RU beehive logo ITEC dept promo banner
ITEC 345
2013fall
ibarland

homelectshws
D2Lbreeze (snow day)

paper-description
Course Paper

Pick a topic to research, and write a report (5-7 pages long) on that topic. I have provided a few sample topics below, however I encourage you to consider other security-related topics as well. The report must closely adhere to the format of an IEEE research paper, including citations. A sample format in MS word is available.

Be sure your paper is informative, specific, and well-written. You (or a lucky roommate) should give it a close read just before submitting, to catch any grammatical errors, missing words, inconsistent verb tenses, and the like. Ask the reader to tell you something specific that they learned from your paper (and, have in mind something that you hoped they learned, that they didn't know before).

Include a bibliography with at least two original (non-Wikipedia) sources. Citing web sources is okay (but at least one non-web source is preferred when possible). Your paper’s bibliography does not contribute toward the page count.

Turn-in details:

Here is what is expected for each of the deadlines above:

Content Standards

Be specific, not vague

In all cases, giving specific details and concrete examples and techniques is more important than giving general-but-nonspecific overviews.

For example, rather than saying: “Email is insecure, because messages can be forged.” instead, explain how it can be forged:

Email using SMTP doesn’t require authentication: it can be forged. The SMTP server receiving a message simply receives a string stating who the message is purportedly from; anybody connecting to the SMTP server can provide any message and claim any originator.
Even better, demonstrate your point, perhaps including an appendix with a sample SMTP exchange, with the sender’s text in green, and the SMTP server’s output in black:
220 rucs.radford.edu ESMTP Postfix (Ubuntu) 
MAIL FROM:imposter@doppelganger.com
250 2.1.0 Ok
RCPT TO:victim@gmail.com
250 2.1.0 Ok
DATA
354 End data with <CR><LF>.<CR><LF>
subject: help
As a Nigerian prince, I demand your bank account number! 
.
250 2.0.0 Ok
The first version doesn’t necessarily demonstrate any understanding, while the second version explains and specifically demonstrates why.

Similarly: Rather than just say loosely “DES is insecure”, be more precise:

An attacker can break DES with a brute-force attack: the 56-bit key has 256 ~ 72 quadrillion possible values. Although this is very large, it is on the edge of feasible: a network of 1000 students, using off-the-shelf desktop computers (3GHz processors), each taking 100 cycles to do each the 16-rounds of DES, could crack any key within 1.2yrs.

If you find yourself using terms like “can hack into” and “highly insecure”, strive to give concrete examples instead.

Avoiding plagiarism

A good approach to guard against plagiarism is to keep an hour (or better, one day) between reading and writing. That is, read various sources, and take brief notes. Then wait a day, letting the concepts stew. After that, sit down and try to clearly explain the important issues and concepts. If you find yourself getting stuck, or can't remember specific facts, go back and read but (again) wait a day before resuming that part of the writing.

Proof-reading

Even if you don't use Word/OpenOffice, you might want to paste your document into Word just to look for red and green grammar errors/warnings. Also, be sure to scan specifically for common mistakes: “its”/“it's”; “to”/“too”; “their”/“there”/“they're”.

If a roommate or friend is also working on a paper, swap proofreading with them. (You can also give them feedback on what is unclear, too wordy, etc..)

Use bulleted lists

When appropriate use bulleted lists (or enumerated lists, where the order is important). Using sub-sections can also help reveal the structure of your thinking.

Possible Topics (with some possible resources):


1 If you feel very strongly, you can use the pseudonym from your paper. Note that your comments will not affect the author's grade, as discussed below.      

2Of course, I'll take into account the differences between the author's polished version and the version you read.      

homelectshws
D2Lbreeze (snow day)


©2013, Ian Barland, Radford University
Last modified 2013.Dec.08 (Sun)
Please mail any suggestions
(incl. typos, broken links)
to ibarlandradford.edu
Powered by PLT Scheme