Project Frameworks

27 Network Security and IT

Amanda McEachern Gaudet and Mackenzie Collins

Students from this program are expected to have experience or knowledge in the following areas: network engineering, databases, cryptography, malware analysis, operating systems security, and digital transmission.

Open-Source Software Management

Harnessing high-quality open-source software can reduce product production time and increase the viability of otherwise unachievable projects. Determine which new open source tools are best suited to organization’s needs or in improving your organization’s existing open-source tools.

The final project deliverable: A report of current trends in open source software, which technologies are relevant for your organization, and how you could implement them to your advantage.

Software Lifecycle Analysis

A team of students will study your organization’s software development processes and complete a proposal on how to optimize your systems and procedures. Alternatively, students can set up a new ideal workflow for a start-up organization. Project could include:

  • Improving your existing software development lifecycle methodologies.
  • Determining if you should use a waterfall approach or an agile approach.
  • Researching tools for continuous delivery or integration.

The final project deliverables will include:

  • A report outlining your recommended software development lifecycle.
  • A final presentation explaining processes and key findings of the project.

Real-Time System Development

Courses and Guided Projects

Design and implement a fully functional real-time system that alleviates a challenge or provides a competitive advantage for organization. Work will include design documentation, an implementation roadmap, and building a fully functioning real-time system.

Project examples include, but are not limited to:

  • A chat/messenger application
  • Building a state container system
  • Implementing a socket event management system
  • Adding “presence” to an existing framework such as a chat application

The final project deliverables will include:

  • The original documentation for the architectural design of the system
  • The product roadmap used to create the system and plan implementation
  • The source code for the new real-time system
  • A final presentation

Database and Architecture Optimization

The client wants to implement improvements and solutions to their system.

  • Review existing structure
  • Research options, and needs of client
  • Suggest improvements to data storage and querying
Examples:
Optimizing and Enhancing Performance of Database Engine Using Data Clustering Technique
M. H. Rahman, F. B. Al Abid, M. N. Zaman and M. N. Akhtar, “Optimizing and enhancing performance of database engine using data clustering technique,” 2015 International Conference on Advances in Electrical Engineering (ICAEE), 2015, pp. 198-201, doi: 10.1109/ICAEE.2015.7506830.

Courses and Guided Projects

Cybersecurity Upgrade Proposal

Plan, implement and upgrade security measures for the protection of the organization’s data, systems, and networks. Look for industry-best security measures, or recommend custom-built (with feature descriptions) for company needs. The client wishes to ensure that the organization’s data and infrastructure are protected by enabling the appropriate security controls. Present results and future recommendations for future implementation.

Example of Final Proposal Features:

  • Executive Summary
  • Background
  • Proposal
    • Option 1
    • Option 2
    • Option 3, etc.
  • Risk Assessment
  • Market Research
  • Resources, Roles and Responsibilities
  • Next Steps
  • Hardware and Software Requirements
  • Financial Plans
  • Training and Recommendations

IT Security Risk Assessment

  • List all IT assets and owners – identify potential security threats to the assets
  • Look for vulnerabilities in the data systems, assess the risk of asset exploitation by the threats, determine the impact of the security risks
  • Evaluate existing controls and propose new measures. Review results and complete security proposal

Courses and Guided Projects

Web Application Security Testing by Alex Carraway, Coursera

Password Vulnerability Project

Example:
Detailed Security Risk Assessment Template by IT & Security Office, University of Iowa
  • Research available open-source code, or similar tools to inspect. Collect feature recommendations from clients.
  • Design software.
  • Create software using Python that checks the strength of the user’s password and tells if it is safe to use or not.

RFID Blocking

Radiofrequency identification tags present on credit cards and debit cards are prone to attacks from software that can read them from a certain distance, leading to illegal access to cards. The client wants you to either build an application to detect nearby radar accessing cards, or software that prevents RFID readers from reading cards.

  • Research available avenues for the build, compare options and usability of open-source codes based on client needs
  • Build the framework for the application/software
  • Build the program – if unable to finish, must include a report for next steps

Strategic Information Technology Plan

Tools and Templates

The client wants a strategic information technology plan that will provide a roadmap and guidance to their organization in getting their IT assets and capabilities where they need to be to ensure future competitiveness and success in their industry.

  • Research: complete a needs assessment, research the mission and vision statements of the company, research industry standards and competitor trends and capabilities
  • Recommend: Determine hardware, software, and IT human resources recommendations
  • Present training and implementation overview, draft budget and costs

Software Security Model

The client is developing a new management system and requires a security model to protect their data as well as support efficient access and usage. This will combine role-based security, record-level security, and field-level security to define the overall security rights of users within their system.

  • Design a security model that organizes users by roles, responsibilities, or tasks and accompanying sets of privileges/access
  • Provide users with access to the appropriate types of information required for their roles, while preventing access to records they do not need
  • Support data sharing so that users and teams can be granted access to protected records for a specified collaborative effort

Courses and Guided Projects

File and Directory Manipulation with Linux for IT Engineers by Abdelrahman Tarek Hafez, Coursera

 

License

Icon for the Creative Commons Attribution 4.0 International License

Tools and Resources for Capstone (v. 1.2 Jan 2024) Copyright © by Amanda McEachern Gaudet and Mackenzie Collins is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book