Project Why a Project? This course covers a very large discipline, and Ç perhaps more so than many other areas of computer sci- ence Ç the discipline of computer security runs through many other areas. Because the class has a very limited amount of time, we will only touch the surface of many topics. The project is to give you an opportu- nity to explore one of these topics, or some other area or application of computer security that interests you, in some depth. The Ground Rules You may select a project from the list below (in most cases, you will need to refine or limit the suggestions). You may also think of a project on your own. The project can be a detailed research report or survey, or a programming project. In any case, check with me before beginning to be sure it is a reasonable project and no-one else has chosen it. Please select something that interests you! You may work singly or in groups of not more than 3. For a group project, everyone will get the same grade, and I will expect more out of such a project than out of one done by a single student. If you decide to do a group project, please let me know the members of your group. Some Suggestions for Project and Report Topics Ÿ Biology and Computer Security: viruses, worms, and so forth Ÿ Security Requirements in Educational, Commercial and Governmental Environments (medical envi- ronments is a hot topic right now) Ÿ User/System Authentication Methods (especially over untrusted networks) Ÿ Formal Models (for example, something in depth on HRU, etc; I can point you to several of these, ) Ÿ Factoring a Number Ÿ Electronic Voting Machines and Computer Security Ÿ Adding New Access Control Mechanisms to the UNIX Operating System Ÿ Rights and Amplification of Rights in a Capability System Ÿ Secure Electronic Mail: Proposed Standards Ÿ Breaking Ciphers with Computers (you will have to narrow this down a great deal) Ÿ Analyzing and/or Testing Programs for Vulnerabilities Ÿ Intrusion Detection and Incident Response Ÿ Writing Secure Programs (mail server, WWW server, etc.; these may have limited functionality) Ÿ Analyzing a Systemºs or Siteºs Security Ÿ The Security Features of IP Version 6: How Good Are They? Ÿ Windows NT Security Time Line You must turn in the following. Use the handin program to submit electronic copies, as described in the All About Homework handout. January 17, 1997 Project selected; if it is a group project, please name the mem- bers of the group. February 14, 1997 Design or outline completed. March 14, 1997 Project completed.