Cybersecurity Project Guide
This guide is customized for you, based on your interests in Cloud Security and AI for Cybersecurity
(Deepfake Detection),
your skills (Java, learning Python, networking), and your available time (3 months, solo project).
---
PROJECT TOPICS & DESCRIPTIONS
1. Cloud Misconfiguration Scanner
Title: "Automated Scanner for Detecting Cloud Storage Misconfigurations in AWS"
Description:
A tool (in Python or Java) that connects to an AWS account using its API, checks common
misconfigurations like:
- Publicly open S3 buckets
- Unrestricted security groups
- Exposed IAM keys
Outputs a report showing vulnerabilities. Relevant, doable, and teaches you both cloud & security.
---
2. Deepfake Image/Video Detection
Title: "Deepfake Detection using Basic Image Analysis Techniques"
Description:
A program that analyzes video frames for inconsistencies (lighting, shadows, artifacts) using
OpenCV or similar.
Optionally integrates an open-source ML model as a black box.
---
3. Cloud Security Log Analyzer with AI Insights
Title: "Cloud Security Event Log Analyzer with Anomaly Alerts"
Description:
Collects logs from AWS CloudTrail or S3 access logs, parses them, and flags unusual activities
using basic stats.
Optionally integrates a simple anomaly detection library.
---
3-MONTH TIMETABLE
Month 1 - Foundation & Planning
- Week 1: Finalize topic, set up AWS Free Tier, learn Python basics (file I/O, APIs, boto3/OpenCV).
- Week 2: Research problem deeply, write scope & architecture.
- Week 3: Build small prototypes: S3 bucket listing, or frame extraction from video.
Month 2 - Development
- Weeks 4-5: Build core functionality.
- Week 6: Add reporting features, modularize code, test cases.
Month 3 - Finalization & Documentation
- Weeks 7-8: Advanced features & polish.
- Week 9: Demo scenarios & test thoroughly, start writing report.
- Weeks 10-12: Final debugging, write documentation, slides, and rehearse presentation.
---
DELIVERABLES
- Source code (GitHub/zip)
- Report (20-30 pages PDF)
- Presentation slides (10-12 slides)
- Optional: demo video
TOOLS & RESOURCES
- Python: boto3 (AWS SDK), OpenCV
- AWS Free Tier: S3, IAM, CloudTrail
- Open-source datasets: FaceForensics++ (for deepfakes)
- IDE: VS Code/PyCharm
---
ABSTRACT & PROBLEM STATEMENT (Example: Cloud Misconfiguration Scanner)
Abstract:
Cloud storage services like AWS S3 often suffer from misconfigurations, leading to serious data
breaches.
This project proposes an automated scanner that identifies common misconfigurations in AWS
environments,
including publicly exposed S3 buckets, insecure security groups, and exposed IAM keys.
The tool connects to an AWS account, scans resources using AWS SDK, and generates a detailed
vulnerability report.
Problem Statement:
Despite the robust security offered by cloud providers, user misconfigurations remain a critical risk
factor.
Organizations often leave S3 buckets public or security groups open to the world.
This project addresses the need for an easy-to-use, automated tool that scans AWS resources
and highlights misconfigurations, reducing human error and enhancing cloud security posture.
---
You can adapt this for the other topics similarly.
Best of luck with your project!