative, you could also try to find out how
computer security experts might deal with those hazards.

WARNING: Freenet currently contains some material that should be
considered obscene and illegal by any ethical person. If you’re
interested in picking this as a thesis topic, you should be very aware
that it’s possible you may be exposed to content which will completely
disgust you and that may be illegal. The trade-off between this
obscenity and freedom of information is what makes the Freenet project
such a hotbed of debate.


[Main page for Freenet Project]

http://freenetproject.org/cgi-bin/twiki/view/Main/WebHome

[Description & History of Freenet]
http://freenetproject.org/cgi-bin/twiki/view/Main/WhatIs

[Ian Clarke's original paper Freenet]
http://freenetproject.org/freenet.pdf

[Freenet FAQ]
http://freenetproject.org/freenet.pdf

[Article from news.com discussing the origins of Freenet]
http://news.com.com/2100-1033-239756.html?legacy=cnet

[Google search for Freenet related pages: “freenet” +
“anonymous|anonymity”]
://www.google.com/search?as_q=freenet&num=100&hl=en&ie=UTF-8&oe=UTF-8&btnG=Google+Search&as_epq=&as_oq=anonymity+anonymous&as_eq=&lr=lang_en&as_ft=i&as_filetype=&as_qdr=all&as_occt=any&as_dt=i&as_sitesearch=&safe=images



2) Major security holes are frequently found in products vital to the
internet such as web browsers, firewalls, mail software, etc.
Commercial products which are closed-source and whose workings are
proprietary require the manufacturer to fix the security problem.
Open-source software allows anybody to examine the code for potential
security holes, but also permits anybody to work on the fix. Is one of
these models better than the other when it comes to computer security?

[Open, closed source security about equal?]
http://zdnet.com.com/2100-1105-938229.html

[Slashdot: MS Cites National Security to Justify Closed Source]
http://slashdot.org/articles/02/05/20/2124248.shtml?tid=109

[Musings on open source security models]
http://www.linuxworld.com/linuxworld/lw-1998-11/lw-11-ramparts.html

[Google search: “security” + “closed source”]
://www.google.com/search?as_q=security&num=100&hl=en&ie=UTF-8&oe=UTF-8&btnG=Google+Search&as_epq=closed+source&as_oq=&as_eq=&lr=&as_ft=i&as_filetype=&as_qdr=all&as_occt=any&as_dt=i&as_sitesearch=&safe=images

[Google search: “security” + “open source”]
://www.google.com/search?as_q=security&num=100&hl=en&ie=UTF-8&oe=UTF-8&btnG=Google+Search&as_epq=open+source&as_oq=&as_eq=&lr=&as_ft=i&as_filetype=&as_qdr=all&as_occt=any&as_dt=i&as_sitesearch=&safe=images



3) What implications do proposed laws like UCITA have on computer
security?

From the UCITA FAQ on 4cite’s page:

“Can software publishers remotely shut down an organization's mission
critical software?

Yes. UCITA expressly authorizes a software publisher, in a dispute
over license rights, to remotely shut down an organization's mission
critical software without court approval -- in many cases shielding
the software publisher from liability for the harm caused.

Does UCITA address privacy issues?

UCITA actually permits invasions of privacy. It allows software
publishers to legally track and collect confidential information about
personal and business activities of licensees. Additionally, because
it allows software and information products to contain "back door"
entrances, user's systems can potentially become vulnerable to
infiltration by unauthorized hackers.”

Note that the information above was written by a group which strongly
opposes UCITA. Obviously, the debate here is over whether the proposed
UCITA law actually does have negative computer security implications
for those who buy software under the law.

[4cite’s UCITA FAQ]
http://www-affect@ucita.com/what_faq.html

[4cite’s What is UCITA?]
http://www-affect@ucita.com/what.html

[4cite’s Current events in UCITA]
http://www-affect@ucita.com/happening.html

[UCITA online]
http://www.ucitaonline.com/

[Google search: “ucita”]
://www.google.com/search?as_q=ucita&num=100&hl=en&ie=UTF-8&oe=UTF-8&btnG=Google+Search&as_epq=&as_oq=&as_eq=&lr=&as_ft=i&as_filetype=&as_qdr=all&as_occt=any&as_dt=i&as_sitesearch=&safe=images



Good luck on your thesis and feel free to ask if you need
clarification!

/ephraim

Clarification of Answer by ephraim-ga on 07 Nov 2002 06:54 PST
Electron,

The following article just appeared online which discusses the Open
Source vs. Closed Source debate:

http://news.com.com/2100-1001-964854.html?tag=fd_top

Enjoy,

/ephraim
electron-ga rated this answer:5 out of 5 stars
Hello. Thanks a lot for your answer. You where very helpfull.

Comments  
Subject: Re: Dissertation subject
From: mathtalk-ga on 04 Nov 2002 10:26 PST
 
I would think about security issues related to the asymmetric nature
of most network transactions.  The channel of communication can be
protected by SSL, and the server end of the transaction can be
somewhat reliably identified by public key encryption (RSA coded
certificates).  But the "user" end of the communication is often, for
practical reasons, less reliably secured, e.g. by a password that is
predictable and/or poorly maintained.

regards, mathtalk-ga

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy