logo

A National Level Five-Day Faculty Development Program on

Cyber Security

Sponsered

by

AICTE Training and Learning (ATAL) Academy

Organized By

Department of Computer Science & Engineering

logo

Jawaharlal Nehru Technological University Anantapur
College of Engineering (Autonomous) Ananthapuramu-515002(A.P.)INDIA

From 16th December to 20th December 2019

logo
Important Dates Registration Resource Persons Venue Accommodation Brochure Contact



About Workshop

Cyber security has become a well-known term in recent years. With most people spending a large part of their day online, communicating through media such as email and social media and conducting their banking and shopping online, its not surprising that risks come with the digitalisation of all your data. But what exactly is cyber security? What constitutes a cyber-attack? Who are the cyber criminals? And who is at risk?


Cyber security is essentially a new term for information security; the protection of vital information. Information security has, however, been around for decades prompting many to ask what is new about cyber security? In todays age, cyber security refers to more than simply protecting information. There is now an industrial scale of cyber espionnage. The only thing that is new about cyber security is that there is more information moving around faster in cyber space that there ever was when it could only be paper based, but it is still all about preventing people from accessing information they have no right to and using it for nefarious purposes.

Think of it in terms of moving from handwriting to typewriter to telegraph to telephone, telefaxes and recording devices and now to cyber space. It is the volume and complexity that has increased, not the basic concept of information protection and espionnage for industrial and military purposes. But with the increased volume, there is also the possibility of causing more harm to more people. Cyber space has been militarised. There is a large rise in hacktivism (the use of computer hacking for political activism), with large swaths of cyber-crime and a dependence on the internet with the proliferation of devices.

Objectives

* To understand key terms and concepts in cyber security
* To understand detection and security techniques
* To understand cryptography and its applications
* To build security policies
* To be familiar with DoS and DDoS attacks

Who Can attend?

The following people from AICTE Approved Institution can attend the FDP. * Faculty members who taught cyber security and information security related subjects
* Ph.D Scholars who are working on security
* PG Scholars

Sponsored by AICTE Training and Learning Academy

IEEE Hyderabad Section Logo

Co Ordinator:


Prof. P. Chenna Reddy
Department of CSE
JNTUA CEA

copyrights©JNTUA CEA