Thats a difficult question! How about something around a early detection system against attacks, or a detection system that would emulate a set of most common attacks and lists the vulnerabilities on a particular environment.
How about security and "Global Computing". Global computing is one of the (top 10, I think) grand challenges in computing. And a pretty neat one, I might add.
The topic is rather theoretical, but if that's no problem, then im sure you could write about a cool topic within the above. A prerequisit for this subject would be a few courses in semantics and computational models and logic - but im sure that's part of your CS program.
If the above isn't your thing you might try to talk to your professors. Im sure they can come up with a few interesting topics.
Computer Security is the hottest topic specially after e-banking came into scene. I suggest you to go for Encryption/Decryption algos. You can find flaw in anyone and modify that algo. OR u may write a new algo which will be far better than any RSA.
Good Luck. Keep us inform about ur topic selection.
• Sun Certified Programmer for Java 2 Platform (SCJP2)
• IBM Certified Professional for Object Oriented Analysis and Design with UML
• IBM Certified System Administrator for WebSphere Application Server v5.0
• Certified Business Analysis Professional (CBAP®)
Originally posted by Vikrama Sanjeeva: Hi, I suggest you to go for Encryption/Decryption algos. You can find flaw in anyone and modify that algo. OR u may write a new algo which will be far better than any RSA. Good Luck. Keep us inform about ur topic selection.
:roll: . I m trying to read Bruce Scheiner and William Stallings for past few months. [ May 25, 2005: Message edited by: Arjunkumar Shastry ]
The "social hacking" aspect might be interesting, if kinda non-technical. Many systems are broken by people sweet talking their way past human protection. Kevin Mitnick learned technical lingo well enough he could call up somebody's internal help desk and say things like "Hey, this is Bob on a 4231 call over at IBM and I left my DFTRB manual in the truck, could you give me the code to defrabulate a ratzenbobble?" and they'd give him passwords over the phone. Some of the identity theft recently was done by pretending to be a legit company and simply buying the info.
A good question is never answered. It is not a bolt to be tightened into place but a seed to be planted and to bear more seed toward the hope of greening the landscape of the idea. John Ciardi
Dont know much about Blue-Tooth tech. , but I guess that if any malicious program is in your computer then it might send some sensitive information to other machine/program whenever it is near to that instrument. And it becomes more vulnerable when you have wireless net connections at restaurannts and other public places. I think it could be good topic for research.
On second thought, blue-tooth must have come in to market after considering all these security problems.
"Thanks to Indian media who has over the period of time swiped out intellectual taste from mass Indian population." - Chetan Parekh