Monday, 3 February 2014

Project 3, Session 10

Task 3 - File repository

Keep the use of text to a minimum, use graphs and images where possible.  Reminder: Include all references at the bottom of the report and state if there are any direct citations.

Resources required to run the website
File Provence - MD5 Checksum of the file available plaintext on the website
Admin Page with details of user payments
Authentication Log in email - Containing key (as well as passwords)
Security aspects - Lock account after 3 login attempts            

Priten -
Design the website
Create the website - Layout, forms, etc etc Deadline 7.02.2014
Flow chart of the processes involved - How the user receives the end product Complete for website

Jack - Compiling the Report
Design the website Complete
Database - Username, Password,  DOB, Email Address
                  Decryption Key, Book information, etc etc   Under design, Awaiting Server for construction
Flow chart of the processes involved - How the user receives the end product Complete for website

Kirran - 
Research Payment system - Paypal with automated email sending to the customer once product has been purchased Deadline 7.02.2014
Specification of the project requirements Extended to 31.01.2014 OVERDUE
TASK 1 WORK IS OVERDUE  31.01.2014
Did not attend

Abdul - 
Comparison of different encryption techniques (Less text, use bar graphs to compare) -
Strength, Speed of encryption, Read speed, Write Speed, Reliability Deadline 3.02.2014
Set up the Virtualbox image (Debian Web-Server) - Include PHPMyadmin Deadline 31.01.2014
SECURE and DOCUMENT WEB SERVER ^

Hisham - 
Encoding website entry OVERDUE 03.02.2014
Database protection (Protection from SQL Injections) Complete, Needs word count reduction
Concept Design PHP that locks out user after 3 passwords attempts (Blocks IP Address temporarily) Deadline 07.02.2014
Did not attend



Task 1 - Create educational material about the basics of cryptography
  • Target is 12-13 year old children
For task 1, all members will create a small document of research.  This document will teach the other members of the group the topic.

Possible choices: (Minimum 2 slides, Maximum 4 slides.  Size 14-16 Font)
  • What is cryptography? (Introduction)
  • Substitution Ciphers
  • Hashing
  • Symmetric Key encryption
  • Public key encryption
  • Why we encrypt data?
  • History of cryptography
  • Legal Aspects Regarding Cryptography
Jack
Task 1
Symmetric Key encryption Complete,  Needs Checking
Symmetric Key encryption Research (In a report) Complete,  Needs Checking
History Of Cryptography Complete,  Needs Checking
History Of Cryptography Research (In a report) Complete,  Needs Checking

Priten 
Task 1
Compile the Presentation
Public Key encryption Complete,  Needs Checking
Public Key encryption Research (In a report) Complete,  Needs Checking
Why we encrypt data? Complete,  Needs Checking
Why we encrypt data? Research (In a report)Complete,  Needs Checking

Kirran
Task 1
Substitution Ciphers  Complete,  Needs Checking
Substitution Ciphers Research (In a report) Complete,  Needs Checking
Legal Aspects Regarding Cryptography OVERDUE 31.01.2014
Legal Aspects Regarding Cryptography (In a report) OVERDUE 31.01.2014

Abdul
Task 1
What is cryptography? (Introduction) Complete,  Needs Checking
What is cryptography? (In a report) Complete,  Needs Checking
Hashing Complete,  Needs Checking
Hashing Research (In a report) Complete,  Needs Checking

Hisham
No Work Assigned For Task 1 Due To Lack Of Attendance



Once work has been completed, inform Jack which work will replace the completed work (so we don't get multiple members working on the same slide)

No comments:

Post a Comment

Note: only a member of this blog may post a comment.