Title: Outcomes
1TCNJ SURP-CS Information Security Summer
Undergraduate Research Program Computer Science
2005
Projects
- Scholarly Lectures
- Trips
- Merrill Lynch Laura George, Tom Thornbury -
Infosec in the corporat financial realm - NJRCFL Larry Depew Criminal computer
forensics - Columbia University Michael Locasto (02) -
Network security lab - Presentations
- ETS Jim Moran Infosec in the nonprofit
educational realm - Network Presentation Dr. Jikai Li
Introduction to network security - Perl Eric Thul Introduction to the Perl
scripting language
Web Filter (Schramm, Centofanti) This project
aims to secure the web by implementing an
adaptable solution for innapropriate and
potentially damaging information. Using Bayesian
filtering to adapt to the changing web, our
filter decides whether a page should be blocked
based on its content. It calculates a pages
probability of being undesirable based on the
combined probabilities of the pages words being
bad. Each word is determined to be good or bad by
comparing it to a stored list.
Grid (Snyder, Gionta) Grid computing is an
emerging technology that is used to turn a
network of computers into a singe "Virtual
Machine". A grid allows the computers to
share 1. Processor Power 2. Storage Space 3.
Other Networked Resources In the future, grids
will enable computational power to be distributed
much like electricity and water are distributed
now.
Computer Forensics (Leonardis, Wolfgang) When a
file is deleted from a file system, only the
reference to the physical location in memory is
deleted--the data is still resident and can still
be recovered (though indirectly). The only way to
resolve this kind of situation is to use a secure
deletion program (which overwrites the data to
random 1's and 0's several times) or to use a
magnet on the drive.
- Outcomes
- Immediate
- Made contacts with the NJRCFL, Merrill Lynch,
and ETS - Gained a better understanding of
- Web services
- XML
- File systems
- C language
- Apache modules
- Increased our knowledge of InfoSecs increasing
prevalence - News items
- Sarbanes-Oxley Act
- Establishment of policies
- Reporting of incidents
- Corporations development of forensics and
InfoSec departments - Suggested TCNJ IT Policy Changes
- Future Work
- TCNJ Computer Forensics Lab
- Integration of grid education at TCNJ
- Program Meetings
- CIA Triad
- Three core tenets of information security
- Confidentiality Measures to protect privacy
- Integrity Enforcing policies to protect data
- Availability Ensuring information is available
to those who need it - Mini Lectures
Jason Snyder Jason Gionta Jason Schramm Kevin
Centofanti Lauren Leonardis Lester
Wolfgang Advisors Dr. Knox Dr. DePasquale Dr.
Pulimood
- Hash Tables
- Buffer Overflows
- Internet 2
- Debugging Software
- Public Key Infrastructure
- Java Security
- Java WebStart
- X-Win32 Remote Display
- Project Progress Presentations
- Not only did we learn what our specific projects
taught us updates and lessons from all three
proects were part of the experience - Contributed ideas to other projects