Erinevus lehekülje "Thesis/tl/" redaktsioonide vahel
Mine navigeerimisribale
Mine otsikasti
(Uus lehekülg: '=== Expectation === Some what technical thesis Student reports progress regularity (atleast once in 2 week) Student is ok with remote meetings ==== Extended general areas =...') |
|||
| (ei näidata sama kasutaja 3 vahepealset redaktsiooni) | |||
| 5. rida: | 5. rida: | ||
Student is ok with remote meetings | Student is ok with remote meetings | ||
| − | + | ==== Extended general areas ==== | |
| − | |||
| − | |||
| + | General areas: | ||
| + | * Network Forensic (related data analysis) | ||
| + | * Reverse engineering (including malware analysis) | ||
| + | * SCADA security | ||
| + | * Incident Handling. | ||
| + | * Deception in Cyber Security | ||
== Research ideas 2019 == | == Research ideas 2019 == | ||
| − | * Implications of DOH on security and availability | + | * Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html |
* Domain name availability and how DNS registrant and registrar policy changes affect cybercrime | * Domain name availability and how DNS registrant and registrar policy changes affect cybercrime | ||
* Heuristics on ip leasing operations | * Heuristics on ip leasing operations | ||
| − | * Defending | + | * Defending organization that does not have internal network |
* Do applications do what they promise | * Do applications do what they promise | ||
* Identifying specific applications based network fingerprints | * Identifying specific applications based network fingerprints | ||
| 24. rida: | 28. rida: | ||
* Information attributes influence beyond CIA | * Information attributes influence beyond CIA | ||
* Frame works for cybersecurity devices / software evaluation | * Frame works for cybersecurity devices / software evaluation | ||
| − | * Evaluation specific software /hardware | + | * Evaluation specific software /hardware using ATT&CK Framwork |
| + | * ATT&CK -Descriptions and false positives | ||
Viimane redaktsioon: 15. oktoober 2019, kell 14:39
Expectation
Some what technical thesis Student reports progress regularity (atleast once in 2 week) Student is ok with remote meetings
Extended general areas
General areas:
- Network Forensic (related data analysis)
- Reverse engineering (including malware analysis)
- SCADA security
- Incident Handling.
- Deception in Cyber Security
Research ideas 2019
- Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html
- Domain name availability and how DNS registrant and registrar policy changes affect cybercrime
- Heuristics on ip leasing operations
- Defending organization that does not have internal network
- Do applications do what they promise
- Identifying specific applications based network fingerprints
- Evaluation log collecting methods for Microsoft networks considering log poisoning attacks
- Log collecting frameworks for organisations without internal networks
- Information attributes influence beyond CIA
- Frame works for cybersecurity devices / software evaluation
- Evaluation specific software /hardware using ATT&CK Framwork
- ATT&CK -Descriptions and false positives