Tag Archives: infrastructure protection

[ISN] Last CFP: ICCICS2014 : Cyber-Crime Investigation and Cyber Security

The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) November 17-19, 2014 Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia http://sdiwc.net/conferences/2014/iccics2014/ iccics2014@sdiwc.net All registered papers will be included in the publisher’s Digital Library. ============================================================== The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. RESEARCH TOPICS ARE NOT LIMITED TO: – Business Applications of Digital Forensics – Cyber Crime Investigations – Cyber Culture & Cyber Terrorism – Digital Forensic Processes and Workflow Models – Digital Forensics Process & Procedures – Digital Forensics Techniques and Tools – Embedded Device Forensics – Incident Response – Legal, Ethical and Policy Issues Related to Digital Forensics – Mobile / Handheld Device & Multimedia Forensics – Network and Cloud Forensics – Sexual Abuse of Children On Internet – Theoretical Foundations of Digital Forensics – Civil Litigation Support – Cyber Criminal Psychology and Profiling – Digital Forensic Case Studies – Digital Forensics & Law – Digital Forensics Standardization & Accreditation – E-Discovery – Hacking – Information Warfare & Critical Infrastructure Protection – Malware & Botnets – Money Laundering – Online Fraud – Software & Media Piracy – Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: International Journal of New Computer Architectures and their Applications (IJNCAA) International Journal of Digital Information and Wireless Communications (IJDIWC) International Journal of Cyber-Security and Digital Forensics (IJCSDF) International Journal of Digital Crime and Forensics (IJDCF) International Journal of Information and Computer Security (IJICS) PAPER SUBMISSION GUIDELINES: – Researchers are encouraged to submit their work electronically. Full paper must be submitted (Abstracts are not acceptable). – Submitted paper should not exceed 15 pages, including illustrations. All papers must be without page numbers. – Papers should be submitted electronically as pdf format without author(s) name. – Paper submission link: http://sdiwc.net/conferences/2014/iccics2014/openconf/openconf.php IMPORTANT DATES: Submission Deadline: Submission is extended until Oct. 30, 2014 Notification of Acceptance: Nov. 3, 2014 or 4 weeks from the submission date Camera Ready Submission: Nov. 7, 2014 Registration: Nov. 10, 2014 Conference Dates: November 17-19, 2014




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Deadline Approaching: InfoSec2014 – Information Security and Cyber Forensics – Malaysia

Forwarded from: jackie (at) sdiwc.info Universiti Sultan Zainal Abidin (UniSZA), Kuala Terengganu, Malaysia October 8-10, 2014 | infosec (at) sdiwc.net http://sdiwc.net/conferences/2014/infosec2014/ All registered papers will be included in the publisher’s Digital Library. ================================================================ The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. TOPICS ARE NOT LIMITED TO: :: Cyber Security :: Distributed and Pervasive Systems Security :: Formal Methods Application in Security :: Incident Handling and Penetration Testing :: Multimedia and Document Security :: Privacy issues :: Secure Software Development, Architecture and Outsourcing :: Security in Cloud Computing :: Security of Web-based Applications and Services :: VOIP, Wireless and Telecommunications Network Security :: Enterprise Systems Security :: Hardware-Based security :: Legal Issues :: Operating Systems and Database Security :: SCADA and Embedded systems security :: Security for Future Networks :: Security in Social Networks :: Security protocols :: Digital Forensic :: Anti-Forensics and Anti-Anti-Forensics Techniques :: Data leakage, Data protection and Database forensics :: Executable Content and Content Filtering :: Forensics of Virtual and Cloud Environments :: Investigation of Insider Attacks :: Malware forensics and Anti-Malware techniques :: New threats and Non-Traditional approaches :: Cyber-Crimes :: Evidentiary Aspects of Digital Forensics :: File System and Memory Analysis Multimedia Forensic :: Information Hiding :: Large-Scale Investigations :: Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics :: Information Assurance and Security Management :: Business Continuity & Disaster Recovery Planning :: Critical Infrastructure Protection :: Digital Rights Management and Intellectual Property Protection :: Fraud Management :: Laws and Regulations :: Threats, Vulnerabilities, and Risk Management :: Corporate Governance :: Decidability and Complexity :: Economics of Security :: Identity Management :: Security Policies and Trust Management :: Cyber Peacefare and Physical Security :: Authentication and Access Control Systems :: Biometrics standards and standardization :: Electronic Passports, National ID and Smart Card Security :: Social engineering :: Template Protection and Liveliness detection :: Biometrics Applications :: Cyber Peacefare Trends and Approaches :: New theories and algorithms in biometrics :: Surveillance Systems Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. PAPER SUBMISSION: http://sdiwc.net/conferences/2014/infosec2014/openconf/openconf.php IMPORTANT DATES: Submission Deadline: September 26, 2014 Notification of Acceptance: 2-4 weeks from the submission date Camera Ready Submission: October 2, 2014 Registration Deadline: October 2, 2014 Conference Dates: October 8-10, 2014 CONTACT: Jackie Blanco | infosec (at) sdiwc.net SDIWC Organization | www.sdiwc.net


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] CFP: ICCICS2014 Malaysia – The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014)

Forwarded from: Hazel Ann November 17-19, 2014 Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia http://sdiwc.net/conferences/2014/iccics2014/ All registered papers will be included in the publisher’s Digital Library. ============================================================== The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. RESEARCH TOPICS ARE NOT LIMITED TO: – Business Applications of Digital Forensics – Cyber Crime Investigations – Cyber Culture & Cyber Terrorism – Digital Forensic Processes and Workflow Models – Digital Forensics Process & Procedures – Digital Forensics Techniques and Tools – Embedded Device Forensics – Incident Response – Legal, Ethical and Policy Issues Related to Digital Forensics – Mobile / Handheld Device & Multimedia Forensics – Network and Cloud Forensics – Sexual Abuse of Children On Internet – Theoretical Foundations of Digital Forensics – Civil Litigation Support – Cyber Criminal Psychology and Profiling – Digital Forensic Case Studies – Digital Forensics & Law – Digital Forensics Standardization & Accreditation – E-Discovery – Hacking – Information Warfare & Critical Infrastructure Protection – Malware & Botnets – Money Laundering – Online Fraud – Software & Media Piracy – Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. PAPER SUBMISSION GUIDELINES: – Researchers are encouraged to submit their work electronically. Full paper must be submitted (Abstracts are not acceptable). – Submitted paper should not exceed 15 pages, including illustrations. All papers must be without page numbers. – Papers should be submitted electronically as pdf format without author(s) name. – Paper submission link: http://sdiwc.net/conferences/2014/iccics2014/openconf/openconf.php IMPORTANT DATES: Submission Deadline: Oct. 17, 2014 Notification of Acceptance: Nov. 3, 2014 or 4 weeks from the submission date Camera Ready Submission: Nov. 7, 2014 Registration: Nov. 10, 2014 Conference Dates: November 17-19, 2014


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Deadline Approaching: INFOSEC2014 – Malaysia

Forwarded from: “Jackie Blanco” The International Conference on Information Security and Cyber Forensics (InfoSec2014) Universiti Sultan Zainal Abidin (UniSZA), Kuala Terengganu, Malaysia October 8-10, 2014 | infosec (at) sdiwc.net http://sdiwc.net/conferences/2014/infosec2014/ All registered papers will be included in SDIWC Digital Library. ================================================================ The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. TOPICS ARE NOT LIMITED TO: :: Cyber Security :: Distributed and Pervasive Systems Security :: Formal Methods Application in Security :: Incident Handling and Penetration Testing :: Multimedia and Document Security :: Privacy issues :: Secure Software Development, Architecture and Outsourcing :: Security in Cloud Computing :: Security of Web-based Applications and Services :: VOIP, Wireless and Telecommunications Network Security :: Enterprise Systems Security :: Hardware-Based security :: Legal Issues :: Operating Systems and Database Security :: SCADA and Embedded systems security :: Security for Future Networks :: Security in Social Networks :: Security protocols :: Digital Forensic :: Anti-Forensics and Anti-Anti-Forensics Techniques :: Data leakage, Data protection and Database forensics :: Executable Content and Content Filtering :: Forensics of Virtual and Cloud Environments :: Investigation of Insider Attacks :: Malware forensics and Anti-Malware techniques :: New threats and Non-Traditional approaches :: Cyber-Crimes :: Evidentiary Aspects of Digital Forensics :: File System and Memory Analysis Multimedia Forensic :: Information Hiding :: Large-Scale Investigations :: Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics :: Information Assurance and Security Management :: Business Continuity & Disaster Recovery Planning :: Critical Infrastructure Protection :: Digital Rights Management and Intellectual Property Protection :: Fraud Management :: Laws and Regulations :: Threats, Vulnerabilities, and Risk Management :: Corporate Governance :: Decidability and Complexity :: Economics of Security :: Identity Management :: Security Policies and Trust Management :: Cyber Peacefare and Physical Security :: Authentication and Access Control Systems :: Biometrics standards and standardization :: Electronic Passports, National ID and Smart Card Security :: Social engineering :: Template Protection and Liveliness detection :: Biometrics Applications :: Cyber Peacefare Trends and Approaches :: New theories and algorithms in biometrics :: Surveillance Systems Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. PAPER SUBMISSION: http://sdiwc.net/conferences/2014/infosec2014/openconf/openconf.php IMPORTANT DATES: Submission Deadline: September 26, 2014 Notification of Acceptance: 2-4 weeks from the submission date Camera Ready Submission: October 2, 2014 Registration Deadline: October 2, 2014 Conference Dates: October 8-10, 2014 CONTACT: Jackie Blanco | infosec (at) sdiwc.net SDIWC Organization | www.sdiwc.net


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Ground Zero Summit 2014, New Delhi India | Call For Paper Open

Forwarded from: GroundZero Summit CFP Ground Zero Summit 2014 13 – 16 November 2014, New Delhi, India Ground Zero Summit (G0S) 2014 in its second year promises to be Asia’s largest Information Security gathering and proposes to be the ultimate platform for showcasing researches and sharing knowledge in the field of cyber security. G0S rationale: The increasing volume and complexity of cyber threats – including phishing scams, data theft, and online vulnerabilities, demand that we remain vigilant about securing our systems and information. Enterprises and governments worldwide are grappling the grim reality of data and critical systems being exploited. This summits aims at addressing these new forms of cyber attack and formulate solutions. Web URL : http://g0s.org/ Tracks and relevant submissions G0S is a triple track conference and papers have to be submitted under the following tracks. Systems Track (OS/Systems/Application/Hardware) * OS exploitation * Application hacking * Rootkits and Malware * Forensics and Anti-forensics * SCADA security and exploitation * Telecom equipment security and exploitation * Embedded device/hardware security and exploitation * Malware on the mobile platform – Android, Windows OS, Symbian * Mobile Application Security. * Bitcoin Forensics * Banking Security * Communications Track (Communication and Networks) * Protocol exploitation and security * Satellite Technology / Security * Aviation Security * Botnet communication, C&C and takedowns * Web hacking * Radio communication hacking * GSM/3G/LTE/5G networks – security and exploitation * Satellite communication hacking * Network security * Intrusion prevention (and evasion) techniques * APT prevention (and evasion) techniques * Replacing network Security with “Intelligent, self automated Networks” * Growth of Mobile Data Networks with repercussions for the same * Strategy Track (Gov/GRC/Cyber warfare/CII) * GRC * Privacy * Social media in context of security and Privacy * Surveillance * Auditing * New age Cyber warfare/Cyber intelligence/Cyber terrorism/Cyber crimes * Upcoming information security trends * Critical infrastructure Protection * Cyber security in context of the Govt * Global Cyber Diplomacy * IT Act 2008 in light of Prism Surveillance * Security VS privacy * Evolving role of CERT to protect country’s citizens against external and internal intrusions * Repercussions of PRISM surveillance leak on Social Media E-mail for submission: “cfp (at) g0s.org” Speaker’s Privileges * G0S is providing all speakers with return air tickets (Economy). * For Indian speakers return air tickets will be provided for distance more than 300 kms, others will be provided First Class train tickets. * Accommodation in New Delhi for 3 nights (check out time as per hotel policy). * One speaker pass and one complementary Conference pass. * Invitation to Conference party. * An honorarium of USD 1000 is to be awarded for talks that are new, highly technical and have never been presented or published before (exclusive to G0S 2014) anywhere online or offline. * Please note that the selection of a paper for an honorarium is at the sole discretion of the Ground Zero Staff and their decision will be final based on the technical depth of the talk and whether it has been presented/published before. * The selected speakers will be notified about the same in our acceptance email. * In cases where there are more than one speakers for the same session. * Only one speaker may avail benefits and privileges under G0S policy. IIC membership will be provided to all speakers for 1 year initially.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research:Cool Vendors in Security Infrastructure Protection, 2014

.. products and services — including those from Gartner’s Cool Vendors — to address security requirements. Recognize that these offerings … to help secure known infrastructure problem areas. Gartner Cool Vendors are using the cloud to help secure browsers and monitor inside SaaS traffic. One Cool Vendor has physically positioned itself in close proximity to …

Gartner customers can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] U.S. to help India face new security challenges

http://www.thehindu.com/news/national/us-to-help-india-face-new-security-challenges/article5035558.ece By SANDEEP JOSHI The Hindu NEW DELHI August 18, 2013 Washington has agreed to throw open its specialised agencies for advanced training in a range of skills Three months after the U.S.-India Homeland Security Dialogue in Washington, India is all set to send its officers to various agencies across American federal organisations to sharpen their skills and acquire new ones to fight terrorism. Indian officials and security officers would soon be visiting the U.S. for training in an array of courses — from cyber security, megacity policing and forensics, to critical infrastructure protection, financial terrorism and anti-terrorism intelligence. The U.S. government has agreed to give Indian officers access to its specialised agencies under the Department of Homeland Security, particularly the Georgia-headquartered Federal Law Enforcement Training Centres (FLETC), to help them deal with the changing face of international terrorism. “The dialogue between Union Home Minister Sushilkumar Shinde and U.S. Secretary of Homeland Security Janet Napolitano in Washington in May this year paved the way for this cooperation… Through these specialised training programmes, India will gradually build an army of experts who can handle new technologies and mechanism to deal with various kinds of terrorism and anti-national activities,” a senior Home Ministry official told The Hindu. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] NTRO releases guidelines to protect against cyber attacks

http://articles.timesofindia.indiatimes.com/2013-07-20/india/40694913_1_cyber-attacks-ntro-guidelines By Rakhi Chakrabarty The Times of India July 20, 2013 NEW DELHI: Cyber attacks on ministries, including home, external affairs, power and telecom, could soon constitute cyber-terrorism and could be punished with life imprisonment. Tough new guidelines were released by national security advisor Shivshankar Menon on Friday by which these ministries with critical information networks could be declared protected systems as defined by the National Technical Research Organization (NTRO), the country’s elite technical intelligence agency. The guidelines have been drawn up by the NTRO’s National Critical Information Infrastructure Protection Centre to protect the country’s digitized information networks “in public and private sectors” from cyber attacks, said Muktesh Chander, part of the joint working group that framed the guidelines. Calling the guidelines topical and important, Menon said, “India’s cyberspace is under attack from not one or two but several countries.” Cyber space is the most open and democratic, so it is important to maintain its privacy and secure it as well, he added. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail