Project Title: (TAILS OPERATING SYSTEM) Study the security issues concerning data persistence and anonymity which this software addresses. Write a report covering the security issues this software addresses and critically analysing any weaknesses in this approach. More information on [login to view URL]
Students must each individually hand in a combined Technical Investigation and Context and Conclusions report (3500 words suggested) .
Each student will carry out a technical investigation into the security subject chosen. The nature of this will depend upon the mini project topic selected. This investigation might involve a review of the mathematical or legislative issues chosen, it might require development of a small program to carry out automated testing of another program or analysis of its log files. The investigation might more typically require installation, configuration and testing of a program from a security perspective. It might result in a user guide or a howto guide. The technical investigation will result in appropriate report sections, which should describe the reasoning behind main decisions taken, as
well as the technical investigation itself and the results obtained from this.
The technical investigation must be appropriately documented as part of the report, the additional requirements of which are described below. The nature of the technical report section will vary considerably depending upon the security topic and method of investigation chosen.
Where collaboration involving 2 students is part of a registered project description, it is accepted that up to 50% of the technical investigation content of this making up no more than 30% of the total report may be submitted as a group report, i.e. as information which may be included within both student reports which must be submitted individually. However, the joint part must be clearly marked in both submissions as having joint authorship and the individual investigation resulting from joint work must be clearly distinguished from this part as the submitting student’s own work.
If it is submitted entirely in writing, 2000 words as written by student are suggested for this report part, but the use of screenshots, source listings of student-written program-code or relevant configuration edits, tabulated test results and diagrams etc, might in some cases be appropriate for part of this technical content. In some cases students may individually choose to submit longer technical investigation report sections and shorter context and conclusion sections.
Context and conclusions
In addition to the sections within the report describing the details of the technical investigation, each student will in addition individually write (suggested 1500 words) summarising:
a. Based upon the rationale for selection of key information resources (books, online forums, web information resources) used, what was learned from each main resource. The rationale for the main investigation and experimental choices made.
b. The context of the security issues addressed, the results of other relevant research carried out by other parties into the security subject, target or issue covered. Wider conclusions arrived at through background reading and discussion. Recommendations as to future work to advance the topic investigated.
c. The individual discoveries and conclusions resulting from the project undertaken.