Keep the use of text to a minimum, use graphs and images where possible. Reminder: Include all references at the bottom of the report and state if there are any direct citations.
Resources required to run the website
File Provence - MD5 Checksum of the file available plaintext on the website
Admin Page with details of user payments
Authentication Log in email - Containing key (as well as passwords)
Security aspects - Lock account after 3 login attempts
Priten -
Design the website
Create the website - Layout, forms, etc etc Deadline 7.02.2014
Flow chart of the processes involved - How the user receives the end product Complete for website
Jack - Compiling the Report
Database - Username, Password, DOB, Email Address
Decryption Key, Book information, etc etc Under design, Awaiting Server for construction
Flow chart of the processes involved - How the user receives the end product Complete for website
Kirran -
Research Payment system - Paypal with automated email sending to the customer once product has been purchased Deadline 7.02.2014
Specification of the project requirements Extended to 31.01.2014 OVERDUE
TASK 1 WORK IS OVERDUE 31.01.2014
Did not attend
Abdul -
Comparison of different encryption techniques (Less text, use bar graphs to compare) -
Strength, Speed of encryption, Read speed, Write Speed, Reliability Deadline 3.02.2014
Set up the Virtualbox image (Debian Web-Server) - Include PHPMyadmin Deadline 31.01.2014
SECURE and DOCUMENT WEB SERVER ^
Hisham -
Encoding website entry OVERDUE 03.02.2014
Database protection (Protection from SQL Injections) Complete, Needs word count reduction
Concept Design PHP that locks out user after 3 passwords attempts (Blocks IP Address temporarily) Deadline 07.02.2014
Did not attendDatabase protection (Protection from SQL Injections) Complete, Needs word count reduction
Concept Design PHP that locks out user after 3 passwords attempts (Blocks IP Address temporarily) Deadline 07.02.2014
Task 1 - Create educational material about the basics of cryptography
- Target is 12-13 year old children
For task 1, all members will create a small document of research. This document will teach the other members of the group the topic.
Possible choices: (Minimum 2 slides, Maximum 4 slides. Size 14-16 Font)
Possible choices: (Minimum 2 slides, Maximum 4 slides. Size 14-16 Font)
What is cryptography? (Introduction)Substitution CiphersHashingSymmetric Key encryptionPublic key encryptionWhy we encrypt data?History of cryptography- Legal Aspects Regarding Cryptography
Jack
Task 1
Task 1
Symmetric Key encryption Complete, Needs Checking
Symmetric Key encryption Research (In a report) Complete, Needs Checking
History Of Cryptography Complete, Needs Checking
History Of Cryptography Research (In a report) Complete, Needs Checking
History Of Cryptography Complete, Needs Checking
History Of Cryptography Research (In a report) Complete, Needs Checking
Priten
Task 1
Compile the Presentation
Task 1
Compile the Presentation
Public Key encryption Complete, Needs Checking
Public Key encryption Research (In a report) Complete, Needs Checking
Why we encrypt data? Complete, Needs Checking
Why we encrypt data? Research (In a report)Complete, Needs Checking
Why we encrypt data? Complete, Needs Checking
Why we encrypt data? Research (In a report)Complete, Needs Checking
Kirran
Task 1
Task 1
Substitution Ciphers Complete, Needs Checking
Substitution Ciphers Research (In a report) Complete, Needs Checking
Legal Aspects Regarding Cryptography OVERDUE 31.01.2014
Legal Aspects Regarding Cryptography (In a report) OVERDUE 31.01.2014
Legal Aspects Regarding Cryptography OVERDUE 31.01.2014
Legal Aspects Regarding Cryptography (In a report) OVERDUE 31.01.2014
Abdul
Task 1
What is cryptography? (Introduction) Complete, Needs Checking
What is cryptography? (In a report) Complete, Needs Checking
Hashing Complete, Needs Checking
Hashing Research (In a report) Complete, Needs Checking
What is cryptography? (Introduction) Complete, Needs Checking
What is cryptography? (In a report) Complete, Needs Checking
Hashing Complete, Needs Checking
Hashing Research (In a report) Complete, Needs Checking
Hisham
No Work Assigned For Task 1 Due To Lack Of Attendance
Once work has been completed, inform Jack which work will replace the completed work (so we don't get multiple members working on the same slide)
No comments:
Post a Comment
Note: only a member of this blog may post a comment.