Presented at the Master of Science and Doctor of Philosophy Programs in Data Science for Healthcare and Clinical Informatics, Department of Clinical Epidemiology and Biostatistics, Faculty of Medicine Ramathibodi Hospital, Mahidol University, Bangkok, Thailand on October 21, 2020
What is cyber law?
What is cyber crime?
Cybercrimes areas
what law relating to
Data protection and privacy
Software Licensing Issues
IT acts
Policy Versus Law
Codes of Ethics and Professional Organizations
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
"Security, Privacy Data Protection and Perspectives to Counter Cybercrime" was presented at the CodeGate 2008 security conference in Seoul, Korea, April 2008.
http://www.codegate.org/
Presented at the Master of Science and Doctor of Philosophy Programs in Data Science for Healthcare and Clinical Informatics, Department of Clinical Epidemiology and Biostatistics, Faculty of Medicine Ramathibodi Hospital, Mahidol University, Bangkok, Thailand on October 21, 2020
What is cyber law?
What is cyber crime?
Cybercrimes areas
what law relating to
Data protection and privacy
Software Licensing Issues
IT acts
Policy Versus Law
Codes of Ethics and Professional Organizations
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
"Security, Privacy Data Protection and Perspectives to Counter Cybercrime" was presented at the CodeGate 2008 security conference in Seoul, Korea, April 2008.
http://www.codegate.org/
talks about the present status of the cyber security in India. The policy of cyber security is also discussed. the general principles of the cyber security is highlighted.
Legal position of cyber security and instances of breach of information technology code is also discussed.
Presentation to (ISC)2 Omaha-Lincoln Chapter meeting on March 15th, 2017. This presentation looks at managing compliance with multiple cybersecurity laws and regulations across different industries using the NIST Risk Management Framework.
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
Netpluz Cyber Intelligence Managed Security Pack for Small to Mid Business
A Cyber Protection Service That provides reactive mitigation and alerting before an event becomes an incident
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
talks about the present status of the cyber security in India. The policy of cyber security is also discussed. the general principles of the cyber security is highlighted.
Legal position of cyber security and instances of breach of information technology code is also discussed.
Presentation to (ISC)2 Omaha-Lincoln Chapter meeting on March 15th, 2017. This presentation looks at managing compliance with multiple cybersecurity laws and regulations across different industries using the NIST Risk Management Framework.
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
Netpluz Cyber Intelligence Managed Security Pack for Small to Mid Business
A Cyber Protection Service That provides reactive mitigation and alerting before an event becomes an incident
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
An APM webinar sponsored by the APM Midlands Branch on 15 March 2022.
Speaker: Fábio Morais
An overview of the people behind major cybercriminal activities, the dark web and how much your data is worth; and finally what basic measures project managers should be putting in place to reduce the cyber-risk profile of their projects.
In today’s data-driven world, data breaches can impact on projects that affect hundreds of millions or even billions of people at a time. Digital transformation has increased the supply of data moving, and data breaches have scaled up with it as attackers exploit the data-dependencies of daily life.
With recent attacks threatening to de-rail high profile projects, it’s vital that the risks are identified and actions implemented, not only to protect project data, but to protect project managers and stakeholders.
Most cybercrime is an attack on information about individuals, corporations, or governments and events can occur in jurisdictions separated by vast distances. The Internet offers criminals multiple hiding places in the real world as well as in the network itself, posing severe problems for law enforcement, since international cooperation is usually required to investigate and attempt to trace down cybercriminals.
But who are these individuals and where exactly does cybercrime take place? What, as project professionals, can we do to protect ourselves?
We look to answer these questions by lifting the veil of hacking and the Dark Web.
https://youtu.be/TDXPetxXDMA
https://www.apm.org.uk/news/cyber-security-for-project-managers-lifting-the-veil-of-hacking-webinar/
Why React Native as a Strategic Advantage for Startup Innovation.pdfayushiqss
Do you know that React Native is being increasingly adopted by startups as well as big companies in the mobile app development industry? Big names like Facebook, Instagram, and Pinterest have already integrated this robust open-source framework.
In fact, according to a report by Statista, the number of React Native developers has been steadily increasing over the years, reaching an estimated 1.9 million by the end of 2024. This means that the demand for this framework in the job market has been growing making it a valuable skill.
But what makes React Native so popular for mobile application development? It offers excellent cross-platform capabilities among other benefits. This way, with React Native, developers can write code once and run it on both iOS and Android devices thus saving time and resources leading to shorter development cycles hence faster time-to-market for your app.
Let’s take the example of a startup, which wanted to release their app on both iOS and Android at once. Through the use of React Native they managed to create an app and bring it into the market within a very short period. This helped them gain an advantage over their competitors because they had access to a large user base who were able to generate revenue quickly for them.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
Tim Combridge from Sensible Giraffe and Salesforce Ben presents some important tips that all developers should know when dealing with Flows in Salesforce.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
2. About Myself
• Name : Kapil Mehrotra
• Experience : 24Yrs (Time files ☺ )
• Mostly worked in BFSI & Healthcare domain
• Having little learning curve & patience listener.
• Like to buy books a lot.. ☺ slow reader but try to complete one book at least
in a month.
• Like too much adventures in the life. (From where people say “Hum se na ho
payega” from there I start to search for “Hum se ho payega”) (+V)
• Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket
etc.)
• Die hard animal lover.
• Very active in few government communities for drafting Cloud and Cyber
security skill development policies since 2015.
3. Type of cyber threats
• “Phishing Attacks” to steal the User ID and Passwords and to gain
the access of the server, laptop or desktop.
• “Fake Link” Through this hacker gain the remote control of the
victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts,
Images, Videos and documents. (anydesk, teamviewer, logmein,
Ammyy)
• Social media scams (Twitter, Facebook, Instagram)
• SQL injection, Virus, Malware and Ransomware
• Fake websites that steal data.
• DDOS & Network attacks
• Insider attacks
4. What are the consequences of a cyber attack?
Cyber attacks can disrupt and cause considerable
financial and reputational damage to even the most
resilient organization. If you suffer a cyber attack, you
stand to lose Data, reputation and business, and
potentially face regulatory fines and litigation – as well
as the costs of remediation.
5. Why do we need Cyber Security
• In 2020 we must secure 300 billion passwords globally.
• There are 111 billion lines of new software code being produced each year,
• The world’s digital content is expected to grow 96 zettabytes by 2020
• Dark Web is 5000 times larger than the surface web.
• 20 million connected cars will ship with built-in software-based security
technology by 2020
• 1 Cr 80L Daily Images getting uploaded on the internet
• 50 billion devices connected to the Internet by 2020
6. Cybercrime Market FY 2020-2021
• Cybercrime costed businesses over $4 trillion total in
2020.
• Cybercrime will cost the world $6 trillion by 2021.
• The average cost of a data breach in 2020 will exceed
between $4million to $150 million
• Approximately $6 trillion is expected to be spent
globally on cybersecurity by 2021
7. Look at the Hackers Roadmap
• On average 30,000 new websites are getting hacked every day.
• Hackers create 300,000 new pieces of malware daily.
• There is a hacker attack every 39 seconds
• 62% people are experiencing phishing attacks
• 64% of companies have experienced web-based attacks
• Distributed denial-of-service (DDoS) attack grew to more than
1.44TB, increasing in size by 500%.
• 41% ransomware attacks are rising year on year.
Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of
every day
13. Sony Hack costed $15 Million
Reason : North Korea warns Sony before the launch of
move because it was related with “Kim Jong Un”
Interview and assassination conspiracy & making fun for
their president.
Sony has not taken it seriously.
Hacker hacked 47,000 current and formers employee
data, HR Data, User Ids & Passwords, Clinical Information,
SSO No, All emails and 100TB data including (Movies i.e
Aaron and Dave’s - “The Interview”, Brad Pitt’s - “Fury”
14. Dominos
• Customers’ personal data include customers’ names,
email ids, mobile numbers, and locations related to 18
crore orders that are placed with Domino’s India are
made available online.
• “Domino’s India Data Breach includes 13TB employee
files and customer details,” shows the web page with a
query box to fetch the details by Hackers.
• https://slf2rrahypck3bwckpdohsnhpeqrb3nhvwznjmar
mweofwnptowe4mad.onion.ly/
18. Do you know?
Kevin Mitnick is the biggest hacker in the world.
1. Mitnick Security Consulting
2. Security awareness training company “KnowBe4”
3. Board Of Director in “Zimperium”
4. Film : Track Down
5. An Author
19. IT Act & Data Privacy in India
1. Information Technology Act, 2000. (India)
2. IT Amendment Act 2000 to strengthen the cyber security
laws. (Section 43, 65 to 71). i.e. Hacking, fail in data
protection, using image, video or content without
permission etc.)
3. EU General Data Protection Regulation (GDPR)
4. The Personal Data Protection Bill, 2019 (PI & PII data
should be processed and stored)
Note:
Up to three years Imprisonment or/and fine up to 5L
Appointment of DPO (Data Protection Officer
20. WhatsApp Issue
1. WhatsApp took an objection to a traceability clause in the new IT
Rules that requires social media platforms to locate “the first
originator of the information” if required by the government.
2. Indian Rule 4(2) makes it mandatory for social media
intermediaries to trace the originator of a message or post on
their platform if required by a court or a competent authority
under Section 69A of the IT Act.
21. • Do not share your password
• Keep Changing your password frequently
• Do not click on the anonymous link from any laptop or mobile
• Don’t open any emails which comes from strangers. (It may be phishing email).
• Don’t download songs and movies
• Don’t use USB or any external devices from out sides.
• Don’t transfer data from mobile & In Mobile storage.
• “Be Aware” We monitor you through DLP and logs your daily activities.
• Apps should maintain user login and logout status as well.
Do’s & Don'ts
22. Is your email have been compromised ever
• https://haveibeenpwned.com/
• https://www.security.org/how-secure-is-my-password/
Practical
23. How to report a cyber crime in India?
https://cybercrime.gov.in/Default.aspx
For Women and Child :
complaint-mwcd@gov.in
24. Thank you
• Email ID : Kapil.Mehrotra@gmail.com
• Mobile No : 9811779881