Sale!
Placeholder

Virtual Laboratories for Teaching Computer Security

10,000 3,000

Topic Description

 ALL listed project topics on our website are complete material from chapter 1-5 which are well supervised and approved by lecturers who are intellectual in their various fields of discipline, documented to assist you with complete, quality and well organized researched materials. which should be use as reference or Guild line...  See frequently asked questions and answeres



Abstract
This project looks at methods of teaching computer security via an interactive web application. It considers the two existing solutions currently available and looks at how they can be improved to produce a bespoke solution for the final year undergraduate computer security module at the University of Leeds.
The developed application has been named honeynet after collections of decoy servers (or honeypots) found on networks, such as the Internet, whose purpose it is to lure potential hackers in order to study their methods and activities so they can be effectively defended against. The graphic for the application Winnie the Pooh is to do with the etymology of the word honeypot, a term which is often understood to refer to the children s character, a bear who was lured into various predicaments by his desire for pots of honey.Keywords: computer security, education, honeynet, online bank, SQL injection,
cross-site scripting, XSS, URL manipulation, parameter tampering, hacking

Contents
Abstract ii
Acknowledgements iii
Contents iv
1 Introduction 1
1.1 Problem definition 1
1.2 Project aim 2
1.3 Project objectives 2
1.4 Minimum requirements and possible extensions 2
1.5 Deliverables 3
1.6 Relevance of project to degree programme 3
1.7 Project methodology 3
1.8 Project schedule and revisions to schedule 6
1.9 Summary 8
2 Literary review 9
2.1 Computer security 9
2.2 History of hacking 9
2.3 Attacks 11
2.4 Teaching methods 14
2.5 Ethics 15
2.6 Law 16
2.7 Summary 16
3 Requirements capture 17
3.1 Introduction 17
3.2 Requirements gathering techniques 18
3.3 Semi-structured interview 19
3.4 Focus group 19
3.5 Document review 19
3.6 Analysis of existing solutions 20
3.7 Requirements specification 22
3.8 Feasibility study 22
3.9 Summary 25
v
4 Design 26
4.1 Introduction 26
4.2 Conceptual design 26
4.3 Technical design 28
4.3.1 Presentation layer design 28
4.3.2 Application layer design 30
4.3.3 Database layer design 33
4.3.4 Prototyping 34
4.4 Development environment 35
4.5 Application security 35
4.6 Test strategy 38
4.7 Summary 38
5 Implementation 39
5.1 Development issues 39
5.2 Testing 41
5.3 Summary 44
6 Evaluation 45
6.1 Evaluation of the proposed solution 45
6.2 Evaluation against minimum requirements 45
6.3 Evaluation against other solutions 46
6.4 User evaluation 47
6.5 Suggestions for further development 47
6.6 Project conclusion 48
Bibliography
Appendices
A Personal reflection on the project
B Project Planning
C Requirements analysis
D Design
E Implementation
F Testing
G Evaluation
Mid term project report

GET COMPLETE MATERIAL