As connected devices permeate our lives, it is crucial that the computer infrastructure we rely on so heavily be secure and reliable. Two distinct trends promise to make information security even more important in the future. First, computers are finding their way into new and exciting applications: from smart building controls, to autonomous robots, to medical devices, computing imparts both agility and unpredictability. Second, nearly every computer is connected in some way to another: from short-range wireless protocols, to increasingly ubiquitous cellular data and high-speed broadband, it is faster than ever to share data or compromise personal privacy. At the heart of whether the benefits that drive these trends will outweigh their inherent risks is whether we can engineer these systems to be secure and reliable. This course will explore the security benefits and risks of these trends, how they can be addressed, and how multidisciplinary problems can bring together researchers from disparate fields to meet the challenges of achieving security in a connected world.
OBJECTIVE OF THE WORKSHOP
The objective of the course is to bring awareness in the student/teaching fraternity, about the importance and means of information security as well as empower them to safeguard the interest of the nation against cyber-crime by bringing together eminent researchers, educators, engineers and practitioners in the field under one roof.
TENTATIVE TOPICS TO BE COVERED IN WORKSHOP
Intrusion Detection and Prevention Techniques
Phishing, Securing Online Transactions and E-mail
Security in IoT
Cyber crime and Digital Forensics
Web, E-commerce, M-commerce and E-mail security
Security in Social Media
Cloud and related Securities
WORKSHOP IMPACT - EXPECTED OUTCOME
Enhancing the curriculum of information security and computer forensics of present academia by introducing innovative experiments and exposing them to the research challenges for their possible pursue. The course is designed to provide in depth knowledge and training on the modern information security and forensic tools. Evaluation, practice and discussion sessions are evenly distributed to ensure that the taught idea is understood
Course Duration: 5 days, March 17-21, 2016
WHO SHOULD ATTEND
The primary audience will include students enrolled in B.Tech and M.Tech courses who are interested in Information Security, Network Security, Cyber Security as well as conducting research related to the areas of information security, forensics, Cyber-crime and law. Other genre of audience includes PhD scholars, Faculties and Industry Personnel interested in the same. This workshop will be of value to students, researchers, faculty as well as Industry Executive.SHARE THIS