Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Capstone Project Ideas - 2023

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Capstone project Ideas

1. Security Risk Management in E-commerce Systems


The wide range of e-commerce benefits encourage businesses to build an e-commerce solution.
However, the inherent risks of such systems pose threats as well. Therefore, there is a need for
continuous risk analysis and management for e-commerce systems. The main aim of this project
is to investigate the methods and techniques that can be used to perform risk analysis &
management for e-commerce systems. The answer may not provide a measure for state-of-the-
art security, but at least outline procedures that are beneficial for e-commerce systems.

2. Discovering security gaps using Google Dorks


The information age has brought changes to our lives. More and more assets are getting
connected to the Internet. On the one hand, the connectivity to this ever-growing network of
connected devices and assets (the Internet) precipitates more convenience and access to various
resources. However, on the downside, the Internet could be the hot bed for malicious actors like
hackers, attackers, and cybercriminals’ communities. Continuous Penetration testing and
monitoring of the sites, and forums providing illicit digital products and services is a must-do
task nowadays. Advanced searching techniques could be employed for discovering such forums
and sites. Google dorks that are utilizing Google’s advanced searching techniques could be
applied for such purposes. Google dorks could be used for other areas that we will explain during
this thesis in more detail like information gathering, vulnerability detection, etc. The purpose of
this project is to propose advanced searching techniques that will help cybersecurity
professionals in information gathering, reconnaissance, vulnerability detection as well as
cyber-criminal investigative tasks.

3. Detecting and Defending against Cyber Attacks in a Smart Home Internet of Things
The Internet of Things (IoT) is defined as the system of interconnected electronic devices
embedded with software, sensors, actuators, and network connectivity which enables them to
connect and exchange data. IoT is considered as being the next technological revolution which is
shifting how we as individuals, economic entities, and governmental organizations interact with
the physical world, such technologies come with enormous security flaws. However, IoT devices
are subject to a range of security flaws, including heart bleed, Man-In-The-Middle (MITM),
Denial of Service (DoS), data leakage, weak passwords, and more. The purpose of this project is
to investigate typical risks (weaknesses) in common Smart City IoT devices; investigate devices
appear to feature the most easily exploitable vulnerabilities, with the potentially gravest
consequences; and come up with solutions could be possible to mitigate the identified risks..
4. A Decision-Making Methods for Selection of Security Controls
There are many challenges regarding decision making process in the context of Information
Security that include (1) risk assessment, (2) security controls analysis, and (3) selection of
security controls to mitigate risks in a cost-effective manner. For that reason, the goal of this
project is to research a decision-making method that supports the selection of IT security
controls, in the way that it would be easier for security consultants and organizations to make
sufficient security investment and strengthen their security baseline.

Few Other Topics:

 Investigating Offshore Third‐Party Cybersecurity Risks

 Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon

 Developing a cybersecurity culture through effective training and awareness programs

You might also like