ITX8040

Allikas: Kursused
Redaktsioon seisuga 8. mai 2015, kell 07:45 kasutajalt Olaf (arutelu | kaastöö) (→‎Schedule)
Mine navigeerimisribale Mine otsikasti

Cyber Defence Seminar (spring 2015)

Mondays 17:45-19:15

Room ICT-A1

Instructors

Rain Ottis, TUT

Olaf Maennel, TUT


Contact: rain dot ottis at ttu dot ee

Important Notes

How to plan, write and defend a Master's thesis? (Ottis)


Schedule

02.03.2015

Teet: Cyber Security awareness training in Estonian Defence Forces.

Tanel: Malware C&C blacklist validation in an ISP

09.03.2015

Heiki: Protecting users from unwanted e-mails

Kadri: How different authentication methods impact business performance.

Christian: A way to communicate with high-profile decision makers.

16.03.2015

Ragnar: Smart Contracts

Dinetta: Beyond simple cyber security training course. §q21

Alvar: Security of load-balanced data centers

23.03.2015

Jens: Bitcoin The New Age Of Crime Economy?

Chengxiang: Resource Public Key Infrastructure Implementation and Security Consideration

Artur: Encryption as Data leaking prevention

30.03.2015

Eduard: Security of EstEID Digital Signing in the Browser

Velmar: Use Open Source SIEM or logmanagement with open source tools?

Vuslat: Attack Trees

06.04.2015

Davit: Pentesting of a company

Reem: Cloud infrastructure attack risks

13.04.2015

Ferenc: How can you learn faster/better?

Kristo: Increasing Anonymity and Privacy Under Windows

Kristjan: Data Backup and Recovery Policy for Organization X

20.04.2015

Andrey: Software Modelling and open source prototype

Markko: TBD

27.04.2015

Pavel: Media Content Distribution Protection in Web Applications

Meril: The analysis and design of privacy preserving survey system.

Priit: Active Cyber Defence

04.05.2015

Oliver: How much cost cyber security based on security assurance game Educational Computer Game for Cyber Security

Trevor: e-document exchange and the associated security problems

Ennio: DNSsec

04.05.2015

Rainer: Optimization of information technology security costs of Enterprise Estonia based on ISKE and the Graded Security Model

Katrin: A realistic cloud environment

Olga: An Automated Framework for securing iOS Applications

Grade assignment

In order to pass, a student must:

  • present at least one research paper in the seminar
  • participate in at least 12 seminars (out of 16 total)