CSCI358 Security Engineering !

    Need Solution - Download from here

    Presentation and Report (Worth 10%)

    1. The presentation, worth 5%.
    1. The report, worth 5%.

    Each topic is a question appropriate for a debate, and as such they need to be studied to look for arguments in favour and against something. 

    # Topic

    1. A perimeter defence is best placed close to the object being protected.
    2. Any system providing anonymity should also allow for traceability.
    3. Attacks on information systems are now more likely to be semantic than syntactic.
    4. Books such as Anderson’s should not be published, they give too much information to attackers.
    5. Bottom up is a better method of threat analysis than top down.
    6. CAPTCHA is a powerful tool for user authentication.
    7. Cryptography doesn’t solve any practical problems.
    8. Fingerprinting is superior to face recognition as a biometric authentication mechanism
    9. For access control, discretionary powers are more useful than mandatory controls.
    10. For naming, the combination of secure and memorable is a better choice than secure and global. (Zooko’s Triangle.)
    11. In security, unpredictability is more important than predictability.
    12. Individual psychology plays a more significant role in human aspects of security than cultural or sociological factors do.
    13. Laws can only be successful if they are widely known.
    14. Malware scanning isn’t necessary if all software is digitally signed.
    15. Open source code is more secure than closed source code.
    16. Pins and passwords should be automatically generated for users.
    17. Recovery is more important than prevention.
    18. Security and usability are often in conflict.
    19. Security is more about assurance than insurance.
    20. Security Managers don’t need to know anything about cryptography.
    21. Software companies should be liable for damages resulting from flaws in their software.
    22. Software piracy is good for the gaming industry.
    23. Support for illegal activities, such as safe needles for drug use, shouldn’t happen.
    24. Tangible losses suffered by banks are more important than non‐‐tangible losses.
    25. The KISS principle is frequently applied in the implementation of security.
    26. The more automated a system is, the better.
    27. Trusted platforms improve the level of assurance for users.
    28. Use case modelling is more appropriate than misuse case modelling.
    29. User education is an effective method of improving security.

    Presentation details

    The presentations will take place at the morning class.

    Each group is to do at most a fteen (15) minute presentation, aim for 13 or 14 minutes, followed by up to ve (5) minutes for a question/discussion time. Question time should start with the group giving the class some questions/challenges to respond to. The reminder of the time is an opportunity for the rest of the class to ask questions.

    Not all team members need to talk as part of the presentation, but all should contribute to the development of the presentation and the report, and, if needed, to the answering of questions.

    Although the presentation and report are obviously to be related, the presentation should not be a dump of the report or vice-versa. Students should add value to the slide as they present and use appropriate visual aids to explain their presentation.

    Report details

    The report should be about 4000 to 6000 words long, plus references. If it’s pure text you should likely be near the upper end of that range but in most cases you will be able to more e ciently represent some information in diagrams/tables/ gures. There is no need to include a cover page on the submitted version since it will be submitted through Moodle. The report should include details that need to be omitted in the presentation due to the lack of time.

    Notes on submission

    Submission is via Moodle. Please submit your report in pdf and your presentation in powerpoint or similar. The report may be processed through Turnitin so direct copying from websites and failure to appropriately reference will be picked up. Be sure to present the report in your own words or your group will be penalised.


    Leave A Comment