diff options
author | marcinzelent <zelent.marcin@gmail.com> | 2018-05-11 21:37:31 +0200 |
---|---|---|
committer | marcinzelent <zelent.marcin@gmail.com> | 2018-05-11 21:37:31 +0200 |
commit | 34ffec5b14daca7cb84c6c3394697db3aba41e26 (patch) | |
tree | 93d856fdc51b5e603adddc68386ae8593587362a | |
parent | ca2af5e70b1f8530a48a5c7ae22e2dedebc92e2f (diff) |
Added plan
-rw-r--r-- | synopsis.pdf | bin | 80690 -> 83149 bytes | |||
-rw-r--r-- | synopsis.tex | 23 |
2 files changed, 23 insertions, 0 deletions
diff --git a/synopsis.pdf b/synopsis.pdf Binary files differindex 8ef3e5a..09589ba 100644 --- a/synopsis.pdf +++ b/synopsis.pdf diff --git a/synopsis.tex b/synopsis.tex index 0b50d5a..47b265a 100644 --- a/synopsis.tex +++ b/synopsis.tex @@ -1,5 +1,7 @@ \documentclass[a4paper]{article} + \usepackage[utf8]{inputenc} +\usepackage{booktabs} \title{Application Security} \author{Marcin Zelent} @@ -22,6 +24,7 @@ I have chosen application security as the topic that I want to learn more about. I decided to work on this subject, because in previous semesters we have learned how to make programs, services and web applications, but we did not learn how to make them safe from exploitation. It is important, since a potential attacker could use it to gain access to the system without authorization, retrieve some sensitive data, abuse or even break the system. This could lead to some serious consequences. \section{Problem definition} + During my research I am going to delve deeper into the subject of application security, its meaning, principles, importance in the modern software development, as well as practical implementation. The main question which I would like to answer is: @@ -37,6 +40,7 @@ In order to give an answer to it, I will first need to find solutions to the fol \end{itemize} \section{Method} + The method which I am going to use in my research consists of a few activities: \begin{itemize} \item Getting general information about application security using all of the sources available on the internet, this could include reading articles, watching videos, talks, lectures and and online courses @@ -44,8 +48,27 @@ The method which I am going to use in my research consists of a few activities: \item Finding detailed descriptions and tutorials about specific attack techniques \item Trying to reproduce the attacks by creating vulnerable applications and exploiting them \end{itemize} + \section{Plan} +To optimize my work and to make sure I will deliver the finishied synopsis before the deadline, I have prepared a plan which I will try to follow: + +\begin{table}[h] + \centering + \begin{tabular}{@{}lll@{}} + \toprule + Week 18 & Week 19 \& 20 & Week 21 \\ \midrule + Writing introduction & Doing an actual research & Writing conclusion \\ + Defining the problem & Describing the work & Reflecting on the work \\ + Choosing the method & Preparing examples & Putting finishing touches \\ + Planning & & \\ \bottomrule + \end{tabular} + \caption{Week plan} + \label{my-label} +\end{table} + +The first week is a project initialization phase, in which I will describe what I am going to do in the next weeks, how and why. In the second and third week I will focus on learning, finding information and describing the results of it. I am also going to focus on the practical part of this project, which is learning how to use different attack techniques and creating examples for the presentation of them. In the last week I will look back at my work, write summary of it, as well as reflections on the research process. I will also proof read my synopsis and correct all mistakes. + \section{Work} \section{Conclusion} |