Monday, 27 January 2014

Project 3, Session 7

Task 3 - File repository

Keep the use of text to a minimum, use graphs and images where possible.  Reminder: Include all references at the bottom of the report and state if there are any direct citations.


Resources required to run the website
File Provence - MD5 Checksum of the file available plaintext on the website
Admin Page with details of user payments
Authentication Log in email - Containing key (as well as passwords)
Security aspects - Lock account after 3 login attempts                

Priten -
Design the website  - Possibly Dynamic rather than static? Deadline 29.01.2014
Create the website - Layout, forms, etc etc Deadline 7.02.2014
Flow chart of the processes involved - How the user receives the end product Deadline 29.01.2014

Jack - Compiling the Report
Design the website - Possibly Dynamic rather than static? Deadline 29.01.2014
Database - Username, Password,  DOB, Email Address Deadline: Awaiting Server Setup
                  Decryption Key, Book information, etc etc  Deadline: Awaiting Server Setup
Flow chart of the processes involved - How the user receives the end product Deadline 29.01.2014

Kirran - 
Research Payment system - Paypal with automated email sending to the customer once product has been purchased Deadline 7.02.2014
Specification of the project requirements Deadline 29.01.2014
WORK ADDED FOR TASK 1 (Do that first)
Did Not Attend

Abdul - 
Comparison of different encryption techniques (Less text, use bar graphs to compare) -
Strength, Speed of encryption, Read speed, Write Speed, Reliability Deadline 3.02.2014
Set up the Virtualbox image (Debian Web-Server) - Include PHPMyadmin Deadline 31.01.2014
SECURE and DOCUMENT WEB SERVER ^


Hisham - 
Did Not Attend
Assigned work upon attendance to session




Task 1 - Create educational material about the basics of cryptography
  • Target is 12-13 year old children
For task 1, all members will create a small document of research.  This document will teach the other members of the group the topic.

Possible choices: (Minimum 2 slides, Maximum 4 slides.  Size 14-16 Font)
  • What is cryptography? (Introduction)
  • Substitution Ciphers
  • Hashing
  • Symmetric Key encryption
  • Public key encryption
  • Why we encrypt data?
  • History of cryptography
  • Legal Aspects Regarding Cryptography
Jack
Task 1
Symmetric Key encryption Complete,  Needs Checking
Symmetric Key encryption Research (In a report) Complete,  Needs Checking
History Of Cryptography Complete,  Needs Checking
History Of Cryptography Research (In a report) Complete,  Needs Checking

Priten 
Task 1
Compile the Presentation
Public Key encryption Complete,  Needs Checking
Public Key encryption Research (In a report) Complete,  Needs Checking
Why we encrypt data? Complete,  Needs Checking
Why we encrypt data? Research (In a report)Complete,  Needs Checking

Kirran
Task 1
Substitution Ciphers  Complete,  Needs Checking
Substitution Ciphers Research (In a report) Complete,  Needs Checking
Legal Aspects Regarding Cryptography Deadline 31.01.2014
Legal Aspects Regarding Cryptography (In a report) Deadline 31.01.2014

Abdul
Task 1
What is cryptography? (Introduction) Complete,  Needs Checking
What is cryptography? (In a report) Complete,  Needs Checking
Hashing Complete,  Needs Checking
Hashing Research (In a report) Complete,  Needs Checking

Hisham
Did Not Attend
Assigned work upon attendance to session



Once work has been completed, inform Jack which work will replace the completed work (so we don't get multiple members working on the same slide)

No comments:

Post a Comment

Note: only a member of this blog may post a comment.