Erinevus lehekülje "ITX8040" redaktsioonide vahel
44. rida: | 44. rida: | ||
Alvar: Security of load-balanced data centers | Alvar: Security of load-balanced data centers | ||
− | |||
==== 23.03.2015 ==== | ==== 23.03.2015 ==== | ||
95. rida: | 94. rida: | ||
Trevor: e-document exchange and the associated security problems | Trevor: e-document exchange and the associated security problems | ||
+ | |||
+ | Ennio: DNSsec | ||
+ | |||
+ | ==== 04.05.2015 ==== | ||
+ | |||
+ | Rainer: Optimization of information technology security costs of Enterprise Estonia based on ISKE and the Graded Security Model | ||
+ | |||
+ | Katrin: A realistic cloud environment | ||
+ | |||
+ | Olga: An Automated Framework for securing iOS Applications | ||
==Grade assignment== | ==Grade assignment== |
Redaktsioon: 8. mai 2015, kell 07:45
Cyber Defence Seminar (spring 2015)
Mondays 17:45-19:15
Room ICT-A1
Instructors
Rain Ottis, TUT
Olaf Maennel, TUT
Contact: rain dot ottis at ttu dot ee
Important Notes
How to plan, write and defend a Master's thesis? (Ottis)
Schedule
02.03.2015
Teet: Cyber Security awareness training in Estonian Defence Forces.
Tanel: Malware C&C blacklist validation in an ISP
09.03.2015
Heiki: Protecting users from unwanted e-mails
Kadri: How different authentication methods impact business performance.
Christian: A way to communicate with high-profile decision makers.
16.03.2015
Ragnar: Smart Contracts
Dinetta: Beyond simple cyber security training course. §q21
Alvar: Security of load-balanced data centers
23.03.2015
Jens: Bitcoin The New Age Of Crime Economy?
Chengxiang: Resource Public Key Infrastructure Implementation and Security Consideration
Artur: Encryption as Data leaking prevention
30.03.2015
Eduard: Security of EstEID Digital Signing in the Browser
Velmar: Use Open Source SIEM or logmanagement with open source tools?
Vuslat: Attack Trees
06.04.2015
Davit: Pentesting of a company
Reem: Cloud infrastructure attack risks
13.04.2015
Ferenc: How can you learn faster/better?
Kristo: Increasing Anonymity and Privacy Under Windows
Kristjan: Data Backup and Recovery Policy for Organization X
20.04.2015
Andrey: Software Modelling and open source prototype
Markko: TBD
27.04.2015
Pavel: Media Content Distribution Protection in Web Applications
Meril: The analysis and design of privacy preserving survey system.
Priit: Active Cyber Defence
04.05.2015
Oliver: How much cost cyber security based on security assurance game Educational Computer Game for Cyber Security
Trevor: e-document exchange and the associated security problems
Ennio: DNSsec
04.05.2015
Rainer: Optimization of information technology security costs of Enterprise Estonia based on ISKE and the Graded Security Model
Katrin: A realistic cloud environment
Olga: An Automated Framework for securing iOS Applications
Grade assignment
In order to pass, a student must:
- present at least one research paper in the seminar
- participate in at least 12 seminars (out of 16 total)