Outcomes - PowerPoint PPT Presentation

1 / 1
About This Presentation
Title:

Outcomes

Description:

Integration of grid education at TCNJ. Mentored research to follow up the projects ... a page's probability of being undesirable based on the combined probabilities of ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 2
Provided by: tcnj
Category:

less

Transcript and Presenter's Notes

Title: Outcomes


1
TCNJ SURP-CS Information Security Summer
Undergraduate Research Program Computer Science
2005
Projects
  • Scholarly Lectures
  • Trips
  • Merrill Lynch Laura George, Tom Thornbury -
    Infosec in the corporat financial realm
  • NJRCFL Larry Depew Criminal computer
    forensics
  • Columbia University Michael Locasto (02) -
    Network security lab
  • Presentations
  • ETS Jim Moran Infosec in the nonprofit
    educational realm
  • Network Presentation Dr. Jikai Li
    Introduction to network security
  • Perl Eric Thul Introduction to the Perl
    scripting language

Web Filter (Schramm, Centofanti) This project
aims to secure the web by implementing an
adaptable solution for innapropriate and
potentially damaging information. Using Bayesian
filtering to adapt to the changing web, our
filter decides whether a page should be blocked
based on its content. It calculates a pages
probability of being undesirable based on the
combined probabilities of the pages words being
bad. Each word is determined to be good or bad by
comparing it to a stored list.
Grid (Snyder, Gionta) Grid computing is an
emerging technology that is used to turn a
network of computers into a singe "Virtual
Machine". A grid allows the computers to
share 1. Processor Power 2. Storage Space 3.
Other Networked Resources In the future, grids
will enable computational power to be distributed
much like electricity and water are distributed
now.
Computer Forensics (Leonardis, Wolfgang) When a
file is deleted from a file system, only the
reference to the physical location in memory is
deleted--the data is still resident and can still
be recovered (though indirectly). The only way to
resolve this kind of situation is to use a secure
deletion program (which overwrites the data to
random 1's and 0's several times) or to use a
magnet on the drive.
  • Outcomes
  • Immediate
  • Made contacts with the NJRCFL, Merrill Lynch,
    and ETS
  • Gained a better understanding of
  • Web services
  • XML
  • File systems
  • C language
  • Apache modules
  • Increased our knowledge of InfoSecs increasing
    prevalence
  • News items
  • Sarbanes-Oxley Act
  • Establishment of policies
  • Reporting of incidents
  • Corporations development of forensics and
    InfoSec departments
  • Suggested TCNJ IT Policy Changes
  • Future Work
  • TCNJ Computer Forensics Lab
  • Integration of grid education at TCNJ
  • Program Meetings
  • CIA Triad
  • Three core tenets of information security
  • Confidentiality Measures to protect privacy
  • Integrity Enforcing policies to protect data
  • Availability Ensuring information is available
    to those who need it
  • Mini Lectures

Jason Snyder Jason Gionta Jason Schramm Kevin
Centofanti Lauren Leonardis Lester
Wolfgang Advisors Dr. Knox Dr. DePasquale Dr.
Pulimood
  • Hash Tables
  • Buffer Overflows
  • Internet 2
  • Debugging Software
  • Public Key Infrastructure
  • Java Security
  • Java WebStart
  • X-Win32 Remote Display
  • Project Progress Presentations
  • Not only did we learn what our specific projects
    taught us updates and lessons from all three
    proects were part of the experience
  • Contributed ideas to other projects
Write a Comment
User Comments (0)
About PowerShow.com