SlideShare a Scribd company logo
1 of 14
Download to read offline
Information Security @
the University of Piraeus
The New Era of Cyber Security
University of Piraeus
8/12/2014
Sokratis K. Katsikas, Professor
The University of Piraeus
• Founded in 1938 as the
“Piraeus School of
Industry”
• Comprises four Schools
and nine academic
departments
• Nine BSc programmes
• Twenty six MSc
programmes
• Nine PhD programmes
• Appx 15000 students
The School of Information &
Communication Technologies
• Comprises two departments
– Dept. of Informatics
– Dept. of Digital Systems
• 45 faculty members
• ~2000 students
The Department of Digital Systems
• Founded in 1999.
• The Department of Digital Systems offers a four-year
Undergraduate Programme in “Digital Systems” (240 ECTSs), two
Postgraduate Programmes in “Technology Education and Digital
Systems” (120 ECTSs) and in “Techno-economic Management and
Digital Systems Security” (90 ECTSs) and Ph.D. studies.
• Areas of research interest include
– Network-Oriented Systems and Services
– Digital Health Services
– Telecommunication Networks and Integrated Services
– Security Systems
– Intelligent Systems and Multimedia Technologies
– Telecommunication Systems
– Technology – Enhanced Learning
The Systems Security Laboratory
• Education and research in
– Digital systems security
– Information systems security
– Network security
– Critical infrastructure protection
– Information security
The Systems Security Laboratory
• Research interests
– Secure eCommerce, eBusiness, eGovernment, eHealth, eLearning
architectures and services
– Privacy Enhancing Technologies
– Development of Secure Information Systems
– Wireless and Mobile Communications Security
– Legal and Regulatory issues in Data and Privacy Protection
– Security and Privacy Economics
– Medical Informatics Security and Privacy
– Smart Card Technology and Applications
– Voice over IP Security
– Security Policies / Security Management -Risk Assessment
Methodologies
– Intrusion Detection Systems
– Security in ad-hoc and Sensor Networks
The Systems Security Laboratory
• Research interests
– Web Applications and Database Security
– Authentication and trust management
– Forensics
– Security and privacy on smart phones and tablet
computers
– Smart grid security
– Biometrics
– Vulnerabilities analysis, exploitation and penetration
testing
Staff
• Faculty: 3
– Sokratis Katsikas, Professor
– Costas Lambrinoudakis, Associate Professor
– Christos Xenakis, Assistant Professor
• Post Doc fellows: 6
• PhD students: 15
• MSc students: 60
Funded Research
• International R&D projects: 34 / 3,9 MEURO
• National R&D projects: 21/0,7 MEURO
• Studies: 97/2,8 MEURO
• ΕΠΕΑΕΚ projects: 25/10,4 MEURO
Research output
• Books: 40 (Total)/13 (2009-2013)
• Book chapters: 42 (Total)/15 (2009-2013)
• Journals: 115 (Total)/28 (2009-2013)
• Conference Proceedings: 153 (Total)/39 (2009-2013)
• General conference chairmanship: 9 (Total)/2 (2009-
2013)
• TPC chairmanship: 21 (Total)/14 (2009-2013)
• TPC membership: 401 (Total)/246 (2009-2013)
• Citations: 1821 (SK)
• h-index: 23 (SK)
• PhDs awarded
Undergraduate studies
• Courses taught
– Security policies and management (ΨΣ 801) 5th sem.
– Information Systems Security (ΨΣ 802) 6th sem.
– Network security (ΨΣ 803) 6th sem.
– Privacy enhancing technologies (ΨΣ 807) 6th sem.
– Cryptography (ΨΣ 806) 7th sem.
– Mobile and wireless communications security (ΨΣ
804) 8th sem.
• Undergraduate theses supervision
Postgraduate studies
• MSc Programme on “Digital Systems Security”
• 3 semesters (2 taught + 1 thesis)
• 30 students per cohort
• Courses taught
– Network security
– Security management
– Security assessment and vulnerability exploitation
– Applied cryptography
– Information systems security
– Mobile internet security
– Digital forensics and web security
– Legal aspects of security
– Privacy enhancing technologies
– Advanced security technologies
• MSc theses supervision
Collaboration
• Research collaboration with dozens of
Universities, in all EU countries
• Research collaboration with industrial
partners
• ENISA
• Cyber Command, Hellenic Armed Forces
• Center for Security Studies
• ….
Contacts
• Sokratis Katsikas: ska@unipi.gr
• Costas Lambrinoudakis: clam@unipi.gr
• Christos Xenakis: xenakis@unipi.gr

More Related Content

Similar to 1. Welcome Note

July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineNYU Tandon Online
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Wesley De Neve
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUNYU Tandon Online
 
Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Securityimec.archive
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up NIKOLAOS KOUTRAS
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementIoannis Krontiris
 
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...ΤΕΙ Κρήτης - Technological Educational Institute of Crete
 
National Research Data Archive MIDAS
National Research Data Archive MIDASNational Research Data Archive MIDAS
National Research Data Archive MIDASSaulius Maskeliunas
 
DOQUP final conference Bishkek
DOQUP final conference BishkekDOQUP final conference Bishkek
DOQUP final conference BishkekSimone Ravaioli
 
AcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdfAcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdfavfdm1
 
презентация чгту англ
презентация чгту англпрезентация чгту англ
презентация чгту англramcoopersoon
 
Ppt tale kn_intro_final
Ppt tale kn_intro_finalPpt tale kn_intro_final
Ppt tale kn_intro_finalManuel Castro
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digitalyprayudi
 
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...Demetrios G. Sampson
 
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...CUBCCE Conference
 
Information Society Programme - Trust & Security
Information Society Programme - Trust & SecurityInformation Society Programme - Trust & Security
Information Society Programme - Trust & SecurityFilipe Mello
 

Similar to 1. Welcome Note (20)

July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Security
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up
 
Tempus case study city university london
Tempus case study city university londonTempus case study city university london
Tempus case study city university london
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
 
National Research Data Archive MIDAS
National Research Data Archive MIDASNational Research Data Archive MIDAS
National Research Data Archive MIDAS
 
DOQUP final conference Bishkek
DOQUP final conference BishkekDOQUP final conference Bishkek
DOQUP final conference Bishkek
 
AcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdfAcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdf
 
презентация чгту англ
презентация чгту англпрезентация чгту англ
презентация чгту англ
 
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Department of Information and Communication Technologies (DTIC- UPF) in a nut...Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
 
Ppt tale kn_intro_final
Ppt tale kn_intro_finalPpt tale kn_intro_final
Ppt tale kn_intro_final
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digital
 
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
 
RDM Programme at University of Edinburgh
RDM Programme at University of EdinburghRDM Programme at University of Edinburgh
RDM Programme at University of Edinburgh
 
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
 
Information Society Programme - Trust & Security
Information Society Programme - Trust & SecurityInformation Society Programme - Trust & Security
Information Society Programme - Trust & Security
 
Videolectures for ocwc2010
Videolectures for ocwc2010Videolectures for ocwc2010
Videolectures for ocwc2010
 

More from isc2-hellenic

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpectedisc2-hellenic
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Teamisc2-hellenic
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Marsisc2-hellenic
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment isc2-hellenic
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment isc2-hellenic
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0isc2-hellenic
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentationisc2-hellenic
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosisc2-hellenic
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1isc2-hellenic
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2isc2-hellenic
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentationisc2-hellenic
 

More from isc2-hellenic (20)

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpected
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Mars
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

1. Welcome Note

  • 1. Information Security @ the University of Piraeus The New Era of Cyber Security University of Piraeus 8/12/2014 Sokratis K. Katsikas, Professor
  • 2. The University of Piraeus • Founded in 1938 as the “Piraeus School of Industry” • Comprises four Schools and nine academic departments • Nine BSc programmes • Twenty six MSc programmes • Nine PhD programmes • Appx 15000 students
  • 3. The School of Information & Communication Technologies • Comprises two departments – Dept. of Informatics – Dept. of Digital Systems • 45 faculty members • ~2000 students
  • 4. The Department of Digital Systems • Founded in 1999. • The Department of Digital Systems offers a four-year Undergraduate Programme in “Digital Systems” (240 ECTSs), two Postgraduate Programmes in “Technology Education and Digital Systems” (120 ECTSs) and in “Techno-economic Management and Digital Systems Security” (90 ECTSs) and Ph.D. studies. • Areas of research interest include – Network-Oriented Systems and Services – Digital Health Services – Telecommunication Networks and Integrated Services – Security Systems – Intelligent Systems and Multimedia Technologies – Telecommunication Systems – Technology – Enhanced Learning
  • 5. The Systems Security Laboratory • Education and research in – Digital systems security – Information systems security – Network security – Critical infrastructure protection – Information security
  • 6. The Systems Security Laboratory • Research interests – Secure eCommerce, eBusiness, eGovernment, eHealth, eLearning architectures and services – Privacy Enhancing Technologies – Development of Secure Information Systems – Wireless and Mobile Communications Security – Legal and Regulatory issues in Data and Privacy Protection – Security and Privacy Economics – Medical Informatics Security and Privacy – Smart Card Technology and Applications – Voice over IP Security – Security Policies / Security Management -Risk Assessment Methodologies – Intrusion Detection Systems – Security in ad-hoc and Sensor Networks
  • 7. The Systems Security Laboratory • Research interests – Web Applications and Database Security – Authentication and trust management – Forensics – Security and privacy on smart phones and tablet computers – Smart grid security – Biometrics – Vulnerabilities analysis, exploitation and penetration testing
  • 8. Staff • Faculty: 3 – Sokratis Katsikas, Professor – Costas Lambrinoudakis, Associate Professor – Christos Xenakis, Assistant Professor • Post Doc fellows: 6 • PhD students: 15 • MSc students: 60
  • 9. Funded Research • International R&D projects: 34 / 3,9 MEURO • National R&D projects: 21/0,7 MEURO • Studies: 97/2,8 MEURO • ΕΠΕΑΕΚ projects: 25/10,4 MEURO
  • 10. Research output • Books: 40 (Total)/13 (2009-2013) • Book chapters: 42 (Total)/15 (2009-2013) • Journals: 115 (Total)/28 (2009-2013) • Conference Proceedings: 153 (Total)/39 (2009-2013) • General conference chairmanship: 9 (Total)/2 (2009- 2013) • TPC chairmanship: 21 (Total)/14 (2009-2013) • TPC membership: 401 (Total)/246 (2009-2013) • Citations: 1821 (SK) • h-index: 23 (SK) • PhDs awarded
  • 11. Undergraduate studies • Courses taught – Security policies and management (ΨΣ 801) 5th sem. – Information Systems Security (ΨΣ 802) 6th sem. – Network security (ΨΣ 803) 6th sem. – Privacy enhancing technologies (ΨΣ 807) 6th sem. – Cryptography (ΨΣ 806) 7th sem. – Mobile and wireless communications security (ΨΣ 804) 8th sem. • Undergraduate theses supervision
  • 12. Postgraduate studies • MSc Programme on “Digital Systems Security” • 3 semesters (2 taught + 1 thesis) • 30 students per cohort • Courses taught – Network security – Security management – Security assessment and vulnerability exploitation – Applied cryptography – Information systems security – Mobile internet security – Digital forensics and web security – Legal aspects of security – Privacy enhancing technologies – Advanced security technologies • MSc theses supervision
  • 13. Collaboration • Research collaboration with dozens of Universities, in all EU countries • Research collaboration with industrial partners • ENISA • Cyber Command, Hellenic Armed Forces • Center for Security Studies • ….
  • 14. Contacts • Sokratis Katsikas: ska@unipi.gr • Costas Lambrinoudakis: clam@unipi.gr • Christos Xenakis: xenakis@unipi.gr