SlideShare a Scribd company logo
Dr.N.Kala , PhD
Assistant professor & Director i/c
Office: Centre for Cyber Forensics and Information Security,
University of Madras, Chepauk, Chennai - 600005,
Tamilnadu, India
Office: nkala@unom.ac.in
Other: kalabaskar@gmail.com
Mobile Phone: 9840545967
Professional Profile
Twenty three years experience as Scientific Officer in State Forensics Sciences Department,
Tamilnadu serving in various departments. Over Seven years of experience in handling cyber
forensics cases and have been expert witness in several courts in Tamilnadu. Currently
working as Assistant Professor and Director in Charge, of the Centre for Cyber Forensics and
Information Security, University of Madras. Have participated in several conferences,
workshops, seminars. Presented papers in conferences and published articles in journals,
magazines and books. Organized workshops, seminars and special lectures, have trained Law
Enforcement Officers, Judicial officers, Teachers and students on several occasions in Cyber
Forensics.
Professional Position
July 2014 – Till Date
Director, Centre for Cyber Forensics and Information Security, University of Madras, Chennai,
India
March 2014
Assistant Professor, Centre for Cyber Forensics and Information Security, University of
Madras, Chennai, India
Feb 2008 to March 2014
Digital Forensic Examiner and a researcher.
Conducted Digital Forensic examination, data retrieval/analysis and present expert witness in
courts.
Examined different kind of Storage media (Hard Disks, Pen Drive, CD/DVD, Magnetic Tape,
Smart Cards, Digital Camera and Mobile Phone) using globally accepted tools like Encase and
FTK
MobilEdit Forensics and Paraben Device seizure, CellBrite, CellDek, Oxygen Phone Forensics
for Mobile Phone investigations.
March 1991 to Feb 2008
Analyst, examinerin conventional Forensicsinvariousfields: Explosives, Narcotics Advanced
Instruments and Toxicology to name a few.
Formal Qualification
Doctor of Philosophy, Cyber Forensics, University of Madras, Chennai, India
Master of Science in Forensic Science, University of Madras, Chennai, India
Post Graduate Diploma in Cyber Crimes and Information security
Ethical Hacking, Sans Bound Solutions Pvt. Ltd, The Networking School, Chennai
Honors Diploma in Network centered Curriculum, NIIT, Chennai.
Bachelors of Science in Chemistry, University of Madras, Chennai, India
Workand Testimony
Have conducted examination on over 250 separate cases all over Tamilnadu from different
districts, Chennai, Coimbatore, Erode, Maduari, Cuddalore and the like. Have testified as an expert
witness in Magistrate and Sessions courts in Vellore, Tuticorin, Panruti, Madurai, Tirunelveli,
Thiruvallur, Chennai.
Have conducted several forensic examination in significant investigations including : data
recovery, information leakage; software counterfeiting; fake document preparation cases; Job
racket; Nigerian Scam, embezzlement; misappropriation of funds; threatening mail; child
pornography etc.
PROFESSIONAL ASSOCIATION
NATIONAL
 Indian Society of Criminology
 Data Security Council of India
INTERNATIONAL
Member of International Institute of Certified Forensics Professionals [IICFIP]
INTERNATIONAL CERTIFICATION
 International Institute of Certified Forensic Investigation Professional (DFIP), issued by
ISDFRF, Delaware, USA
My PhD Thesis Title
Pattern Recognition Techniques in Cyber Forensics
Projects
Currently pursuing a project on “Rising Impact of Mobile Phone Forensics on Criminal
Investigation”, Startup Grant, University of Madras.
ACHIEVEMENTS
 National Award for best scientific paper in the field of Computer Forensics in the XIX All
India Forensic Sciences Conference by Directorate of Forensic Sciences, Ministry of Home
Affairs, India, held at Gandhinagar, Gujarat, 2009.
 National Award for best scientific paper in the field of Computer Forensics in the XXI
 All India Forensic Sciences Conference by Directorate of Forensic Sciences, Ministry of
Home Affairs, India, held at Aurangabad, Maharastra, 2011.
 Articles published in Digital Forensic Magazine, UK, titled "Sqlite databases: treasure
Trove of Digital Forensics" Part-I and Part- II in November, 2014 and February 2015
has been made the course material for post graduate students in George Washington
University, USA.
 Digital Forensic Investigation Professional(DFIP), issued by Information Security and
Digital Research Foundation(ISDFRF), Delaware, USA.
 Organized study tour and Visited Resource Centre for Cyber Forensics, Centre for
Advanced Computing(CDAC), Tiruvananthapuram, Kerala, January, 2015.
 Organized Study Tour for Students to attend International Information Security
Meet/Defcon, Amity University, Lucknow, Uttar Pradesh, February, 2015.
 Landmark Program: CSAP -2015, Awareness program followed by Rally and book
release:-First of its kind in India.
PUBLICATIONS
ARTICLES (TOTAL ARTICLES: 3)
 Sqlite Databases: Treasure Trove of Digital Forensics - Part I (Personal
Computers), Dr.N.Kala, , Digital Forensic Magazine, UK, Issue 21, (November, 2014), 8-9
 Sqlite Databases: Treasure Trove of Digital Forensics - Part II (Mobile
Phones), Dr.N.Kala, Digital Forensic Magazine, UK, Issue 22, (February, 2015), 8-9
 Meet the Professional, Digital Forensic Magazine, UK, Dr.N.Kala, Digital Forensic Magazine,
UK, Issue 22, (February 2015), 38-39
BOOKS (TOTAL BOOKS: 2)
 Handbook on Electronic Crime Scene Management (Basics of Computer Forensics) - for
Mobile Forensic Scientists, Forensic Sciences Department, Chennai ., N.Kala et
al, Handbook, Forensic Sciences Department, Chennai, (2010), ) 1-67
Cyber Tales, book containing short tales about being secure and safe in the digital era.
JOURNALS (TOTAL JOURNALS: 5)
 Authorship Attribution in Digital Forensic Investigation, N.Kala, Tamilnadu Prosecutors'
Journal, Vol.7.Part-XII, (December, 2005), 663,
 An Approach to formalizing Technical Investigation of Cyber Crime within Law
Enforcement, N.Kala, R.Thilagaraj, The Indian Police Journal, Vol.LX.No.1, (January-March,
2013), 90,
 Application of Digital Forensics for Reconstruction of Unrecoverable
Malware, N.Kala, Journal of Action Research and Engineering to Eradicate
Poverty,, Vol.4.No.5., (May, 2013), 280,
 A Framework for Digital Forensics in i-Devices: Jailed and Jailbroken Devices, Journal of
Advances in Library and Information Science, N.Kala, R.Thilagaraj, JALIS, vol.2.No.2., (June
2013), 82-99,
 Forensic Data Recovery: Unearthing lost DNA evidence in a Homicide Case - A Case
Study, N.Kala, Rajshree Raghunath, R.Thilagaraj, Indian Police Journal, LXI.No.3, (January,
2014), 179-186.
Articles
Cyber Crimes – Trends in the “enadu” Telugu magazine, September, 2015
Cyber Awareness Program held in Chennai – The CEO Magazine, Vol.1. Issue 3, September
2015.
SEMINAR / CONFERENCE / WORKSHOP
NATIONAL
 Forensic Science Forum – Forensic Science 1999
 National Silver Jubilee Workshop on Digital Evidence – Key resource person at University of
Madras, 2005, Topic: - Authorship Attribution in Digital Evidence
 National Workshop on Cyber Crime Prevention, Detection and Investigation, Central
 Forensic Science Laboratory, Kolkata, Ministry of Home Affairs, Government of India,
Directorate of Forensic Sciences, India and Vision India, 2005
 National Seminar on Digital Evidence, Resource Person, CPE Study Circle of SIRC of
ICAI, Kotturpuram, Adyar, May 2005, Concepts in Computer Forensics
 National Workshop on Digital Evidence, Resource Person, ISACA, Bangalore Chapter,
2006, Topic: Practical Demonstration of ENCASE TOOL.
 National Workshopon E-Crimes and Human Rights Enforcement (UGC
sponsored) - Resource Person, Department of Computer Science, Gobi Arts and Science
College, Gobichettypalayam,2007, Topic: Brand Protectionand Digital Forensics
 All India Criminology Conference, Bangalore, February, 2008
 National Seminar on Cyber Security awareness organized by NASSCOM , DSCI and
DFS held at New Delhi, 2008
 XIX All India Forensic Science conference , Gandhi Nagar, Gujarat, January, 2009
 XX All India Forensic Science Conference, Jaipur, Rajasthan, 2009
 National Seminar cum workshop on Cyber Security Issues and Strategies , Andhra
Pradesh Police Academy, Directorate of Forensic Science, New Delhi, held at
Hyderabad, 2009
 Workshop on Crime Scene Management and Emerging Technologies (CRISMET) – , Resource
Person, Forensic Sciences Department, Chennai, 2009, Topic: Emerging Trends in Digital
Forensics
 Workshop Cyber Crimes, Information Security and Digital Forensics, Cyber Society of
India, July 2010
 Seminar cum Workshop on Virtual Crimine 2010, Resource Person Society of Cyber Security,
University of Madras, 2010, Topic: Digital Forensics in Virtualization
 XXII All India Forensic Science Conference, Kashmir, July, 2012
 Workshop on Cyber Crimes in BFSI Sector, under UGC Special Assistance
Program, Resource Person, Department of
Criminology, University of Madras, 2013, Topic: Cyber
Forensics in BFSI Sector
 Workshop on Cyber Security Awareness Program (CSAP), Cyber Society of India,
Chennai, 2013
 National Conference on Enhancing Cyber Security, Best practices in Cyber Forensics,
Expertise in Cyber Law, Cyber Society of India, Chennai, 2014
 Faculty Development Program, held at University of Madras by Centre for Cyber
Forensics and Information Security, April, 2014
 Recent Trends in Cyber Crimes, Abdur Rehman University, 26 September, 2014
 IW Awareness Campaign conducted at 8 BRD, Air Force Base Station on 14 Oct 14.
 Faculty Development Program held CoEDF, Perungudi, Chennai, 19th November 2014
 National Conference on Enhancing Cyber Security, Best practices in Cyber Forensics,
Expertise in Cyber Law, Cyber Society of India, Chennai, 2014
 Seminar on Open Source Security Tools and Governance, Risk and Compliance, SETS,
Taramani, Chennai, 2014
 Special Lecture on “Digital Forensics" held on 27th August, 2014, in the Seminar on " Frauds
& Forensic Audit", Regional Training Institute, Auditors General Office, Chennai, 2014.
 CICT Sponsored Ten Days National Workshop on 02nd-12th January 2015 “Tamil
Kalvettukal Marrum Canka Ilakkiyankalil Tamilarkalin Kalai Ilakkiya Panpattu
Pativukal” Topic: Information Security of Art Objects in India.
 Special Lecture on “Cyber Forensics" held on 24th June, 2015, in the Seminar on " Frauds &
Forensic Audit", Regional Training Institute, Auditors General Office, Chennai, 2015.
 XXIII All India Forensic Science Conference, Bhopal, Madhya Pradesh, March, 2015
 SECUREXPLOIT : One Day workshop in collaboration with Saveetha Engineering
College, on 15 September, 2015
 Cyber Forensics Workshop - Two Days National Level Mega Techno-Management
Symposium “Gyan Mitra’16” during February 19-20, 2016
 Special Lecture on Mobile Phone Forensics- using electronic evidence in Investigation
and Trial, Central Bureau of Investigation, Regional Training Centre, Chennai,
February, 2016
 Workshop on Holistic Education, University of Madras, Taramani
INTERNATIONAL
 Third International Congress on Legal Medicine and Forensic Science,1989
 International Conference in E-Crimes, Gobi Arts and Science College, Gobichettypalayam,
2007
 International Conference, Defcon,Amity University, Lucknow, February, 2015
 International Information Security Meet 2015, February, 2015
 0x90 International Cyber Security Summit, March, 2015
 First International Congress, DIGIFOR,Chennai, May 1-2, 2015
 International Conference on Recent Trends in computing Technology (ICRTCT-2016),
held at University of Madras, Organized by Computer Science Department, IDE,
University of Madras, 22, 23rd Feb, 2016
 International Conference on Information Security, The Next Security Thing, NULLCON,
Goa, March, 11 and 12th, 2016
 Invited speaker, Plenary Session, Topic: Digital Forensics in IoT era, 1st International
Conference in Forensics, Medicine and Criminology, Management and Science
University[INFOMEC, 2016], Selangor, Malaysia, April 2016
Peer Reviewed Publication
1. Sqlite databases: Treasure Trove of Digital Forensics, Digital Forensic Magazine,
Part- II, UK, Issue: 22, February 2015.
2. Sqlite databases: Treasure Trove of Digital Forensics, Digital Forensic Magazine,
Part- I, UK, Issue: 21, November 2014.
3. Forensic Data Recovery – Unearthing lost DNA Evidence in a Homicide Case:
A Case Study, Indian Police Journal, Vol. LXI. No.3, July – September, 2014.
4. An approach to formalizing the technical investigation of cyber crime within Law
Enforcement, Vol.LX.No.1, January – March 2013.
5. Digital Forensics of Skype log reveals the cause of Mysterious death, XXII All India
Forensic Science Conference, Srinagar, Kashmir, 2012.
6. Evidentiary artefacts of forensic significance in i-Devices, XXII All India
Forensic Science Conference, Srinagar, Kashmir, 2012.
7. Reconstruction of Events in Digital Forensics investigation using Windows Special
Files, XXI All India Forensic Science Conference, Aurangabad, 2010
8. New Challenges in Digital Forensics Investigation, held at XX All India
Forensic Science Conference Aurangabad Maharashtra, 2010.
9. Information gleaned from Disk Forensics for the use of Magnetic Swipe Card
Reader Proceedings of the XX All India Forensic Science Conference, held at
Jaipur, Rajasthan, 2009.
10. Tracking the Device Trails in Digital Investigation - Proceedings of the XIX
All India Forensic Science Conference , held at Gandhinagar, Gujarat, 2009.
11. Human Jacket Bomb – A Case Study, Proceedings of the XIX All India Forensic
Science Conference, held at Gandhinagar, Gujarat, 2009.
12. Authorship Attribution in Digital Evidence, in the Tamil Nadu Public Prosecutors
Journal, 2005
Countries Visited
Austria, Germany, UK and USA
Foreign Labs Visited
Florida Department of Law Enforcement(FDLE), Florida.
Toxicologie Laboratory, Koln, Germany
Presentations
Delivered Lectures to Forensic Professionals Law Enforcement Professionals (Police
academy), Judicial Officers (Judicial academy), CBI, Auditors General Office and Teachers,
Educational Institutes, DSCI Chennai Chapter, Null Meet, chennai on several occasions.
 Tools to combat Cyber Forensics
 Recent Trend in Digital Forensics
 Recent Trend in Cyber Crimes
 Fraud and Forensic Audit
 Electronic Crime Scene Management
 Application of Forensic to Digital Evidence
 Tools and Techniques in Digital Forensics
 Regulation of Cyber Space
 Introduction of Computer Forensics
 Tracking the Device Trails in digital evidence
 Mobile Phone Forensics
 Credit card Frauds
 Brain Fingerprinting
Landmark Program Organized
Cyber Security Awareness Program (CSAP 2015) – first of its kind in India
Cyber Security Awareness Program(CSAP-2015) was conducted by the Centre for various
schools and colleges in Chennai, Trichy and Tiruvannamalai
CSAP 2015 Phase-I, is awareness program for the students from different schools and colleges
. First Batch was held at University of Madras – Chepauk campus. It is proposed to conduct
awareness campaign in different campus of University of Madras. Nearly 15 schools,
3 colleges and 2 universities awareness on cyber security was created. Over 6000 participants
benefited by this event. The centre has plans to extend this to other cities, districts and rural
areas as well. The students were taught about - Password security, email security - scams and
spams, Mobile security, Wifi and bluetooth security, ATM security, Pinhole cameras and CCTV
camera's.
As a part of the program, Rally was conducted on 12th sept 2015 from marina beach to Labor
statue in Chennai. The event was flagged off by M.P.Nirmala (IAS Retd) former Principal
Secretaryto Government, GovernmentofTamil Nadu, Professor.R.Thilagaraj,FormerFounder
Director of Centre for Cyber Forensics and Information security were there. Over 250
participants from colleges and universities, school students participated. There was a street
play enacted by students with concept of cyber security issues.
This was followed by a Book Release function M.P.Nirmala (IAS), C.L.Ramakrishnan, Former
DGP, Professor R.Thilagaraj, Director, COeDF, Mr.Anjaneyalu, Managing Director, CoeDF,
Dr.Ramasubramanian, CEO, Valiant Technologies, were present for the Book Release function.
Book Titled: Cyber Tales. News about this event was covered in all the media, dailies and
magazines.

More Related Content

What's hot

Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
 
Adaptive User Feedback for IR-based Traceability Recovery
Adaptive User Feedback for IR-based Traceability RecoveryAdaptive User Feedback for IR-based Traceability Recovery
Adaptive User Feedback for IR-based Traceability RecoveryAnnibale Panichella
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...Alexander Decker
 
Computation of Multi-Agent Based Relative Direction Learning Specification
Computation of Multi-Agent Based Relative Direction Learning SpecificationComputation of Multi-Agent Based Relative Direction Learning Specification
Computation of Multi-Agent Based Relative Direction Learning SpecificationS Rayhan Kabir (Hemel)
 
Dr Maqsood_Mahmud_CV May 2016 International
Dr Maqsood_Mahmud_CV   May  2016 InternationalDr Maqsood_Mahmud_CV   May  2016 International
Dr Maqsood_Mahmud_CV May 2016 InternationalDr. MAQSOOD MAHMUD, PhD.
 

What's hot (9)

Bk4301345349
Bk4301345349Bk4301345349
Bk4301345349
 
119 128
119 128119 128
119 128
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
Adaptive User Feedback for IR-based Traceability Recovery
Adaptive User Feedback for IR-based Traceability RecoveryAdaptive User Feedback for IR-based Traceability Recovery
Adaptive User Feedback for IR-based Traceability Recovery
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
 
Computation of Multi-Agent Based Relative Direction Learning Specification
Computation of Multi-Agent Based Relative Direction Learning SpecificationComputation of Multi-Agent Based Relative Direction Learning Specification
Computation of Multi-Agent Based Relative Direction Learning Specification
 
H017445260
H017445260H017445260
H017445260
 
Dr Maqsood_Mahmud_CV May 2016 International
Dr Maqsood_Mahmud_CV   May  2016 InternationalDr Maqsood_Mahmud_CV   May  2016 International
Dr Maqsood_Mahmud_CV May 2016 International
 

Viewers also liked

Name that species
Name that speciesName that species
Name that speciesjaccalder
 
Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...
Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...
Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...Ellh
 
Rotterdam School of Management, Brazil Means Business
Rotterdam School of Management, Brazil Means BusinessRotterdam School of Management, Brazil Means Business
Rotterdam School of Management, Brazil Means BusinessBrazil Means Business
 
ανοιχτο ελευθερο εκπαιδευτικο λογισμικο
ανοιχτο   ελευθερο εκπαιδευτικο λογισμικοανοιχτο   ελευθερο εκπαιδευτικο λογισμικο
ανοιχτο ελευθερο εκπαιδευτικο λογισμικοEllh
 
Oracle information age co croz-neos v2.2.
Oracle information age co croz-neos v2.2.Oracle information age co croz-neos v2.2.
Oracle information age co croz-neos v2.2.Oracle Hrvatska
 
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...jehill3
 
Celtic poetry powerpoint
Celtic poetry powerpointCeltic poetry powerpoint
Celtic poetry powerpointcarson342
 
Solving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration DilemmaSolving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration DilemmaRandy Goering
 
CanWell Program CPAC Presentation 2010
CanWell Program CPAC Presentation 2010CanWell Program CPAC Presentation 2010
CanWell Program CPAC Presentation 2010serediuk
 
Presentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto BasurasPresentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto Basurasguest0de26f4
 
Bi publisher ljiljana multicom.ppt [compatibility m
Bi publisher ljiljana  multicom.ppt [compatibility mBi publisher ljiljana  multicom.ppt [compatibility m
Bi publisher ljiljana multicom.ppt [compatibility mOracle Hrvatska
 
000267 pterygium and_topical_bevacizumab
000267 pterygium and_topical_bevacizumab000267 pterygium and_topical_bevacizumab
000267 pterygium and_topical_bevacizumabDr. Anand Sudhalkar
 
C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...
C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...
C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...Christiane
 
Congress powerpoint (final)
Congress powerpoint (final)Congress powerpoint (final)
Congress powerpoint (final)shaw swafford
 

Viewers also liked (20)

Name that species
Name that speciesName that species
Name that species
 
小売業の国際展開
小売業の国際展開小売業の国際展開
小売業の国際展開
 
Administración de contenido
Administración de contenidoAdministración de contenido
Administración de contenido
 
d
dd
d
 
Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...
Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...
Εκπαιδευτικά Σενάρια και εφαρμογές για το Νηπιαγωγείο με τη χρήση του Διαδικτ...
 
Rotterdam School of Management, Brazil Means Business
Rotterdam School of Management, Brazil Means BusinessRotterdam School of Management, Brazil Means Business
Rotterdam School of Management, Brazil Means Business
 
Outsourcing Brazil
Outsourcing BrazilOutsourcing Brazil
Outsourcing Brazil
 
ανοιχτο ελευθερο εκπαιδευτικο λογισμικο
ανοιχτο   ελευθερο εκπαιδευτικο λογισμικοανοιχτο   ελευθερο εκπαιδευτικο λογισμικο
ανοιχτο ελευθερο εκπαιδευτικο λογισμικο
 
Oracle information age co croz-neos v2.2.
Oracle information age co croz-neos v2.2.Oracle information age co croz-neos v2.2.
Oracle information age co croz-neos v2.2.
 
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
 
Celtic poetry powerpoint
Celtic poetry powerpointCeltic poetry powerpoint
Celtic poetry powerpoint
 
Solving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration DilemmaSolving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration Dilemma
 
CanWell Program CPAC Presentation 2010
CanWell Program CPAC Presentation 2010CanWell Program CPAC Presentation 2010
CanWell Program CPAC Presentation 2010
 
Presentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto BasurasPresentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto Basuras
 
Bi publisher ljiljana multicom.ppt [compatibility m
Bi publisher ljiljana  multicom.ppt [compatibility mBi publisher ljiljana  multicom.ppt [compatibility m
Bi publisher ljiljana multicom.ppt [compatibility m
 
Usa rejseindtryk
Usa   rejseindtrykUsa   rejseindtryk
Usa rejseindtryk
 
Diabetic Colour & Ffa2
Diabetic Colour & Ffa2Diabetic Colour & Ffa2
Diabetic Colour & Ffa2
 
000267 pterygium and_topical_bevacizumab
000267 pterygium and_topical_bevacizumab000267 pterygium and_topical_bevacizumab
000267 pterygium and_topical_bevacizumab
 
C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...
C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...
C:\users\chris\documents\activstudio3\chris cultura\labci presentation\labci_...
 
Congress powerpoint (final)
Congress powerpoint (final)Congress powerpoint (final)
Congress powerpoint (final)
 

Similar to Short CV of Kala(1) (1)

Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...AIRCC Publishing Corporation
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
 
Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...
Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...
Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...idsecconf
 
Top 10 Download Article in Computer Aided Technologies: October 2021
Top 10 Download Article in Computer Aided Technologies:  October 2021Top 10 Download Article in Computer Aided Technologies:  October 2021
Top 10 Download Article in Computer Aided Technologies: October 2021ijcax
 
Curriculum vitae r.vinoth
Curriculum vitae r.vinothCurriculum vitae r.vinoth
Curriculum vitae r.vinothvinoth rathinam
 
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAEDr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAEDrSUJATHARAMAKRISHNA
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
s42452-019-1312-8.pdf
s42452-019-1312-8.pdfs42452-019-1312-8.pdf
s42452-019-1312-8.pdfShubham422445
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
ICIOT 2023 Brochure.pdf
ICIOT 2023 Brochure.pdfICIOT 2023 Brochure.pdf
ICIOT 2023 Brochure.pdfssuser9dd86c
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...CSITiaesprime
 
Portfolio investment diversification.pdf
Portfolio investment diversification.pdfPortfolio investment diversification.pdf
Portfolio investment diversification.pdfSalmanKhan222894
 

Similar to Short CV of Kala(1) (1) (20)

Dr.DLSREDDY_Resume1
Dr.DLSREDDY_Resume1Dr.DLSREDDY_Resume1
Dr.DLSREDDY_Resume1
 
Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...
 
Thirunavukkarasu (2)
Thirunavukkarasu (2)Thirunavukkarasu (2)
Thirunavukkarasu (2)
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
linkedin resume
linkedin resumelinkedin resume
linkedin resume
 
Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...
Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...
Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi ...
 
Top 10 Download Article in Computer Aided Technologies: October 2021
Top 10 Download Article in Computer Aided Technologies:  October 2021Top 10 Download Article in Computer Aided Technologies:  October 2021
Top 10 Download Article in Computer Aided Technologies: October 2021
 
Curriculum vitae r.vinoth
Curriculum vitae r.vinothCurriculum vitae r.vinoth
Curriculum vitae r.vinoth
 
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAEDr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
CV
CVCV
CV
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
vijay
vijayvijay
vijay
 
FINALCV - Copy
FINALCV - CopyFINALCV - Copy
FINALCV - Copy
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
s42452-019-1312-8.pdf
s42452-019-1312-8.pdfs42452-019-1312-8.pdf
s42452-019-1312-8.pdf
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
ICIOT 2023 Brochure.pdf
ICIOT 2023 Brochure.pdfICIOT 2023 Brochure.pdf
ICIOT 2023 Brochure.pdf
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...
 
Portfolio investment diversification.pdf
Portfolio investment diversification.pdfPortfolio investment diversification.pdf
Portfolio investment diversification.pdf
 

Short CV of Kala(1) (1)

  • 1. Dr.N.Kala , PhD Assistant professor & Director i/c Office: Centre for Cyber Forensics and Information Security, University of Madras, Chepauk, Chennai - 600005, Tamilnadu, India Office: nkala@unom.ac.in Other: kalabaskar@gmail.com Mobile Phone: 9840545967 Professional Profile Twenty three years experience as Scientific Officer in State Forensics Sciences Department, Tamilnadu serving in various departments. Over Seven years of experience in handling cyber forensics cases and have been expert witness in several courts in Tamilnadu. Currently working as Assistant Professor and Director in Charge, of the Centre for Cyber Forensics and Information Security, University of Madras. Have participated in several conferences, workshops, seminars. Presented papers in conferences and published articles in journals, magazines and books. Organized workshops, seminars and special lectures, have trained Law Enforcement Officers, Judicial officers, Teachers and students on several occasions in Cyber Forensics. Professional Position July 2014 – Till Date Director, Centre for Cyber Forensics and Information Security, University of Madras, Chennai, India March 2014 Assistant Professor, Centre for Cyber Forensics and Information Security, University of Madras, Chennai, India Feb 2008 to March 2014 Digital Forensic Examiner and a researcher. Conducted Digital Forensic examination, data retrieval/analysis and present expert witness in courts. Examined different kind of Storage media (Hard Disks, Pen Drive, CD/DVD, Magnetic Tape, Smart Cards, Digital Camera and Mobile Phone) using globally accepted tools like Encase and FTK
  • 2. MobilEdit Forensics and Paraben Device seizure, CellBrite, CellDek, Oxygen Phone Forensics for Mobile Phone investigations. March 1991 to Feb 2008 Analyst, examinerin conventional Forensicsinvariousfields: Explosives, Narcotics Advanced Instruments and Toxicology to name a few. Formal Qualification Doctor of Philosophy, Cyber Forensics, University of Madras, Chennai, India Master of Science in Forensic Science, University of Madras, Chennai, India Post Graduate Diploma in Cyber Crimes and Information security Ethical Hacking, Sans Bound Solutions Pvt. Ltd, The Networking School, Chennai Honors Diploma in Network centered Curriculum, NIIT, Chennai. Bachelors of Science in Chemistry, University of Madras, Chennai, India Workand Testimony Have conducted examination on over 250 separate cases all over Tamilnadu from different districts, Chennai, Coimbatore, Erode, Maduari, Cuddalore and the like. Have testified as an expert witness in Magistrate and Sessions courts in Vellore, Tuticorin, Panruti, Madurai, Tirunelveli, Thiruvallur, Chennai. Have conducted several forensic examination in significant investigations including : data recovery, information leakage; software counterfeiting; fake document preparation cases; Job racket; Nigerian Scam, embezzlement; misappropriation of funds; threatening mail; child pornography etc. PROFESSIONAL ASSOCIATION NATIONAL  Indian Society of Criminology  Data Security Council of India INTERNATIONAL Member of International Institute of Certified Forensics Professionals [IICFIP] INTERNATIONAL CERTIFICATION  International Institute of Certified Forensic Investigation Professional (DFIP), issued by ISDFRF, Delaware, USA
  • 3. My PhD Thesis Title Pattern Recognition Techniques in Cyber Forensics Projects Currently pursuing a project on “Rising Impact of Mobile Phone Forensics on Criminal Investigation”, Startup Grant, University of Madras. ACHIEVEMENTS  National Award for best scientific paper in the field of Computer Forensics in the XIX All India Forensic Sciences Conference by Directorate of Forensic Sciences, Ministry of Home Affairs, India, held at Gandhinagar, Gujarat, 2009.  National Award for best scientific paper in the field of Computer Forensics in the XXI  All India Forensic Sciences Conference by Directorate of Forensic Sciences, Ministry of Home Affairs, India, held at Aurangabad, Maharastra, 2011.  Articles published in Digital Forensic Magazine, UK, titled "Sqlite databases: treasure Trove of Digital Forensics" Part-I and Part- II in November, 2014 and February 2015 has been made the course material for post graduate students in George Washington University, USA.  Digital Forensic Investigation Professional(DFIP), issued by Information Security and Digital Research Foundation(ISDFRF), Delaware, USA.  Organized study tour and Visited Resource Centre for Cyber Forensics, Centre for Advanced Computing(CDAC), Tiruvananthapuram, Kerala, January, 2015.  Organized Study Tour for Students to attend International Information Security Meet/Defcon, Amity University, Lucknow, Uttar Pradesh, February, 2015.  Landmark Program: CSAP -2015, Awareness program followed by Rally and book release:-First of its kind in India. PUBLICATIONS ARTICLES (TOTAL ARTICLES: 3)  Sqlite Databases: Treasure Trove of Digital Forensics - Part I (Personal Computers), Dr.N.Kala, , Digital Forensic Magazine, UK, Issue 21, (November, 2014), 8-9  Sqlite Databases: Treasure Trove of Digital Forensics - Part II (Mobile Phones), Dr.N.Kala, Digital Forensic Magazine, UK, Issue 22, (February, 2015), 8-9  Meet the Professional, Digital Forensic Magazine, UK, Dr.N.Kala, Digital Forensic Magazine, UK, Issue 22, (February 2015), 38-39 BOOKS (TOTAL BOOKS: 2)  Handbook on Electronic Crime Scene Management (Basics of Computer Forensics) - for Mobile Forensic Scientists, Forensic Sciences Department, Chennai ., N.Kala et al, Handbook, Forensic Sciences Department, Chennai, (2010), ) 1-67
  • 4. Cyber Tales, book containing short tales about being secure and safe in the digital era. JOURNALS (TOTAL JOURNALS: 5)  Authorship Attribution in Digital Forensic Investigation, N.Kala, Tamilnadu Prosecutors' Journal, Vol.7.Part-XII, (December, 2005), 663,  An Approach to formalizing Technical Investigation of Cyber Crime within Law Enforcement, N.Kala, R.Thilagaraj, The Indian Police Journal, Vol.LX.No.1, (January-March, 2013), 90,  Application of Digital Forensics for Reconstruction of Unrecoverable Malware, N.Kala, Journal of Action Research and Engineering to Eradicate Poverty,, Vol.4.No.5., (May, 2013), 280,  A Framework for Digital Forensics in i-Devices: Jailed and Jailbroken Devices, Journal of Advances in Library and Information Science, N.Kala, R.Thilagaraj, JALIS, vol.2.No.2., (June 2013), 82-99,  Forensic Data Recovery: Unearthing lost DNA evidence in a Homicide Case - A Case Study, N.Kala, Rajshree Raghunath, R.Thilagaraj, Indian Police Journal, LXI.No.3, (January, 2014), 179-186. Articles Cyber Crimes – Trends in the “enadu” Telugu magazine, September, 2015 Cyber Awareness Program held in Chennai – The CEO Magazine, Vol.1. Issue 3, September 2015. SEMINAR / CONFERENCE / WORKSHOP NATIONAL  Forensic Science Forum – Forensic Science 1999  National Silver Jubilee Workshop on Digital Evidence – Key resource person at University of Madras, 2005, Topic: - Authorship Attribution in Digital Evidence  National Workshop on Cyber Crime Prevention, Detection and Investigation, Central  Forensic Science Laboratory, Kolkata, Ministry of Home Affairs, Government of India, Directorate of Forensic Sciences, India and Vision India, 2005  National Seminar on Digital Evidence, Resource Person, CPE Study Circle of SIRC of ICAI, Kotturpuram, Adyar, May 2005, Concepts in Computer Forensics  National Workshop on Digital Evidence, Resource Person, ISACA, Bangalore Chapter, 2006, Topic: Practical Demonstration of ENCASE TOOL.
  • 5.  National Workshopon E-Crimes and Human Rights Enforcement (UGC sponsored) - Resource Person, Department of Computer Science, Gobi Arts and Science College, Gobichettypalayam,2007, Topic: Brand Protectionand Digital Forensics  All India Criminology Conference, Bangalore, February, 2008  National Seminar on Cyber Security awareness organized by NASSCOM , DSCI and DFS held at New Delhi, 2008  XIX All India Forensic Science conference , Gandhi Nagar, Gujarat, January, 2009  XX All India Forensic Science Conference, Jaipur, Rajasthan, 2009  National Seminar cum workshop on Cyber Security Issues and Strategies , Andhra Pradesh Police Academy, Directorate of Forensic Science, New Delhi, held at Hyderabad, 2009  Workshop on Crime Scene Management and Emerging Technologies (CRISMET) – , Resource Person, Forensic Sciences Department, Chennai, 2009, Topic: Emerging Trends in Digital Forensics  Workshop Cyber Crimes, Information Security and Digital Forensics, Cyber Society of India, July 2010  Seminar cum Workshop on Virtual Crimine 2010, Resource Person Society of Cyber Security, University of Madras, 2010, Topic: Digital Forensics in Virtualization  XXII All India Forensic Science Conference, Kashmir, July, 2012  Workshop on Cyber Crimes in BFSI Sector, under UGC Special Assistance Program, Resource Person, Department of Criminology, University of Madras, 2013, Topic: Cyber Forensics in BFSI Sector  Workshop on Cyber Security Awareness Program (CSAP), Cyber Society of India, Chennai, 2013  National Conference on Enhancing Cyber Security, Best practices in Cyber Forensics, Expertise in Cyber Law, Cyber Society of India, Chennai, 2014  Faculty Development Program, held at University of Madras by Centre for Cyber Forensics and Information Security, April, 2014  Recent Trends in Cyber Crimes, Abdur Rehman University, 26 September, 2014  IW Awareness Campaign conducted at 8 BRD, Air Force Base Station on 14 Oct 14.  Faculty Development Program held CoEDF, Perungudi, Chennai, 19th November 2014  National Conference on Enhancing Cyber Security, Best practices in Cyber Forensics, Expertise in Cyber Law, Cyber Society of India, Chennai, 2014  Seminar on Open Source Security Tools and Governance, Risk and Compliance, SETS, Taramani, Chennai, 2014  Special Lecture on “Digital Forensics" held on 27th August, 2014, in the Seminar on " Frauds & Forensic Audit", Regional Training Institute, Auditors General Office, Chennai, 2014.  CICT Sponsored Ten Days National Workshop on 02nd-12th January 2015 “Tamil Kalvettukal Marrum Canka Ilakkiyankalil Tamilarkalin Kalai Ilakkiya Panpattu Pativukal” Topic: Information Security of Art Objects in India.  Special Lecture on “Cyber Forensics" held on 24th June, 2015, in the Seminar on " Frauds & Forensic Audit", Regional Training Institute, Auditors General Office, Chennai, 2015.  XXIII All India Forensic Science Conference, Bhopal, Madhya Pradesh, March, 2015  SECUREXPLOIT : One Day workshop in collaboration with Saveetha Engineering College, on 15 September, 2015
  • 6.  Cyber Forensics Workshop - Two Days National Level Mega Techno-Management Symposium “Gyan Mitra’16” during February 19-20, 2016  Special Lecture on Mobile Phone Forensics- using electronic evidence in Investigation and Trial, Central Bureau of Investigation, Regional Training Centre, Chennai, February, 2016  Workshop on Holistic Education, University of Madras, Taramani INTERNATIONAL  Third International Congress on Legal Medicine and Forensic Science,1989  International Conference in E-Crimes, Gobi Arts and Science College, Gobichettypalayam, 2007  International Conference, Defcon,Amity University, Lucknow, February, 2015  International Information Security Meet 2015, February, 2015  0x90 International Cyber Security Summit, March, 2015  First International Congress, DIGIFOR,Chennai, May 1-2, 2015  International Conference on Recent Trends in computing Technology (ICRTCT-2016), held at University of Madras, Organized by Computer Science Department, IDE, University of Madras, 22, 23rd Feb, 2016  International Conference on Information Security, The Next Security Thing, NULLCON, Goa, March, 11 and 12th, 2016  Invited speaker, Plenary Session, Topic: Digital Forensics in IoT era, 1st International Conference in Forensics, Medicine and Criminology, Management and Science University[INFOMEC, 2016], Selangor, Malaysia, April 2016 Peer Reviewed Publication 1. Sqlite databases: Treasure Trove of Digital Forensics, Digital Forensic Magazine, Part- II, UK, Issue: 22, February 2015. 2. Sqlite databases: Treasure Trove of Digital Forensics, Digital Forensic Magazine, Part- I, UK, Issue: 21, November 2014. 3. Forensic Data Recovery – Unearthing lost DNA Evidence in a Homicide Case: A Case Study, Indian Police Journal, Vol. LXI. No.3, July – September, 2014. 4. An approach to formalizing the technical investigation of cyber crime within Law Enforcement, Vol.LX.No.1, January – March 2013. 5. Digital Forensics of Skype log reveals the cause of Mysterious death, XXII All India Forensic Science Conference, Srinagar, Kashmir, 2012. 6. Evidentiary artefacts of forensic significance in i-Devices, XXII All India Forensic Science Conference, Srinagar, Kashmir, 2012. 7. Reconstruction of Events in Digital Forensics investigation using Windows Special Files, XXI All India Forensic Science Conference, Aurangabad, 2010
  • 7. 8. New Challenges in Digital Forensics Investigation, held at XX All India Forensic Science Conference Aurangabad Maharashtra, 2010. 9. Information gleaned from Disk Forensics for the use of Magnetic Swipe Card Reader Proceedings of the XX All India Forensic Science Conference, held at Jaipur, Rajasthan, 2009. 10. Tracking the Device Trails in Digital Investigation - Proceedings of the XIX All India Forensic Science Conference , held at Gandhinagar, Gujarat, 2009. 11. Human Jacket Bomb – A Case Study, Proceedings of the XIX All India Forensic Science Conference, held at Gandhinagar, Gujarat, 2009. 12. Authorship Attribution in Digital Evidence, in the Tamil Nadu Public Prosecutors Journal, 2005 Countries Visited Austria, Germany, UK and USA Foreign Labs Visited Florida Department of Law Enforcement(FDLE), Florida. Toxicologie Laboratory, Koln, Germany Presentations Delivered Lectures to Forensic Professionals Law Enforcement Professionals (Police academy), Judicial Officers (Judicial academy), CBI, Auditors General Office and Teachers, Educational Institutes, DSCI Chennai Chapter, Null Meet, chennai on several occasions.  Tools to combat Cyber Forensics  Recent Trend in Digital Forensics  Recent Trend in Cyber Crimes  Fraud and Forensic Audit  Electronic Crime Scene Management  Application of Forensic to Digital Evidence  Tools and Techniques in Digital Forensics  Regulation of Cyber Space  Introduction of Computer Forensics  Tracking the Device Trails in digital evidence  Mobile Phone Forensics  Credit card Frauds  Brain Fingerprinting Landmark Program Organized Cyber Security Awareness Program (CSAP 2015) – first of its kind in India
  • 8. Cyber Security Awareness Program(CSAP-2015) was conducted by the Centre for various schools and colleges in Chennai, Trichy and Tiruvannamalai CSAP 2015 Phase-I, is awareness program for the students from different schools and colleges . First Batch was held at University of Madras – Chepauk campus. It is proposed to conduct awareness campaign in different campus of University of Madras. Nearly 15 schools, 3 colleges and 2 universities awareness on cyber security was created. Over 6000 participants benefited by this event. The centre has plans to extend this to other cities, districts and rural areas as well. The students were taught about - Password security, email security - scams and spams, Mobile security, Wifi and bluetooth security, ATM security, Pinhole cameras and CCTV camera's. As a part of the program, Rally was conducted on 12th sept 2015 from marina beach to Labor statue in Chennai. The event was flagged off by M.P.Nirmala (IAS Retd) former Principal Secretaryto Government, GovernmentofTamil Nadu, Professor.R.Thilagaraj,FormerFounder Director of Centre for Cyber Forensics and Information security were there. Over 250 participants from colleges and universities, school students participated. There was a street play enacted by students with concept of cyber security issues. This was followed by a Book Release function M.P.Nirmala (IAS), C.L.Ramakrishnan, Former DGP, Professor R.Thilagaraj, Director, COeDF, Mr.Anjaneyalu, Managing Director, CoeDF, Dr.Ramasubramanian, CEO, Valiant Technologies, were present for the Book Release function. Book Titled: Cyber Tales. News about this event was covered in all the media, dailies and magazines.