Differences between revisions 4 and 5
Revision 4 as of 2012-12-31 04:19:30
Size: 1461
Editor: 24-151-197-61
Comment:
Revision 5 as of 2012-12-31 04:20:17
Size: 1469
Editor: 24-151-197-61
Comment:
Deletions are marked like this. Additions are marked like this.
Line 4: Line 4:
'''Authentication Systems''': Give a taxonomy of authentication systems by evaluating the different types {(username, password), (User Certificates), (Single Sign-on systems)} and uses {(Open ID for use across multiple systems), (Enterprise Systems for silod or closed environments), (Single computer environments), {public vs. private access)}. The question you are answering: What is the state of the art for authentication systems in the different environments? Must See Systems: Open LDAP, Active Directory, Open ID, Google and Facebook authentication, certificates (server and user) etc. '''Authentication Systems''': Give a taxonomy of authentication systems by evaluating the different types {(username, password), (User Certificates), (Single Sign-on systems)} and uses {(Open ID for use across multiple systems), (Enterprise Systems for silod or closed environments), (Single computer environments), {public vs. private access)}.
Line 6: Line 6:
'''Firewalls''': Evaluate single system vs. small networks vs. large multi-location enterprises. Give a taxonomy across types and sizes. Our book has a good discussion of firewalls and you should start there. Don’t forget to differentiate between software vs. hardware as well. Routing plays a key role in firewalls. Evaluate routing options as well including bridging firewalls. The question you are answering: What is the state of the art for authentication systems in the different environments? Must See Systems: Open LDAP, Active Directory, Open ID, Google and Facebook authentication, certificates (server and user) etc.

'''Firewalls''': Evaluate single system vs. small networks vs. large multi-location enterprises. Give a taxonomy across types and sizes. Our book has a good discussion of firewalls and you should start there. Don’t forget to differentiate between software vs. hardware as well.

Routing plays a key role in firewalls. Evaluate routing options as well including bridging firewalls.

Research Topics


Examples

Authentication Systems: Give a taxonomy of authentication systems by evaluating the different types {(username, password), (User Certificates), (Single Sign-on systems)} and uses {(Open ID for use across multiple systems), (Enterprise Systems for silod or closed environments), (Single computer environments), {public vs. private access)}.

The question you are answering: What is the state of the art for authentication systems in the different environments? Must See Systems: Open LDAP, Active Directory, Open ID, Google and Facebook authentication, certificates (server and user) etc.

Firewalls: Evaluate single system vs. small networks vs. large multi-location enterprises. Give a taxonomy across types and sizes. Our book has a good discussion of firewalls and you should start there. Don’t forget to differentiate between software vs. hardware as well.

Routing plays a key role in firewalls. Evaluate routing options as well including bridging firewalls.

More Topics

  • · Intrusion Detection/Prevention Systems
  • · Personal encryption solutions for disk drives, email etc.
  • · Identity protection solutions
  • · Virus protection solutions
  • · Security Appliances appropriate for Autonomous systems
  • · Enterprise wireless security systems
  • · SNMP management systems
  • You may also propose your own topic.

NetworkSecurity/Topics (last edited 2015-02-19 15:36:23 by scot)