SlideShare a Scribd company logo
Information Security @
the University of Piraeus
The New Era of Cyber Security
University of Piraeus
8/12/2014
Sokratis K. Katsikas, Professor
The University of Piraeus
• Founded in 1938 as the
“Piraeus School of
Industry”
• Comprises four Schools
and nine academic
departments
• Nine BSc programmes
• Twenty six MSc
programmes
• Nine PhD programmes
• Appx 15000 students
The School of Information &
Communication Technologies
• Comprises two departments
– Dept. of Informatics
– Dept. of Digital Systems
• 45 faculty members
• ~2000 students
The Department of Digital Systems
• Founded in 1999.
• The Department of Digital Systems offers a four-year
Undergraduate Programme in “Digital Systems” (240 ECTSs), two
Postgraduate Programmes in “Technology Education and Digital
Systems” (120 ECTSs) and in “Techno-economic Management and
Digital Systems Security” (90 ECTSs) and Ph.D. studies.
• Areas of research interest include
– Network-Oriented Systems and Services
– Digital Health Services
– Telecommunication Networks and Integrated Services
– Security Systems
– Intelligent Systems and Multimedia Technologies
– Telecommunication Systems
– Technology – Enhanced Learning
The Systems Security Laboratory
• Education and research in
– Digital systems security
– Information systems security
– Network security
– Critical infrastructure protection
– Information security
The Systems Security Laboratory
• Research interests
– Secure eCommerce, eBusiness, eGovernment, eHealth, eLearning
architectures and services
– Privacy Enhancing Technologies
– Development of Secure Information Systems
– Wireless and Mobile Communications Security
– Legal and Regulatory issues in Data and Privacy Protection
– Security and Privacy Economics
– Medical Informatics Security and Privacy
– Smart Card Technology and Applications
– Voice over IP Security
– Security Policies / Security Management -Risk Assessment
Methodologies
– Intrusion Detection Systems
– Security in ad-hoc and Sensor Networks
The Systems Security Laboratory
• Research interests
– Web Applications and Database Security
– Authentication and trust management
– Forensics
– Security and privacy on smart phones and tablet
computers
– Smart grid security
– Biometrics
– Vulnerabilities analysis, exploitation and penetration
testing
Staff
• Faculty: 3
– Sokratis Katsikas, Professor
– Costas Lambrinoudakis, Associate Professor
– Christos Xenakis, Assistant Professor
• Post Doc fellows: 6
• PhD students: 15
• MSc students: 60
Funded Research
• International R&D projects: 34 / 3,9 MEURO
• National R&D projects: 21/0,7 MEURO
• Studies: 97/2,8 MEURO
• ΕΠΕΑΕΚ projects: 25/10,4 MEURO
Research output
• Books: 40 (Total)/13 (2009-2013)
• Book chapters: 42 (Total)/15 (2009-2013)
• Journals: 115 (Total)/28 (2009-2013)
• Conference Proceedings: 153 (Total)/39 (2009-2013)
• General conference chairmanship: 9 (Total)/2 (2009-
2013)
• TPC chairmanship: 21 (Total)/14 (2009-2013)
• TPC membership: 401 (Total)/246 (2009-2013)
• Citations: 1821 (SK)
• h-index: 23 (SK)
• PhDs awarded
Undergraduate studies
• Courses taught
– Security policies and management (ΨΣ 801) 5th sem.
– Information Systems Security (ΨΣ 802) 6th sem.
– Network security (ΨΣ 803) 6th sem.
– Privacy enhancing technologies (ΨΣ 807) 6th sem.
– Cryptography (ΨΣ 806) 7th sem.
– Mobile and wireless communications security (ΨΣ
804) 8th sem.
• Undergraduate theses supervision
Postgraduate studies
• MSc Programme on “Digital Systems Security”
• 3 semesters (2 taught + 1 thesis)
• 30 students per cohort
• Courses taught
– Network security
– Security management
– Security assessment and vulnerability exploitation
– Applied cryptography
– Information systems security
– Mobile internet security
– Digital forensics and web security
– Legal aspects of security
– Privacy enhancing technologies
– Advanced security technologies
• MSc theses supervision
Collaboration
• Research collaboration with dozens of
Universities, in all EU countries
• Research collaboration with industrial
partners
• ENISA
• Cyber Command, Hellenic Armed Forces
• Center for Security Studies
• ….
Contacts
• Sokratis Katsikas: ska@unipi.gr
• Costas Lambrinoudakis: clam@unipi.gr
• Christos Xenakis: xenakis@unipi.gr

More Related Content

Similar to 1. Welcome Note

July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
NYU Tandon Online
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Wesley De Neve
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
NYU Tandon Online
 
Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Security
imec.archive
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up
NIKOLAOS KOUTRAS
 
Tempus case study city university london
Tempus case study city university londonTempus case study city university london
Tempus case study city university london
Erasmus+ UK National Agency
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
Ioannis Krontiris
 
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
ΤΕΙ Κρήτης - Technological Educational Institute of Crete
 
National Research Data Archive MIDAS
National Research Data Archive MIDASNational Research Data Archive MIDAS
National Research Data Archive MIDAS
Saulius Maskeliunas
 
DOQUP final conference Bishkek
DOQUP final conference BishkekDOQUP final conference Bishkek
DOQUP final conference Bishkek
Simone Ravaioli
 
AcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdfAcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdf
avfdm1
 
презентация чгту англ
презентация чгту англпрезентация чгту англ
презентация чгту англ
ramcoopersoon
 
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Department of Information and Communication Technologies (DTIC- UPF) in a nut...Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Department of Information and Communication Technologies - Universitat Pompeu Fabra, Barcelona
 
Ppt tale kn_intro_final
Ppt tale kn_intro_finalPpt tale kn_intro_final
Ppt tale kn_intro_final
Manuel Castro
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digital
yprayudi
 
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Demetrios G. Sampson
 
RDM Programme at University of Edinburgh
RDM Programme at University of EdinburghRDM Programme at University of Edinburgh
RDM Programme at University of Edinburgh
Historic Environment Scotland
 
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
CUBCCE Conference
 
Information Society Programme - Trust & Security
Information Society Programme - Trust & SecurityInformation Society Programme - Trust & Security
Information Society Programme - Trust & Security
Filipe Mello
 
Videolectures for ocwc2010
Videolectures for ocwc2010Videolectures for ocwc2010
Videolectures for ocwc2010
The Open Education Consortium
 

Similar to 1. Welcome Note (20)

July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Security
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up
 
Tempus case study city university london
Tempus case study city university londonTempus case study city university london
Tempus case study city university london
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
Παρουσίαση Μεταπτυχιακού Προγράμματος (ΠΜΣ) Πληροφορική και Πολυμέσα - Msc in...
 
National Research Data Archive MIDAS
National Research Data Archive MIDASNational Research Data Archive MIDAS
National Research Data Archive MIDAS
 
DOQUP final conference Bishkek
DOQUP final conference BishkekDOQUP final conference Bishkek
DOQUP final conference Bishkek
 
AcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdfAcaWri - 00 - Intro_2021.pdf
AcaWri - 00 - Intro_2021.pdf
 
презентация чгту англ
презентация чгту англпрезентация чгту англ
презентация чгту англ
 
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Department of Information and Communication Technologies (DTIC- UPF) in a nut...Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
 
Ppt tale kn_intro_final
Ppt tale kn_intro_finalPpt tale kn_intro_final
Ppt tale kn_intro_final
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digital
 
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
Cloud-based Digital Technologies for Opening Up Education: Keep On Learning ...
 
RDM Programme at University of Edinburgh
RDM Programme at University of EdinburghRDM Programme at University of Edinburgh
RDM Programme at University of Edinburgh
 
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
Neven Vrček - Role of Governments, Academy & Science Parks - University of Za...
 
Information Society Programme - Trust & Security
Information Society Programme - Trust & SecurityInformation Society Programme - Trust & Security
Information Society Programme - Trust & Security
 
Videolectures for ocwc2010
Videolectures for ocwc2010Videolectures for ocwc2010
Videolectures for ocwc2010
 

More from isc2-hellenic

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpected
isc2-hellenic
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
isc2-hellenic
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
isc2-hellenic
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Mars
isc2-hellenic
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
isc2-hellenic
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
isc2-hellenic
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
isc2-hellenic
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
isc2-hellenic
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
isc2-hellenic
 
General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
isc2-hellenic
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
isc2-hellenic
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
isc2-hellenic
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
isc2-hellenic
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
isc2-hellenic
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
isc2-hellenic
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
isc2-hellenic
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
isc2-hellenic
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
isc2-hellenic
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
isc2-hellenic
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
isc2-hellenic
 

More from isc2-hellenic (20)

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpected
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Mars
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

1. Welcome Note

  • 1. Information Security @ the University of Piraeus The New Era of Cyber Security University of Piraeus 8/12/2014 Sokratis K. Katsikas, Professor
  • 2. The University of Piraeus • Founded in 1938 as the “Piraeus School of Industry” • Comprises four Schools and nine academic departments • Nine BSc programmes • Twenty six MSc programmes • Nine PhD programmes • Appx 15000 students
  • 3. The School of Information & Communication Technologies • Comprises two departments – Dept. of Informatics – Dept. of Digital Systems • 45 faculty members • ~2000 students
  • 4. The Department of Digital Systems • Founded in 1999. • The Department of Digital Systems offers a four-year Undergraduate Programme in “Digital Systems” (240 ECTSs), two Postgraduate Programmes in “Technology Education and Digital Systems” (120 ECTSs) and in “Techno-economic Management and Digital Systems Security” (90 ECTSs) and Ph.D. studies. • Areas of research interest include – Network-Oriented Systems and Services – Digital Health Services – Telecommunication Networks and Integrated Services – Security Systems – Intelligent Systems and Multimedia Technologies – Telecommunication Systems – Technology – Enhanced Learning
  • 5. The Systems Security Laboratory • Education and research in – Digital systems security – Information systems security – Network security – Critical infrastructure protection – Information security
  • 6. The Systems Security Laboratory • Research interests – Secure eCommerce, eBusiness, eGovernment, eHealth, eLearning architectures and services – Privacy Enhancing Technologies – Development of Secure Information Systems – Wireless and Mobile Communications Security – Legal and Regulatory issues in Data and Privacy Protection – Security and Privacy Economics – Medical Informatics Security and Privacy – Smart Card Technology and Applications – Voice over IP Security – Security Policies / Security Management -Risk Assessment Methodologies – Intrusion Detection Systems – Security in ad-hoc and Sensor Networks
  • 7. The Systems Security Laboratory • Research interests – Web Applications and Database Security – Authentication and trust management – Forensics – Security and privacy on smart phones and tablet computers – Smart grid security – Biometrics – Vulnerabilities analysis, exploitation and penetration testing
  • 8. Staff • Faculty: 3 – Sokratis Katsikas, Professor – Costas Lambrinoudakis, Associate Professor – Christos Xenakis, Assistant Professor • Post Doc fellows: 6 • PhD students: 15 • MSc students: 60
  • 9. Funded Research • International R&D projects: 34 / 3,9 MEURO • National R&D projects: 21/0,7 MEURO • Studies: 97/2,8 MEURO • ΕΠΕΑΕΚ projects: 25/10,4 MEURO
  • 10. Research output • Books: 40 (Total)/13 (2009-2013) • Book chapters: 42 (Total)/15 (2009-2013) • Journals: 115 (Total)/28 (2009-2013) • Conference Proceedings: 153 (Total)/39 (2009-2013) • General conference chairmanship: 9 (Total)/2 (2009- 2013) • TPC chairmanship: 21 (Total)/14 (2009-2013) • TPC membership: 401 (Total)/246 (2009-2013) • Citations: 1821 (SK) • h-index: 23 (SK) • PhDs awarded
  • 11. Undergraduate studies • Courses taught – Security policies and management (ΨΣ 801) 5th sem. – Information Systems Security (ΨΣ 802) 6th sem. – Network security (ΨΣ 803) 6th sem. – Privacy enhancing technologies (ΨΣ 807) 6th sem. – Cryptography (ΨΣ 806) 7th sem. – Mobile and wireless communications security (ΨΣ 804) 8th sem. • Undergraduate theses supervision
  • 12. Postgraduate studies • MSc Programme on “Digital Systems Security” • 3 semesters (2 taught + 1 thesis) • 30 students per cohort • Courses taught – Network security – Security management – Security assessment and vulnerability exploitation – Applied cryptography – Information systems security – Mobile internet security – Digital forensics and web security – Legal aspects of security – Privacy enhancing technologies – Advanced security technologies • MSc theses supervision
  • 13. Collaboration • Research collaboration with dozens of Universities, in all EU countries • Research collaboration with industrial partners • ENISA • Cyber Command, Hellenic Armed Forces • Center for Security Studies • ….
  • 14. Contacts • Sokratis Katsikas: ska@unipi.gr • Costas Lambrinoudakis: clam@unipi.gr • Christos Xenakis: xenakis@unipi.gr