You are on page 1of 2

Project Ideas

-Keylogger
-API security
-MPLS (Traffic engineering)
-Data disposal (Encryption of data)/Recovery of data
-Firewalls(Source filtering<Metric requests per minute>

THINGS TO RESEARCH ON:


-The Blooms taxonomy of verbs
-Research methodolody
-System Development methodolody

TITLE:
-Do not exceed 15 words

PRELIMINARY PAGES
-Cover Page
-Declaration page
-Abstract
-Acknowledgement
-Table of content
-List of Figures/Tables/Abbreviations
-Definition of Terms

Chapter 1:
1.1-Backgroud
1.2-Problem statement
1.3-General aim
Understand the gaps in the system and they need to be chronological
Then develop the application
Test the application
1.4-Specific objectives:
-Must start with a "to"
-Need to be SMART
1.5-Research questions
Convert your objectives to questions
1.6-Justification/Significance
Contribution to society
1.7-Scope
1.8-Limitations and Delimitations

Chapter 2(Very detailed)

Literature Review
-Imperical Framework
What is password vault ? Hashed version ? How they work ?
How they interact?
Are there underlying principles? Open designs , Complete mediation ,Authentication
mechaninsm, How they work ? ,Hashing algorithn=ms (MD5) ,
The algorithms are open to criticm .
Least privilige principle (Network security)
Review what other people have done in terms (password storage,hashing)
Limitations they considered in there scope ,the gaps they left

-Conceptual Framework(Diagramatic representation)


How we see our solution working if it was an image or graphic
Building a mental picture
What are the outputs we get in terms of password storage
-

You might also like