Cybersecurity

Bezpieczeństwo komputerowe

Proponowane tematy

  • Bitcoin challenges
  • Proxy re-encryption schemes
  • Remote Integrity Check
  • Batch cryptography
  • Attribute based or Identity based encryption, fuzzy identity based signature, multi-authority encryption schemes
  • Threat modeling: case study
  • Malware introduction
  • Cloud computing security introduction
  • E-mail security
  • Intrusion detection and prevention, honeypots
  • Federated identity: case study
  • Biometry authentication methods
  • Network architecture security: case study
  • Hacking: case study
  • Static code security analysis
  • Mobile security
  • TPM, HSM, TEE, SGX
  • Forensic investigation: case study

Harmonogram i przydział tematów

Data Temat Prezentujący Materiały
7.3.2018 Cryptanalysis Anna K. materials
14.3.2018 Steganography Wojciech B. materials
21.3.2018 Kosmiczne (nie)bezpieczeństwo Łukasz D. materials
28.3.2018 DNS Security Andrzej K. materials
11.4.2018 Anonymity Arleta J. materials
18.4.2018 Blockchain Norbert J. materials
25.4.2018 Man in the middle Przemysław J. materials
9.5.2018 Network protocols security Elżbieta P. materials
23.5.2018 Case study of a few tasks from choosen competitions: CTF, hackme etc. Karol R. materials
30.5.2018 TPM, TEE, SGX Valentyn B. materials
6.6.2018 Wireless security Mateusz M. materials
6.6.2018 Random Number Generators Błażej S. materials
13.6.2018 O side i covert channels na przykładzie Meltdown & Spectre Jan M. materials
13.6.2018 Forensic investigation: case study Piotr B. materials