Tag Archive for: Workshop

Udupi: Workshop on ‘Cyber Security & Ethical Hacking’ held at SMVITM


Media Release

Udupi, Sep 19: The Department of Artificial Intelligence & Data Science, Artificial Intelligence & Machine Learning Engineering, Department of Computer Science Engineering, ISTE & IEEE student chapters of SMVITM, in association with the National Information and Cyber Security Council (NICC) organized a two days workshop on “Cyber Security and Ethical Hacking” on September 15 and 16 in the institute premises.

Prameel Arjun, CEO, Prikus Group & Head, Research and Operations, National Information and Cyber Security Council (NICC) was the chief guest. He inaugurated the programme by lighting the lamp. In his Inaugural address to the gathering, he urged that the students must be equipped with the knowledge and skills necessary to understand and protect against cyber threats, and to explore the ethical dimension of hacking. Also he said that practical skills were needed to secure digital assets and protect against cyber threats effectively.

Dr Thirumaleshwara Bhat, principal, in his presidential address, expressed his gratitude to the team from National Information and Cyber Security Council (NICC) for imparting such workshop for the benefit of students and urged the participants to gain maximum benefits.

Earlier, Nagaraja Rao, in-charge head, Department. of AI & DS and AI & ML Engineering welcomed the gathering and gave insights about the wokshop, importance of conducting such workshops for the benefit of the students.

Hithashree, 2nd year Data Science, invoked the blessings from the Almighty. Chandana of final year CSE, compered the programme. Dr Sowmya J Bhat, head, Department of CSE proposed a vote of thanks.

A total of 240 students participated in the workshop.

 

 

  

Source…

Cyber Incident Classification System in focus of OSCE workshop in Banja Luka


The OSCE Mission to Bosnia and Herzegovina supported a “National Cyber Incident Classification” workshop for South-East and Eastern Europe in Banja Luka on 22 and 23 September 2022. The workshop was organized by the OSCE’s Transnational Threats Department (TNTD), in co-operation with the Republika Srpska Ministry of Scientific and Technological Development and the Higher Education and Information Society.

The workshop gathered experts in the cyber/ICT security field from South-East and Eastern Europe, and included policymakers, security officials and ICT experts. Discussions aimed to raise awareness on the importance of national cyber incident classification and enable an exchange of good practices in national cyber incident classification systems across the OSCE area.

Ambassador Tadeusz Chomicki, responsible for Cyber and Tech Affairs at the Ministry of Foreign Affairs of Poland and representing the 2022 OSCE Chairmanship pointed out that “threats to critical infrastructure are often trans-border, therefore, developing and implementing national cybersecurity incident classification systems are an important element for international co-operation, to achieve comparable situational awareness and assessment of how serious the threat is and how many countries it may effect.”

Mr. Jiri Rous, Head of the OSCE Mission to Bosnia and Herzegovina’s Banja Luka Field Office recalled that “it is high time for BiH to operationalize the computer emergency response teams (CERTs) for BiH and FBiH institutions, and to initiate collaborative development of a cybersecurity framework strategy for BiH”.

“Cyber incidents are becoming more frequent and represent a growing threat to security and stability,” said Assistant Minister of Security of Bosnia and Herzegovina, Mladen Mrkaja.

“We at the Ministry of Security are working on certain systematic solutions, primarily on the establishment of a computer security incident response team for BiH institutions. The biggest challenge we face is the provision of adequate personnel trained to combat cyber incidents and infrastructure protection. For this reason, it is necessary to make additional efforts to build these capacities”, added…

Source…

Some Thoughts on the Recent DNS Operations, Analysis, and Research Centre Workshop, OARC-35


The DNS Operations, Analysis, and Research Centre (DNS-OARC) convened OARC-35 at the start of May. Here are some thoughts on a few presentations at that meeting that caught my attention.

TTL Snooping with the DNS

These days it seems that the term “the digital economy” is synonymous with “the surveillance economy.” Many providers of services on the Internet spend a lot of time and effort assembling profiles of their customers. These days, it’s not just data in terms of large-scale demographics but the assembling of large sets of individual profiles. We are all probably aware that we emit a steady stream of bits as a digital outflow when we use the Internet, and there is a major ongoing effort to sniff this digital effluent and derive profiles of individual activities from this data. If an entity operates a recursive resolver in the DNS or operates a popular web service, then it’s pretty clear how such user profiles can be assembled if that’s what they want to do. What is not so apparent is that almost anyone can sniff our digital outflow. All it takes is a little ingenuity.

The presentation on “Trufflehunter” at DNS OARC 35 is a good case in point of being able to perform such indirect snooping. The question posed here is to what extent is stalkerware being used. By its very nature, stalkerware is covert, as the intent is that the intended victim should be completely unaware that they have this app running on their device. So, is there a puff of tell-tail smoke that can reveal stalkerware in action? The key observation is that often these apps use the DNS as a command-and-control channel. After all, the DNS is ubiquitous, and the total query volumes are truly prodigious. What are a few more queries in such a torrent of DNS? The app is simply hiding itself in a densely packed crowd. You might get a signal of active stalkerware if you operated a DNS resolver, but if you aren’t the resolver operator, then you just can’t see the signal. Right?

Not true.

The critical piece of data that is used in this form of digital eavesdropping is the TTL (Time to Live) field in DNS responses. When a recursive resolver loads a response that was supplied by an authoritative server,…

Source…

Key Takeaways from Federal R&D Workshop Focused on 5G Testing and Use Cases for Drones and Smart Warehouses | Wiley Rein LLP


On April 27 and 28, 2021, the Networking & Information Technology Research-Development (NITRD), Advanced Wireless Test Platform (AWTP), and Federal Mobility Group (FMG) hosted a Workshop on the FMG’s Framework to Conduct 5G Testing (Framework), published last November. The purpose of the webinar was to “provide an overview of the process and the testing framework elements needed to conduct 5G testing for different use cases.” The workshop focused on two selected federal 5G use cases: unmanned aircraft systems (UAS or drones) and smart warehouses.

Below, we highlight several key takeaways from the workshop. 

First, the Framework aims to guide federal agencies in establishing 5G testing capabilities suited to their needs through either: (1) building or leasing a testbed from a carrier-grade equipment manufacturer; (2) using existing external labs and testbeds (e.g., a federal lab, university lab, or in coordination with DoD); or (3) through some combination of the two. 

Second, the National Science Foundation (NSF) is focused on how the Government is using both testbeds and data-driven research to support 5G use and innovation. NSF recently issued a Request For Information on dataset needs “to conduct research on computer and network systems,” with comments due by May 21.

Third, the FMG’s Mobile Security Working Group is focused on FISMA mobility metrics to drive key technologies like mobile threat defense, which aims to advance the overall security posture of the federal government on mobile platforms. 

Fourth, within NITRD and the AWTP there is a Wireless Spectrum R&D interagency working group (WSRD) that has been involved in the whole-of-government effort under the National Strategy to Secure 5G Implementation Plan’s Line of Effort 1.1, to assist with “[r]esearch, development, and testing to reach and maintain United States leadership in secure 5G and beyond.” WSRD’s work related to this Line of Effort remains ongoing.

5G Use Case: Drones

The workshop included several UAS use case panels, which discussed the use of cellular frequencies for drone operations and UAS Traffic Management (UTM) issues.

Christopher Nassif, from the Federal Aviation…

Source…