16-11-2012, 06:21 PM
CS G357: Computer Security, Privacy and Usability
Computer Security.ppt (Size: 394 KB / Downloads: 115)
Analysis of HW5: Good Reports
Explains what tools were used
Explains what was found.
Gives specific details without compromising privacy
HW5: Things to avoid
Spending more than a paragraph describing your tools
Giving a few paragraphs of vague generalities talking about what was found.
Listing filenames without any thought as to what might be in the files.
Final Projects
You will need to have groups of two. Justification:
Two people can do a better project than one person.
Group work ethic should prevent some people from leaving this to the last minute.
You can write code, you can do policy, but the best projects will do both.