Cyber Security Brochure
Cyber Security Brochure
Cyber Security Brochure
WORKSHOP ON
CYBER SECURITY
In today's world where everything is being used, controlled and driven digitally makes
our life simple and efficient which is a boon but also a vulnerable area that leads to many
loopholes which can be exploited " detecting and preventing cyber attacks are vital to
government agencies, private organizations and citizens.
Part II
Part I
Computer Security from the Data
Cyber Crime, Frauds and Risks (2.5 hours Science Perspective (2 hours)
approximately)
1. Unique Challenges of security
1. Security goals domain
a. Confidentiality
b. Integrity 2. Data Mining techniques
c. Authentication (association rule mining, clustering,
d. Authorization anomaly
e. Accountability detection) with applications to
f. Non repudiation malware detection
g. Availability
3. Machine Learning techniques
2. Security Mechanisms (Decision Trees, Support Vector
a. Cryptography Machines,
b. Message Authentication Codes and Neural Networks, one class learning,
Cryptographic Hash Functions semi-supervised learning) with
applications to
c. Passwords, Bio metrics and Authentication intrusion detection and malware
Protocols detection
d. Access control (MAC, DAC, RBAC, ABAC)
e. Captchas and resource control Part III
f. Auditing/logging
g. Non-repudiation protocols Email Masquerade and Social
Engineering Attacks (1.5 hours
3. Attacks (Buffer Overflow, SQL and Command approximately)
Injection, DNS cache poisoning, X\
SS, XSRF, DoS/DDoS, Malware, etc.) and Threat 1. Fake emails, phishing and spear-
Modeling phishing - fundamental
characteristics
4. Laws of Security
2. Natural language
5. Secure coding principles processing/Natural language
generation
6. Cyber crime, cyber bullying and cyber 3. Comprehensive detection methods
terrorism for social engineering attacks
7. Internet Safety and data security 4. Education and training regimes
Dr. Rakesh Verma is a Professor of Computer Science at the
University of Houston (UH). He received his PhD and MS in Computer
Science from the State University of New York at Stony Brook in 1989,
where he was a Catacosinos Fellow, and his BTech in Electronics
Engineering from IIT Varanasi with highest honors and a Gold Medal .
He has held visiting professor positions at INRIA Lorraine and CRIN in
Nancy, France. He won the 2013 Life-time Mentoring Award for
Undergraduate Research, a career award given to only one faculty
member per year at UH. Dr. Verma is a distinguished speaker of the
Association for Computing Machinery since 2011. He has
authored/co-authored over 100 articles, with many in leading
Computer Science conferences such as EATCS ICALP, IEEE FOCS,
STACS, ESORICS, ACM CODASPY, ACM ASIACCS, and in journals such as
SIAM Journal on Computing, Journal of the ACM, IEEE Security and
Privacy, and Information and Computation. He has given over 75
invited talks in the US, UK, France, Germany, Japan, India and the
Netherlands. He served as a member of several United States
National Science Foundation Panels. He has also reviewed proposals
for US Department of Education, Israel Research Foundation and
other agencies. He has made fundamental contributions to
equational logic programming, temporal databases, parallel I/O,
natural language processing, and cyber security. His paper on
Collocation Extraction won the Best Paper
Award - First Place at the 17th International Conference on
Computational Linguistics and Intelligent Text Processing. He has
been a Technical Program Committee Chair or Co-Chair of six
workshops including one IEEE and three ACM workshops, and a
member of the Technical Program Committee for several
international conferences including International Conference on
Information Systems Security (2010), Foundations and Practice of
Security (2017), International Conference on Information Systems
Security and Privacy (2016-2018) and Rewriting Techniques and
Applications (2005). He is the editor of the proceedings of three ACM
International Workshops on Security and Privacy Analytics. He was
the Co-Lead in 2009 on the University of Houston Proposal for United
States National Security Agency/Dept. of Homeland Security Center
of Academic Excellence in Information Assurance Education
Certication to UH. His research is funded by several competitive
grants from the US National Science Foundation, National Security
Agency and Department of Defense.
'ICIC Bank Account No. 195605000190 & RTGS/ NEFT IFSC Code ICIC0001956