Question: DO NOT COPY PASTE SAME IDEA FROM OTHER USER DO NOT WANT THIS TYPE OF IDEAS ALREADY Password Analyzer Graphical Password Authentication Network Traffic Analyzer
DO NOT COPY PASTE SAME IDEA FROM OTHER USER
DO NOT WANT THIS TYPE OF IDEAS ALREADY
Password Analyzer
Graphical Password Authentication
Network Traffic Analyzer
Image Encryption
Keylogger Software
Text Encryption Using Various Algorithms
Packet Sniffing
Real-time emergency response: Improved management of real-time information during crisis situations
Caesar Cipher Decoder
--------------------------------------------------------------------------------------------------------------
The ideas must be simple & workable for Degree or Undergraduate in Malaysia
Explain the ideas in details that will help us to understand the ideas present
The Ideas must be from this below list of AREA OF INTEREST/RESEARCH:
>Computer Security
>Computer Forensics
>Network Security
>Web Development in Security
>Mobile App Development in Security
>E-Learing/M-Learning in Security
LIST 20 IDEAS for the FYP of Computer Science Major in Security below will be shown some sample of FYP tittle
LIST SOME IDEAS THAT ALMOST RELEVENT TO THE FYP TITTLE BELOW
Sample of Security Idea for Final Year Project
Cybersecurity Awareness Mobile Learning Application Credit card fraud detection program using backlogging Fake Review Filtering System Two-factor authentication using facial recognition for student information system
Implementing Badge reward system in CTF Generale password base on the password strength Cryptography based CTF with proper leaming/difficulty curve Introductory guides for new leamers in the field of CTF How to minimize the risk of being attack from outdated software?
Relay Attack Device on Bypassing Car Key Security Electronic Voting System with Blockchain Technology Implementing AES Encryption with OTP during user identification Implementation of Gamification to Improve CTF Learning Experience for beginners
--------------------------------------------------------------------------------------------------------------
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
