My senior thesis project is driven by the question of what methodologies and practices are used in information security today, and how can they be improved to better suit today's needs? I have always considered security one of the most vital pillars of computing, and its recent place in the news warrants exploration into how we keep our information safe. We can see how information theft impacts the world through identity theft as well as through "hacktivists" and WikiLeaks. Also, I saw the need for security myself over the summer when my father was the victim of identity theft, with fraudulent charges being made on his credit card.
This project will require lots of outside research, as I need to learn about specific methods of both attacking and defending information, and get up-to-date on current trends in information security. I will also need to examine the "hacktivism" debate and look at the efforts of groups like WikiLeaks and Anonymous, considering whether or not their activities are ethical and if they warrant the response they have received. Thus far, the highest-quality and most interesting source I have found is a paper entitled "The Emperor's New Security Indicators", a paper from 2007 which explores the effectiveness of security authenticators. The paper details a study in which a group walked through the steps of providing their information to a popular online banking site while certain security authenticators were removed.. The subjects tended to submit the information just as readily when the site did not have an HTTPS indicator authenticating its security than when it did. This highlights the role of user attentiveness in the protection of personal information on the Web.
The paper will likely take the largest chunk of my time due to the research involved. However, I predict the coding project will be the most challenging portion of my Senior Thesis. I will find myself relying heavily on the help provided by my mentor and my topic expert in order to pull through. My mentor, Dr. Valenza, has already been extremely helpful in the research process, uncovering sources and granting me access to academic resources and interlibrary loans from which to pull more knowledge. I have only recently started communicating with Professor Mongan, my topic expert at Drexel University, but I am already excited for the opportunities afforded by his involvement. Professor Mongan has taught classes about encryption and security, which ties directly into my project.