Data Compression Techniques - Project Synopsis
Data Compression Techniques - Project Synopsis
Data Compression Techniques - Project Synopsis
Submitted by:
Gaurav Sharma : 00110102713
Harshvardhan : 00910102713
Gaurav Singh : 06410102713
Functional Requirements
The proposed Security Algorithms, Protocols and firewall must support the
following functions:
A Secured & JavaScript enabled browser must be used by the users (Chrome,
Firefox etc.).
User must be authenticated using secured private connection with an Anti-bot
verification feature.
Intrusion Detection is the main chain-link to prevent.
The IP Address of the user must be verified & monitored for unusual behavior
like spoofing, redirecting etc.
The Website's Firewall must reserve some ports on the target system.
IP address will be blacklisted, reports must be sent to both Admin and user & a
quick solution must be availed.
Security measures must be taken so that it does not affect the website's
responsiveness, flexibility & interaction.
Background
The following keywords have been frequently used in our analysis of the website:
Java Programming will be used to code the Authentication Algorithms and it will be
embedded to a Java Server Page (JSP).
JSP uses Java Programming so is easily portable. It also offers higher performance
than other server side pages like CGI, Perl.
We will be using several software (SQL Injector, Metasploit, w3af etc.) and tools (pen
test-tools etc.) for penetration testing of our website, checking the strength of its
stronghold.
References
1. William Stallings, Cryptography and network security: principles and
practices (2006), Pearson Education India.
2. M.T. Dlamini, J.H.P. Eloff, M.M. Eloff, Information security: The moving
target (2009), Computers & Security (Vol. 28, Issues 3-4)
3. Lori M. Kaufman, Data Security in the World of Cloud Computing (2009),
IEEE Security & Privacy (Vol.7, Issue 4)