SCHEDULE. The 7 th International Conference on Security for Information Technology and Communications (SECITC'14)

Size: px
Start display at page:

Download "SCHEDULE. The 7 th International Conference on Security for Information Technology and Communications (SECITC'14)"

Transcription

1 SCHEDULE of The 7 th International Conference on Security for Information Technology and Communications (SECITC'14) Powered by Informatics Security / IT&C Security Master Bucharest University of Economic Studies Information Technology Security Master Military Technical Academy Conference Partners Advanced Technologies Institute Media Partner

2 SECITC 2014 SCHEDULE Day 1 12 th June 2014 On Site Registration Date: 12 th June 2014, hour AM, room Alba Iulia, National Military Palace Opening Meeting Date room Alba Iulia, National Military Palace: 12 th June 2014, hour AM, room Alba Iulia, National Military Palace Affiliation AM FOREWARD Representatives from Bucharest University of Economic Studies Military Technical Academy Representatives Department of Economic Informatics and Cybernetics Department of Computer Science and Military Information Systems ISM IT&C Security Master Program InfoSec Security of Information Technology Master Program ITA Advanced Technologies Institute CERT-RO, CYBERINT, CERTMIL AM Prof. Victor Valeriu PATRICIU, Ph.D. Cyber-security versus Cyber-warfare Military Technical Academy AM Adrian FLOREA Practical aspects on cloud information certsign security AM Bogdan CIORTOLOMAN Trusted liaison between Romanian ORNISS authorities and NATO and EU structures on information security issues AM Dan TOFAN Current state of cybersecurity within Romania CERT-RO AM Mihaela VASILIU ISACA Academic Opportunities ISACA Coffee Break

3 SECTION 1 Cryptographic Algorithms and Protocols room Alba Iulia Chairman: Prof. Victor-Valeriu PATRICIU, PhD Marius Daniel DAVID, Monica BORDA Comparison of the most common fusion techniques used in a multimodal biometric system with a biometric cryptosystem George TEȘELEANU A Monte Carlo Method for Factorization Using Rainbow Techniques Raluca DAVID, Monica BORDA TLS Protocol: Improvement using One-Time-Pad function Marius-Alexandru VELCIU, Victor-Valeriu PATRICIU Using Shared Vault constructions for bio-cryptographic algorithms Diana-Stefania MAIMUT, Randomness and Primary Testing on Embedded Devices Andrei MARGHESCU, Mariana SAFTA Iuliana PAUN An ECDSA Implementation for Smart Card Devices Bogdan-Cosmin CHIFOR, Wireless sensor network security Victor Valeriu PATRICIU Marius-Viorel GRIGORAS, Luciana MOROGAN Password Cracking using P Systems with Active Membranes Kerem KAŞKALOĞLU Near Zero Bitcoin Transaction Fees Cannot Last Forever Diana-Stefania MAIMUT, Andrei MARGHESCU, Emil SIMION Steganographic Techniques Relying on Secure Cryptosystems Alecsandru PĂTRAȘCU, Emil SIMION Kernel Based Supervised Learning Systems for Critical Infrastructures Cyber Protection Coffee Break SECTION 2 Security Technologies for IT&C room Alba Iulia Chairman: Prof. Ion BICA, Ph.D Nicolae ROSIA Linux framework for general operations offloading on FPGA-CPU hybrid architectures Petru-Radu NARITA Securing SharePoint Server with Windows Azure Multi- Factor Authentication Alexandra-Emanuela Biometric Security - Fingerprint Recognition System VACARUS Sorin POPA Secure Applications Integration with Apache Camel Alexandru-Costin AVRAM Smart Waste Management using Internet of Things Architecture Ioan BUBU Banking Software Applications Security Alexandru Valentin BESCIU Implementing Security in a Vulnerable CRM George STANESCU Risk Assessment Model for Mobile Malware

4 Day 2 13 th June th June 2014, hour AM, room Alba Iulia, National Military Palace Affiliation AM Prof. David NACACCHE, Ph.D AM Andrzej KLESNICKI AM Mihaela VASILIU Products of small primes in formal arithmetic, information theory and cryptology Continuous Monitoring why not only government need it? Cloud Challenges Coffee Break SECTION 2 Security Technologies for IT&C room Alba Iulia Chairman: Assoc. Prof. Catalin BOJA, Ph.D. Universite Paris II PRES Sorbonne Universites, France Qualys, Poland ISACA, Romania Andreja SAMČOVIĆ, Marija MILOVANOVIĆ Application of Spread Spectrum Techniques in Image Watermarking by Using Wavelets Răzvan TOADER PayPal Transactions Security Andreea Magdalena DAE Multipurpose Platform for Electronic Currency System Felician ALECU, Paul POCATILU, Sergiu CAPISIZU Interception of GSM Calls by Turning off the GSM Encryption Cristian TOMA, Marius POPA, Cristian CIUREA, Claudiu Secure Issues in IoT Internet of Things Architecture for Sensors Data Processing VINTE OCTAVIAN MACHIDON Enhancing Cloud Computing security with reconfigurable System-on-Chip architectures Andrei-Sorin JERCA Ethical Hacking Exercises Exploiting OpenSSL Bogdan BEDA Single Page Web Applications Security Roxana TURCU Security in Electronic Payment Systems Coffee Break SECTION 3, 4 & 5 Information Security Management, Cyber Defense & Digital Forensic room Alba Iulia Chairman: Assoc. Prof. Emil SIMION, PhD Mihai DOINEA, Catalin Behavioral Security in Mobile Software BOJA, Bogdan IANCU Mihai-Gabriel IONIȚĂ Autoimmune Cyber Retaliation Based on Collaborative Defense Techniques Alexandru GROSU Software Tools for Source Code Analysis Georgiana MATEESCU, Marius VLĂDESCU, Valentin SGÂRCIU Holistic Approach to Evaluate The Cloud Adoption

5 16.00 Marius VLĂDESCU, Event Correlation for Enterprise Internal Security Georgiana MATEESCU, Valentin SGÂRCIU Alecsandru PĂTRAȘCU Anomaly Detection in Datacenters for Cloud Computing Digital Forensics Cosmin BUBULAN Digital Forensics Capabilities in an Open Source Framework SECITC 2014 Ending Session

STAGES FOR THE DEVELOPMENT OF THE AUDIT PROCESSES OF DISTRIBUTED INFORMATICS SYSTEMS 1

STAGES FOR THE DEVELOPMENT OF THE AUDIT PROCESSES OF DISTRIBUTED INFORMATICS SYSTEMS 1 STAGES FOR THE DEVELOPMENT OF THE AUDIT PROCESSES OF DISTRIBUTED INFORMATICS SYSTEMS 1 Marius POPA 2 PhD, University Lecturer, Department of Computer Science in Economics, University of Economics, Bucharest,

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

RAISA Romanian Association for Information Security Assurance PURPOSE OBJECTIVES

RAISA Romanian Association for Information Security Assurance PURPOSE OBJECTIVES RAISA Romanian Association for Information Security Assurance is a professional, non-governmental, non-partisan political, nonprofit and public benefit association. PURPOSE The aim of Romanian Association

More information

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074 Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections.

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS

SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS Paul POCATILU 2 PhD, Economic Informatics Department, University of Economics, Bucharest, Romania E-mail: ppaul@ase.ro Cristian CIUREA 3 PhD Candidate,

More information

09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to

09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to DAY 1 09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to Romania - Ovidiu Sitterli, Prefect of Sibiu - Constantin

More information

Solution for Non-Repudiation in GSM WAP Applications

Solution for Non-Repudiation in GSM WAP Applications Solution for Non-Repudiation in GSM WAP Applications CRISTIAN TOMA, MARIUS POPA, CATALIN BOJA Economic Informatics Department Academy of Economic Studies Romana Square No. 6, Bucharest ROMANIA cristian.toma@ie.ase.ro

More information

Cyber Security @ DTU. Lars Ramkilde Knudsen

Cyber Security @ DTU. Lars Ramkilde Knudsen Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About

More information

Secure Architecture for the Digital Rights Management of the M-Content

Secure Architecture for the Digital Rights Management of the M-Content Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 196 Secure Architecture for the Digital Rights Management of the M-Content ION IVAN,

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Special Issue 2013, pp. 373 377 MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES Adrian FLOAREA

More information

HOTEL RAMADA, 25-26.09.2013

HOTEL RAMADA, 25-26.09.2013 HOTEL RAMADA, 25-26.09.2013 25.09.2013, 09:00-13:00 Pre-congress workshop "THE BASICS OF IT SECURITY" Neutral and open initiations for Individuals and SME's 25.09.2013, 14:00 Congress Official Opening

More information

SACI 2004 will take place on May 25-26, 2004, at Politehnica University of Timisoara.

SACI 2004 will take place on May 25-26, 2004, at Politehnica University of Timisoara. GENERAL INFORMATION Date and Place SACI 2004 will take place on May 25-26, 2004, at Politehnica University of Timisoara. Official Language The official language of the conference is English. All presentations,

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

Statement of Purpose The JOURNAL OF INFORMATION SYSTEMS & OPERATION MANAGEMENT (ISSN 1843-4711), published two times annually by the Romanian

Statement of Purpose The JOURNAL OF INFORMATION SYSTEMS & OPERATION MANAGEMENT (ISSN 1843-4711), published two times annually by the Romanian Statement of Purpose The JOURNAL OF INFORMATION SYSTEMS & OPERATION MANAGEMENT (ISSN 1843-4711), published two times annually by the Romanian American University, is the specialized in IT domains. The

More information

Logging for Cloud Computing Forensic Systems

Logging for Cloud Computing Forensic Systems INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 10(2):222-229, April, 2015. Logging for Cloud Computing Forensic Systems A. Pătraşcu, V.V. Patriciu Alecsandru Pătraşcu* 1. Military

More information

SACI 2014. 9 th IEEE International Symposium on Applied Computational Intelligence and Informatics. Timişoara, Romania May 15-17, 2014

SACI 2014. 9 th IEEE International Symposium on Applied Computational Intelligence and Informatics. Timişoara, Romania May 15-17, 2014 SACI 2014 9 th IEEE International Symposium on Applied Computational Intelligence and Informatics Timişoara, Romania May 15-17, 2014 IEEE Networking the World FINAL PROGRAM SACI 2014 TECHNICAL PROGRAM

More information

Cloud Search Based Applications for Big Data - Challenges and Methodologies for Acceleration

Cloud Search Based Applications for Big Data - Challenges and Methodologies for Acceleration Cloud Search Based Applications for Big Data - Challenges and Methodologies for Acceleration George Suciu, Ana Maria Sticlan, Cristina Butca, Alexandru Vulpe, Alexandru Stancu and Simona Halunga R&D Department,

More information

Analysis of Zero-Day Vulnerabilities in Java

Analysis of Zero-Day Vulnerabilities in Java www.jmeds.eu Analysis of Zero-Day Vulnerabilities in Java MARIUS POPA Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies Piata Romana 6, Bucharest ROMANIA marius.popa@ase.ro

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE

KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE MASTER OF SCIENCE IN SECURITY AND INFORMATION ASSURANCE Graduate Program

More information

Network Security Essentials:

Network Security Essentials: Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

CYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania

CYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania CYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania ORGANISED BY: Sponsors & Exhibitors Speakers Include: Bebe-Viorel Ionica, Secretary of State, Ministry of Information Communication

More information

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent

More information

Scientific Committee:

Scientific Committee: Organizer YRC YOUNG RESEARCHERS CONFERENCE TECHNICAL UNIVERSITY OF CIVIL ENGINEERING OF BUCHAREST The 5 th Edition, November 19-20, 2014 Partners DMCDI Department of research, development and innovation

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

FACULTY OF AUTOMATION AND COMPUTERS

FACULTY OF AUTOMATION AND COMPUTERS "POLITEHNICA" UNIVERSITY OF TIMISOARA FACULTY OF AUTOMATION AND COMPUTERS ANNUAL REPORT 2006 Timisoara, 2007 "POLITEHNICA" UNIVERSITY OF TIMISOARA FACULTY OF AUTOMATION AND COMPUTERS ANNUAL REPORT 2006

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Secure Internet of Things Project (SITP)

Secure Internet of Things Project (SITP) Secure Internet of Things Project (SITP) Philip Levis Stanford University Project Workshop Stanford University August 11, 2014 1 The Internet of Things (IoT) 2 A Security Disaster HP conducted a security

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Build Your Own Security Lab

Build Your Own Security Lab Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers

More information

Human Factors in Information Security

Human Factors in Information Security University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000

More information

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file 1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer

More information

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Internet of Things and Embedded Software Security. www.telegrid.com

Internet of Things and Embedded Software Security. www.telegrid.com Internet of Things and Embedded Software Security About Us TELEGRID designs, develops and produces hardware tools that allow the Department of Defense to make use of Commercial-Off-The-Shelf (COTS) products

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

True Identity solution

True Identity solution Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright

More information

Emerging Markets Queries in Finance and Business

Emerging Markets Queries in Finance and Business Program of the International Conference Emerging Markets Queries in Finance and Business EMQFB 2013 Tîrgu-Mureș, 24-27 October 2013 Honorary Chair Acad. Gheorghe ZAMAN, București, Romania EMQFB 2013 SCIENTIFIC

More information

Penetration Testing - a way for improving our cyber security

Penetration Testing - a way for improving our cyber security OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH adif2k8@gmail.com Copyright The OWASP

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

Education in Biomedical Engineering in the Republic of Moldova Victor Sontea, Serghei Railean

Education in Biomedical Engineering in the Republic of Moldova Victor Sontea, Serghei Railean Technical University of Moldova Faculty Computers, Informatics and Microelectronics Department Microelectronics and Biomedical Engineering Education in Biomedical Engineering in the Republic of Moldova

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

National Cyber League (NCL) Syllabus

National Cyber League (NCL) Syllabus Note to Faculty The NCL Syllabus is intended as a supplement to a CompTIA Security+ class, or related Network Security course. A primary goal of the NCL is to integrate exercises and competitions into

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

DINWC2014 and DIGITALSEC2014 Schedule Activity. 9:40 am 10:00 am. 8:40 am 9:40 am. 9.00 am 2:00 pm

DINWC2014 and DIGITALSEC2014 Schedule Activity. 9:40 am 10:00 am. 8:40 am 9:40 am. 9.00 am 2:00 pm CONFERENCE PROGRAM The International Conference on Digital Information, Networking, and Wireless Communications (DINWC2014) And The International Conference on Digital Security and Forensics (DigitalSec2014)

More information

THE EUROPEAN FORUM QUALITY SOCIAL SERVICES IN EVERY COMMUNITY CHALLENGES AND OPPORTUNITIES

THE EUROPEAN FORUM QUALITY SOCIAL SERVICES IN EVERY COMMUNITY CHALLENGES AND OPPORTUNITIES THE EUROPEAN FORUM QUALITY SOCIAL SERVICES IN EVERY COMMUNITY CHALLENGES AND OPPORTUNITIES Simona Maria Stănescu [1] During 6-7 June 2012, more than 250 social work professionals from Romania and abroad

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer

More information

Strong Authentication for Future Web Applications

Strong Authentication for Future Web Applications Strong Authentication for Future Web Applications Chris Williams Leidos, Inc. July 18, 2014 For W3C Identity in the Browser Workshop Abstract Leidos (formerly SAIC), has been using strong authentication

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Designing and Coding Secure Systems

Designing and Coding Secure Systems Designing and Coding Secure Systems Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class covers secure coding and some design issues from a language neutral approach you can

More information

2016 TÜBİTAK BİLGEM Cyber Security Institute

2016 TÜBİTAK BİLGEM Cyber Security Institute 2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack

More information

AB 1149 Compliance: Data Security Best Practices

AB 1149 Compliance: Data Security Best Practices AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California

More information

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:

More information

Strengths and Weaknesses of Cybersecurity Standards

Strengths and Weaknesses of Cybersecurity Standards Strengths and Weaknesses of Cybersecurity Standards Bart Preneel COSIC KU Leuven and iminds, Belgium firstname.lastname@esat.kuleuven.be April 7, 2014 Bart Preneel 1 What is cybersecurity? Liddell and

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

INFORMATION SECURITY TRAINING CATALOG (2016)

INFORMATION SECURITY TRAINING CATALOG (2016) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2016) Revision 4.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Summary. I. V. Arzamartsev, G. I. Borzunov A Method of Analysis of Multithreaded Applications Based on Symbolic Execution

Summary. I. V. Arzamartsev, G. I. Borzunov A Method of Analysis of Multithreaded Applications Based on Symbolic Execution I. V. Arzamartsev, G. I. Borzunov A Method of Analysis of Multithreaded Applications Based on Symbolic Execution Keywords: symbolic execution, parallel data flow, condition race This article is devoted

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Curriculum Currency Report for Fall 2015 Computer Networking and Information Technology. Courses

Curriculum Currency Report for Fall 2015 Computer Networking and Information Technology. Courses Curriculum Currency Report for Fall 2015 Computer Networking and Information Technology Review Year 2014 2015 Department Computer Networking & Information Technology s The following active courses in the

More information

Guide for Designing Cyber Security Exercises

Guide for Designing Cyber Security Exercises Guide for Designing Cyber Security Exercises VICTOR-VALERIU PATRICIU Computer Science Department Military Technical Academy Bucharest, Bd. George Cosbuc, no. 81-83 ROMANIA victorpatriciu@yahoo.com ADRIAN

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

Programming for Security*

Programming for Security* Programming for Security* M. E. Kabay, PhD, CISSP Assoc. Prof. Information Assurance Program Director, MSIA Division of Business and Management, Norwich University Gregory E. Borter, Systems Coordinator

More information

Cyber Exercises, Small and Large

Cyber Exercises, Small and Large First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

ATTORNEY LIST revised January 2009

ATTORNEY LIST revised January 2009 ATTORNEY LIST revised January 2009 American Consulate Bucharest, Romania This is a list of Romanian Attorneys who speak English and have expressed an interest in assisting U.S. citizens. The U.S. Embassy

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

Internet Banking Two-Factor Authentication using Smartphones

Internet Banking Two-Factor Authentication using Smartphones Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

SECURITY MANAGEMENT IN A MULTIMEDIA SYSTEM

SECURITY MANAGEMENT IN A MULTIMEDIA SYSTEM SECURITY MANAGEMENT IN A MULTIMEDIA SYSTEM Emanuil REDNIC PhD candidate, Economic Informatics Department University of Economics, Bucharest, Romania E-mail: emanuil.rednic@gmail.com Andrei TOMA 1 PhD candidate,

More information

Research on Situation and Key Issues of Smart Mobile Terminal Security

Research on Situation and Key Issues of Smart Mobile Terminal Security Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach

Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach Informatica Economică vol. 18, no. 4/2014 101 Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach Mihai DOINEA 1, 2, Paul POCATILU 1 1 Department

More information

POLICIES TO MITIGATE CYBER RISK

POLICIES TO MITIGATE CYBER RISK POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information