Information and Network Security Project

Raffysz

Commendable
Mar 14, 2016
1
0
1,510
Hello everyone, I'm new here and I never actually used forums before but I have been suggested to give it a try to find help for my problem.
I'm a master student for Information and Network security with a background of a degree in Computer Network Management and Design both courses done in a University in Scotland.
I'm almost at the time in my master that I need to propose a project/dissertation related to security.
I had a look at some projects other students had proposed in the past years, and most of those are programming related.
My background is mostly networking related with understanding of hardware and software, and my only programming skills are limited to HTML5, CSS, PHP and SQL.
I'm looking for some advice and ideas on what I can look into to create a proposal to then develope on a proper master project.
Being quite taken by other classes I found myself stuck without much ideas and I would really appreciate some help from other fellow IT enthusiastics and professionals with more experience and open minded than me.
Thank you.
Raffaele M.
 
Solution
I have looked at your posting a couple of times and have been mulling over a possible answer.

Masters, final disertation., security related...

One of the great weaknesses in security is the human element. Breaches due to phishing and social engineering.

What could be done at a techncial level to limit the effectiveness of breaches by people using phishing and social engineering?

For example: a login has always originated at some given source, location, device? Can geolocation (whatever) being used for ad-serving likewise be also used to detect an unusual login in location?

What can and cannot be spoofed? What additonal validations would be needed to verify that a login is valid or false?
I have looked at your posting a couple of times and have been mulling over a possible answer.

Masters, final disertation., security related...

One of the great weaknesses in security is the human element. Breaches due to phishing and social engineering.

What could be done at a techncial level to limit the effectiveness of breaches by people using phishing and social engineering?

For example: a login has always originated at some given source, location, device? Can geolocation (whatever) being used for ad-serving likewise be also used to detect an unusual login in location?

What can and cannot be spoofed? What additonal validations would be needed to verify that a login is valid or false?
 
Solution