Faculty Development Program On Cyber Warfare Technologies, Tactics Tools For Network SecurityDate:29-07-2017
Prof. Sindhu A.R & Prof. Bhagya S.G from Department of Information science and Engineering attended 5 days FDP on “CYBER WARFARE TECHNOLOGIES, TACTICS TOOLS FOR NETWORK SECURITY” from 24th July to 28th July 2017 in GSSS Institute of Engineering & Technology, Mysuru.
Day 1: Followed by the inauguration the resource persons brief about basic concepts of cyber security like Deep Web & Dark Web, Mobile Device Security, Strengths of Passwords, Cyber crime and Cyber terrorism & also how to secure Personal & sensitive information. The inaugural function concluded by honoring the Chief Guest Dr. Subraya B M, Special Guest Dr. Narayan Murthy, Guest of Honor Ms. Anusha G. Finally, the vote of thanks was rendered by thanking all the dignitaries, delegates, sponsorers, representatives from the media and the faculty for their magnanimous support for making the inaugural function a grand success.
Day 2: Session began with Introduction of Cryptography, Symmetric key Cryptography, Asymmetric key Cryptography, Message Authentication and Hash functions. The participants were familiarized with techniques for securing Sensitive information through Digital Signatures and Public Key infrastructure, Cryptography in military communications, electronic commerce, ATM cards, and computer passwords. The session also had discussion about Securing the Management, Control, Data plane, Access Control using VLANs and IP Header .Real Time Hacking was demonstrated by using TCP/IP applications, later briefed about different Routing Protocols & Techniques. He also explained networking protocols and their hierarchical relationship hardware and software.
Day 3: Industrial visit to GLOBAL CYBER SECURITY RESPONSE TEAM PRIVATE LIMITED, Jayanagar, Bengaluru was organized for participants. The visit was intended to expose the participants to the practical and industry perspective of Cyber technology. The session had Mrs Shubha , CEO, GCSRT providing overview of data security and domains in cyber security. The session has participants made aware of wireless penetration testing, data storage in cloud and IOT Hacking and security. The session was followed by Mr Harshanth, Senior Trainer, GCSRT, Bengaluru, providing participants insights on malware security and hacking. He explained the real time chances of hacking information when connected through wireless network. The visit concluded by an interactive session with Mrs Soumya with participants exchanging views on the aspects of the spread of cyber tools that pose the greatest threats.
Day 4: The session began with Mr. Pradeep, Network Consultant, giving overview of Management Plane, Man in a Middle Attack and Routing Protocol Authentication. He demonstrated Remote Access using Telnet & SSH,Capturing the live Network traffic using Wire shark & Analyzing the traffic. The participants were given instructions about Configuring ACL on Routers for IPv4 Network. Information about Time Bases ACL Network Address Translation, Layer 2 Protocol Authentication were also provided. He clarified about future direction of work with regards to Wireless Device Security, OS Security Vulnerabilities, updates and patches, OS integrity checks, Anti-virus software and Web Security. The session concluded by a discussion with participants which highlighted security aspects of the future implementations of the learned concepts.
Day 5: The session began with over view of IPv6, IPv4 to IPv6 Transition, Securing IPv6 Network, GRE Tunneling, VPN, Site-to-site IPSec Tunnel. The session emphasized on various topics of Network Services, DHCP Snooping, DHCP Starvation attack, Other Layer 2 security techniques, Port Security, BPDU guard, Root guard and NTP, Logging. Mr Pradeep G, gave insights on Software Firewall vs Hardware Appliance based Firewall, Zone Based Firewalls, IDS & IPS ,Device Password Recovery ,Business Continuity & Disaster Recovery.
The session concluded with participants sharing ideas on how to better characterize cyber security threats, evaluate system performance when attacked by a cyber security threat, and assess risk of using the system in the presence of a cyber security threat.