SlideShare a Scribd company logo
1 of 22
What Do You Think?
Security is a journey?
Or
A destination?
According to Microsoft Vice President Dave Thompson,
“Security is a journey, not a destination.”
“Study on Cyber Security:
Establishing a Sustainable Cyber Security
Framework for University Automation System”
Presentation on
Supervised By
M.M. Rakibul Hasan
Lecturer
Department of Computer Science and Engineering
Prepared By
Rihab Rahman
ID: SECRET
Program: BCSE
Kaisary Zaman
ID: SECRET
Program: BCSE
Table of Content
Introduction
Background of Study
Problem Statement
Rationale of Study
Research Objective
Research Methodology
Data analysis tools
Test and Evaluation
Plan of Work
Time Schedule
Cost Estimation
Limitation of research work
Future Works of the
Research
Conclusion
Bibliography
3
Introduction
 Cyberspace
 Security
 Cyber Security
 Security Framework
 University Automation Systems
4
Data Security - The process of protecting the data from
unauthorized users, preventing alterations and restricting the
access of sensitive information[1].
5
Background of Study
Background of Study
Some Security Frameworks
6
Problem Statement
Privileged information should be easy accessible
for the students, teachers and stuffs but in a
controlled manner with proper monitoring.
7
Rationale of Study
To let people know about the importance of cyber security
because in today’s technology-based world is a very vast
thing.
To cope up with this situation we should read this paper
titled as “Study on Cyber Security: Establishing a Cyber
Security Framework for University Automation System.”
It will be helpful to develop idea and model about information
security of university level institution.
8
Research Objective
Broad Objective: The broad objective of our research is to propose a
cyber security framework for the university automation system so that
we can ensure the safety of the confidential information of the
university.
9
Specific Objective:
1.Identify the sensitive and confidential information to protect.
2.Identify whose are the stakeholder of the sensitive and confidential
..information.
3.Identify lacking and security threats of running automation system.
4.Propose a security framework to ensure the future safety of the
system
Research Methodology
As we are studying on some frameworks to propose a new one
therefore, we are following comparative research methodologies.
It studies to identify, analyses and explain similarities and
differences across various cyber security frameworks.
10
Collect
Data
Study
Existing
Security
Framework
Propose
New
Framework
Check
efficiency
of new
framework
Get final
Result
Figure: Sequence of Research Work
Data Analysis Tools
Google Forms
MS Excel
MS Word
MS PowerPoint
SurveyMoneky
11
Test and Evaluation
Collect some data security models to study on their efficiencies,
….advantages and limitation
Propose a model with comparatively less limitations
Test the proposed method with real life situation to justify the ….
…. efficiencies, advantages and usability than pervious models. 12
Plan of Work
Step 1: Area specification.
Step 2: Identify the Problem.
Step 3: Review the Literature.
Step 4: Methodology – interview, observations.
Step 5: Develop criteria's to compare.
Step 5: Analysis and interpreting data.
Step 6: Documenting Result & evaluation.
Step 7: Conclusion and recommendation. 13
Time Schedule
14
Work List / Week Distributions
Feb Mar Apr May June July Aug Sep
Area Specification
Identify the Problem
Review the Literature
Methodology – Interview, Observation
Develop Criteria’s to Compare
Analysis & Interpreting Data
Documenting Result & Evaluation
Conclusion and Recommendation
Cost Estimation
15
SL Purpose of Cost Approximate Cost
1 Transportation 3,000 /=
2 Hardware 10,000 /=
3 Analyzing Resources 6,000 /=
4 Printing and Binding 1,000 /=
Total Cost 20,000 /=
Limitation of the Research Work
Not getting permission for collecting all the required information.
Less resources for conducting the research.
Lack of required technologies to analysis data and
Not getting real life environment to test the framework.
16
Future Works of the Research
Properly utilize the given time period.
Perform all the formalities to get access of necessary
information to work on for the research.
Be sure of the required resources to conduct the research
and therefore collect them accordingly.
Revise and evaluate the research work time to time for better
correctness and appropriateness.
17
Conclusion
By completing the research we will discover about the security
threats that may corrupt the confidential information of university
automation system. We will do a comparative search among the
security frameworks and therefore we will propose a new model
that will be more efficient and effective to ensure data security of
university level large institution.
18
Bibliography
1. Laudon, Kenneth C., and Jane Price Laudon. Management Information
Systems: Managing the Digital Firm. Verlag Nicht Ermittelbar, 2014.
2. Thuraisingham, Dr. Bhavani. “Data and Applications Security: Developments
and Directions.” Annual International Computer Software and Applications
Conference , 2002.
3. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in
Cloud Computing. "IEEE International Conference on Circuits and Systems
(2017):76-81.
4. Mindmajix. “List Of Cybersecurity Frameworks.” Mindmajix, Mindmajix
Technologies INC, 7 Sept. 2017, mindmajix.com/cyber-security-
frameworks
19
Bibliography
5. Aviel , Rubin D. and Geer Jr Daniel E. "A Survey of Web Security." IEEE
International Symposium on Advanced Research (1998): 34-41.
6. Craggs, Barnaby and Rashid Awais. "Smart Cyber-Physical Systems:
Beyond Usable." ACM 3rd International Workshop on Software
Engineering for Smart Cyber-Physical Systems (2017).
7. Nader, Sohrabi Safa, et al. "Information security collaboration formation
in organisations." IET Information Security (2018): 238-245. Document.
8. Wade , Baker H. and Wallace Linda. "Is Information Security Under
Control? Investigating Quality in Information Security Management."
IEEE COMPUTER SOCIETY (2007): 36-44. Document. 23 April 2019.
20
Bibliography
9. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in
Cloud Computing." IEEE International Conference on Circuits and Systems
(2017): 76-81.
10.Techopedia. Cybersecurity. 10 March 2018. Online. 10 March 2019.
<https://www.techopedia.com/definition/24747/cybersecurity>.
11. Ward, R. and P Skeffington. "Network Management Security." IEEE
(1990): 173-180.
12.Wikipedia. Cyberspace. 13 February 2019. Digital. 10 March 2019.
<https://en.wikipedia.org/wiki/Cyberspace>.
13.Wikipedia.. Security. 6 March 2019. Online. 10 March 2019.
<https://en.wikipedia.org/wiki/Security>.
21
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System

More Related Content

What's hot

Big Data becomes Big Analysis
Big Data becomes Big Analysis Big Data becomes Big Analysis
Big Data becomes Big Analysis OSTHUS
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
AI is the Future of Drug Discovery
AI is the Future of Drug DiscoveryAI is the Future of Drug Discovery
AI is the Future of Drug DiscoveryDavid Leahy
 
Data lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseData lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseOSTHUS
 
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...William Gunn
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudPaaSword EU Project
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
 
Running Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and EthicsRunning Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and EthicsLancaster University Library
 
NetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana MilenkovicNetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana MilenkovicAlexander Pico
 
cloudComputing_ProjectJunior
cloudComputing_ProjectJuniorcloudComputing_ProjectJunior
cloudComputing_ProjectJuniorDominic Searson
 
Challenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life SciencesChallenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life SciencesOSTHUS
 
From allotrope to reference master data management
From allotrope to reference master data management From allotrope to reference master data management
From allotrope to reference master data management OSTHUS
 
LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021Sean Manion PhD
 
Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks Alexander Pico
 
Expert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with UnileverExpert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with UnileverEagle Genomics
 
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...Robert Oostenveld
 

What's hot (20)

44
4444
44
 
Big Data becomes Big Analysis
Big Data becomes Big Analysis Big Data becomes Big Analysis
Big Data becomes Big Analysis
 
Cybersecurity Safety
Cybersecurity SafetyCybersecurity Safety
Cybersecurity Safety
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
 
AI is the Future of Drug Discovery
AI is the Future of Drug DiscoveryAI is the Future of Drug Discovery
AI is the Future of Drug Discovery
 
Data lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseData lifecycle mgt across the enterprise
Data lifecycle mgt across the enterprise
 
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the Cloud
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
 
Running Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and EthicsRunning Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and Ethics
 
NetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana MilenkovicNetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana Milenkovic
 
cloudComputing_ProjectJunior
cloudComputing_ProjectJuniorcloudComputing_ProjectJunior
cloudComputing_ProjectJunior
 
Challenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life SciencesChallenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life Sciences
 
From allotrope to reference master data management
From allotrope to reference master data management From allotrope to reference master data management
From allotrope to reference master data management
 
LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021
 
Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks
 
Doc
DocDoc
Doc
 
Expert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with UnileverExpert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with Unilever
 
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
 

Similar to Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System

ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slidestoolboc
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...FACE
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Fred Kautz
 
Bin saleem
Bin saleemBin saleem
Bin saleemanesah
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2Abi Reddy
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk ModelsDavid Sweigert
 
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESSBIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESSijcsit
 
Step 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docxStep 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docxwhitneyleman54422
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationChadni Islam
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsIOSR Journals
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxroushhsiu
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global softwareijseajournal
 
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...Anita Miller
 
Systematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk AssessmentSystematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk AssessmentAde Ajasa
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPLcsandit
 

Similar to Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System (20)

De carlo rizk 2010 icelw
De carlo rizk 2010 icelwDe carlo rizk 2010 icelw
De carlo rizk 2010 icelw
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
 
De carlo rizk 2010 icelw
De carlo rizk 2010 icelwDe carlo rizk 2010 icelw
De carlo rizk 2010 icelw
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Bin saleem
Bin saleemBin saleem
Bin saleem
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESSBIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
 
Big Data and Cloud Readiness
Big Data and Cloud ReadinessBig Data and Cloud Readiness
Big Data and Cloud Readiness
 
Step 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docxStep 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docx
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination Systems
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
 
Systematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk AssessmentSystematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk Assessment
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPL
 

More from Rihab Rahman

Presentation on House Rent Management System
Presentation on House Rent Management SystemPresentation on House Rent Management System
Presentation on House Rent Management SystemRihab Rahman
 
Presentation on Transmission Media & Switching
Presentation on Transmission Media & SwitchingPresentation on Transmission Media & Switching
Presentation on Transmission Media & SwitchingRihab Rahman
 
Presentation on Automated Prescription Management System
Presentation on Automated Prescription Management SystemPresentation on Automated Prescription Management System
Presentation on Automated Prescription Management SystemRihab Rahman
 
Global Warming Poster Presentation
Global Warming Poster PresentationGlobal Warming Poster Presentation
Global Warming Poster PresentationRihab Rahman
 
Impact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladeshImpact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladeshRihab Rahman
 
Display Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment DisplayDisplay Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment DisplayRihab Rahman
 
Display a Character on a 7 Segment Display
Display a Character on a 7 Segment DisplayDisplay a Character on a 7 Segment Display
Display a Character on a 7 Segment DisplayRihab Rahman
 
Blinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a PortBlinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a PortRihab Rahman
 
Blinking a Single LED
Blinking a Single LEDBlinking a Single LED
Blinking a Single LEDRihab Rahman
 
Combinational logic circuit
Combinational logic circuitCombinational logic circuit
Combinational logic circuitRihab Rahman
 
Bernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with StakeholdersBernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with StakeholdersRihab Rahman
 

More from Rihab Rahman (12)

Presentation on House Rent Management System
Presentation on House Rent Management SystemPresentation on House Rent Management System
Presentation on House Rent Management System
 
Presentation on Transmission Media & Switching
Presentation on Transmission Media & SwitchingPresentation on Transmission Media & Switching
Presentation on Transmission Media & Switching
 
Presentation on Automated Prescription Management System
Presentation on Automated Prescription Management SystemPresentation on Automated Prescription Management System
Presentation on Automated Prescription Management System
 
Global Warming Poster Presentation
Global Warming Poster PresentationGlobal Warming Poster Presentation
Global Warming Poster Presentation
 
Impact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladeshImpact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladesh
 
Display Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment DisplayDisplay Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment Display
 
Display a Character on a 7 Segment Display
Display a Character on a 7 Segment DisplayDisplay a Character on a 7 Segment Display
Display a Character on a 7 Segment Display
 
Blinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a PortBlinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a Port
 
Blinking a Single LED
Blinking a Single LEDBlinking a Single LED
Blinking a Single LED
 
Combinational logic circuit
Combinational logic circuitCombinational logic circuit
Combinational logic circuit
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
Bernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with StakeholdersBernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with Stakeholders
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System

  • 1. What Do You Think? Security is a journey? Or A destination? According to Microsoft Vice President Dave Thompson, “Security is a journey, not a destination.”
  • 2. “Study on Cyber Security: Establishing a Sustainable Cyber Security Framework for University Automation System” Presentation on Supervised By M.M. Rakibul Hasan Lecturer Department of Computer Science and Engineering Prepared By Rihab Rahman ID: SECRET Program: BCSE Kaisary Zaman ID: SECRET Program: BCSE
  • 3. Table of Content Introduction Background of Study Problem Statement Rationale of Study Research Objective Research Methodology Data analysis tools Test and Evaluation Plan of Work Time Schedule Cost Estimation Limitation of research work Future Works of the Research Conclusion Bibliography 3
  • 4. Introduction  Cyberspace  Security  Cyber Security  Security Framework  University Automation Systems 4
  • 5. Data Security - The process of protecting the data from unauthorized users, preventing alterations and restricting the access of sensitive information[1]. 5 Background of Study
  • 6. Background of Study Some Security Frameworks 6
  • 7. Problem Statement Privileged information should be easy accessible for the students, teachers and stuffs but in a controlled manner with proper monitoring. 7
  • 8. Rationale of Study To let people know about the importance of cyber security because in today’s technology-based world is a very vast thing. To cope up with this situation we should read this paper titled as “Study on Cyber Security: Establishing a Cyber Security Framework for University Automation System.” It will be helpful to develop idea and model about information security of university level institution. 8
  • 9. Research Objective Broad Objective: The broad objective of our research is to propose a cyber security framework for the university automation system so that we can ensure the safety of the confidential information of the university. 9 Specific Objective: 1.Identify the sensitive and confidential information to protect. 2.Identify whose are the stakeholder of the sensitive and confidential ..information. 3.Identify lacking and security threats of running automation system. 4.Propose a security framework to ensure the future safety of the system
  • 10. Research Methodology As we are studying on some frameworks to propose a new one therefore, we are following comparative research methodologies. It studies to identify, analyses and explain similarities and differences across various cyber security frameworks. 10 Collect Data Study Existing Security Framework Propose New Framework Check efficiency of new framework Get final Result Figure: Sequence of Research Work
  • 11. Data Analysis Tools Google Forms MS Excel MS Word MS PowerPoint SurveyMoneky 11
  • 12. Test and Evaluation Collect some data security models to study on their efficiencies, ….advantages and limitation Propose a model with comparatively less limitations Test the proposed method with real life situation to justify the …. …. efficiencies, advantages and usability than pervious models. 12
  • 13. Plan of Work Step 1: Area specification. Step 2: Identify the Problem. Step 3: Review the Literature. Step 4: Methodology – interview, observations. Step 5: Develop criteria's to compare. Step 5: Analysis and interpreting data. Step 6: Documenting Result & evaluation. Step 7: Conclusion and recommendation. 13
  • 14. Time Schedule 14 Work List / Week Distributions Feb Mar Apr May June July Aug Sep Area Specification Identify the Problem Review the Literature Methodology – Interview, Observation Develop Criteria’s to Compare Analysis & Interpreting Data Documenting Result & Evaluation Conclusion and Recommendation
  • 15. Cost Estimation 15 SL Purpose of Cost Approximate Cost 1 Transportation 3,000 /= 2 Hardware 10,000 /= 3 Analyzing Resources 6,000 /= 4 Printing and Binding 1,000 /= Total Cost 20,000 /=
  • 16. Limitation of the Research Work Not getting permission for collecting all the required information. Less resources for conducting the research. Lack of required technologies to analysis data and Not getting real life environment to test the framework. 16
  • 17. Future Works of the Research Properly utilize the given time period. Perform all the formalities to get access of necessary information to work on for the research. Be sure of the required resources to conduct the research and therefore collect them accordingly. Revise and evaluate the research work time to time for better correctness and appropriateness. 17
  • 18. Conclusion By completing the research we will discover about the security threats that may corrupt the confidential information of university automation system. We will do a comparative search among the security frameworks and therefore we will propose a new model that will be more efficient and effective to ensure data security of university level large institution. 18
  • 19. Bibliography 1. Laudon, Kenneth C., and Jane Price Laudon. Management Information Systems: Managing the Digital Firm. Verlag Nicht Ermittelbar, 2014. 2. Thuraisingham, Dr. Bhavani. “Data and Applications Security: Developments and Directions.” Annual International Computer Software and Applications Conference , 2002. 3. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in Cloud Computing. "IEEE International Conference on Circuits and Systems (2017):76-81. 4. Mindmajix. “List Of Cybersecurity Frameworks.” Mindmajix, Mindmajix Technologies INC, 7 Sept. 2017, mindmajix.com/cyber-security- frameworks 19
  • 20. Bibliography 5. Aviel , Rubin D. and Geer Jr Daniel E. "A Survey of Web Security." IEEE International Symposium on Advanced Research (1998): 34-41. 6. Craggs, Barnaby and Rashid Awais. "Smart Cyber-Physical Systems: Beyond Usable." ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (2017). 7. Nader, Sohrabi Safa, et al. "Information security collaboration formation in organisations." IET Information Security (2018): 238-245. Document. 8. Wade , Baker H. and Wallace Linda. "Is Information Security Under Control? Investigating Quality in Information Security Management." IEEE COMPUTER SOCIETY (2007): 36-44. Document. 23 April 2019. 20
  • 21. Bibliography 9. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in Cloud Computing." IEEE International Conference on Circuits and Systems (2017): 76-81. 10.Techopedia. Cybersecurity. 10 March 2018. Online. 10 March 2019. <https://www.techopedia.com/definition/24747/cybersecurity>. 11. Ward, R. and P Skeffington. "Network Management Security." IEEE (1990): 173-180. 12.Wikipedia. Cyberspace. 13 February 2019. Digital. 10 March 2019. <https://en.wikipedia.org/wiki/Cyberspace>. 13.Wikipedia.. Security. 6 March 2019. Online. 10 March 2019. <https://en.wikipedia.org/wiki/Security>. 21