Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

What can be a project idea on IT/Cyber Security?


  • Please log in to reply
3 replies to this topic

#1 yashrajkakkad

yashrajkakkad

  • Members
  • 1 posts
  • OFFLINE
  •  

Posted 17 January 2016 - 08:55 PM

I am supposed to participate in a science exhibition where I have to prepare a static/dynamic model on IT/Cyber Security. In other words, I have to find a gap in this industry, fill it and present it accordingly.
 
So what do you think can be a good idea for this exhibition?
 
 
 


BC AdBot (Login to Remove)

 


#2 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,426 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:12:40 PM

Posted 17 January 2016 - 08:59 PM

A way of teaching users how to be aware of what they click on in layman's terms for Grandma to understand. :)

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,939 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:40 PM

Posted 17 January 2016 - 10:22 PM

IMO that gap is the user...It has been proven time and again that the user is a more substantial factor (weakest link) in security than the architecture of the operating system or installed protection software.Demonslay335's suggestion is good. You can even find some related info in this topic.

Another would be falling for Phony Tech Support Scams.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 RolandJS

RolandJS

  • Members
  • 4,478 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Austin TX metro area
  • Local time:12:40 PM

Posted 17 January 2016 - 11:05 PM

"...It has been proven time and again that the user is a more substantial factor (weakest link) in security than the architecture of the operating system or installed protection software..."

I resemble that!  --Roland Dangerfield

 

Seriously, include instructions on how to set up a Widows [or 3rd party] firewall, an anti-virus program, and an anti-malware program that Grandma can understand, appreciate, and use without being overly-burdoned by same.


Edited by RolandJS, 17 January 2016 - 11:06 PM.

"Take care of thy backups and thy restores shall take care of thee."  -- Ben Franklin revisited.

http://collegecafe.fr.yuku.com/forums/45/Computer-Technologies/

Backup, backup, backup! -- Lady Fitzgerald (w7forums)

Clone or Image often! Backup... -- RockE (WSL)

"I heard Spock finally got colander!"  "I believe the word is Kolinahr."  "Oh."





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users