Cybersecurity

Bezpieczeństwo komputerowe

Proponowane tematy

  • Bitcoin challenges
  • Proxy re-encryption schemes
  • Remote Integrity Check
  • Batch cryptography
  • Attribute based or Identity based encryption, fuzzy identity based signature, multi-authority encryption schemes
  • Threat modeling: case study
  • Malware introduction
  • Cloud computing security introduction
  • E-mail security
  • Intrusion detection and prevention, honeypots
  • Federated identity: case study
  • Biometry authentication methods
  • Network architecture security: case study
  • Hacking: case study
  • Static code security analysis
  • Mobile security
  • TPM, HSM, TEE, SGX
  • Forensic investigation: case study

Harmonogram i przydział tematów

Data Temat Prezentujący Materiały
7.3.2018 Cryptanalysis Anna K.  
14.3.2018 Steganography Wojciech B.  
21.3.2018 TBD Łukasz D.  
28.3.2018 DNS Security Andrzej K.  
11.4.2018 Anonymity Arleta J.  
18.4.2018 Blockchain Norbert J.  
25.4.2018 Man in the middle and side channel attacks Przemysław J.  
9.5.2018 Network protocols security Elżbieta P.  
23.5.2018 Case study of a few tasks from choosen competitions: CTF, hackme etc. Karol R.  
30.5.2018 E-mail security Valentyn B.  
6.6.2018 Wireless security Mateusz M.  
13.6.2018   (brak)