SlideShare a Scribd company logo
What Do You Think?
Security is a journey?
Or
A destination?
According to Microsoft Vice President Dave Thompson,
“Security is a journey, not a destination.”
“Study on Cyber Security:
Establishing a Sustainable Cyber Security
Framework for University Automation System”
Presentation on
Supervised By
M.M. Rakibul Hasan
Lecturer
Department of Computer Science and Engineering
Prepared By
Rihab Rahman
ID: SECRET
Program: BCSE
Kaisary Zaman
ID: SECRET
Program: BCSE
Table of Content
Introduction
Background of Study
Problem Statement
Rationale of Study
Research Objective
Research Methodology
Data analysis tools
Test and Evaluation
Plan of Work
Time Schedule
Cost Estimation
Limitation of research work
Future Works of the
Research
Conclusion
Bibliography
3
Introduction
 Cyberspace
 Security
 Cyber Security
 Security Framework
 University Automation Systems
4
Data Security - The process of protecting the data from
unauthorized users, preventing alterations and restricting the
access of sensitive information[1].
5
Background of Study
Background of Study
Some Security Frameworks
6
Problem Statement
Privileged information should be easy accessible
for the students, teachers and stuffs but in a
controlled manner with proper monitoring.
7
Rationale of Study
To let people know about the importance of cyber security
because in today’s technology-based world is a very vast
thing.
To cope up with this situation we should read this paper
titled as “Study on Cyber Security: Establishing a Cyber
Security Framework for University Automation System.”
It will be helpful to develop idea and model about information
security of university level institution.
8
Research Objective
Broad Objective: The broad objective of our research is to propose a
cyber security framework for the university automation system so that
we can ensure the safety of the confidential information of the
university.
9
Specific Objective:
1.Identify the sensitive and confidential information to protect.
2.Identify whose are the stakeholder of the sensitive and confidential
..information.
3.Identify lacking and security threats of running automation system.
4.Propose a security framework to ensure the future safety of the
system
Research Methodology
As we are studying on some frameworks to propose a new one
therefore, we are following comparative research methodologies.
It studies to identify, analyses and explain similarities and
differences across various cyber security frameworks.
10
Collect
Data
Study
Existing
Security
Framework
Propose
New
Framework
Check
efficiency
of new
framework
Get final
Result
Figure: Sequence of Research Work
Data Analysis Tools
Google Forms
MS Excel
MS Word
MS PowerPoint
SurveyMoneky
11
Test and Evaluation
Collect some data security models to study on their efficiencies,
….advantages and limitation
Propose a model with comparatively less limitations
Test the proposed method with real life situation to justify the ….
…. efficiencies, advantages and usability than pervious models. 12
Plan of Work
Step 1: Area specification.
Step 2: Identify the Problem.
Step 3: Review the Literature.
Step 4: Methodology – interview, observations.
Step 5: Develop criteria's to compare.
Step 5: Analysis and interpreting data.
Step 6: Documenting Result & evaluation.
Step 7: Conclusion and recommendation. 13
Time Schedule
14
Work List / Week Distributions
Feb Mar Apr May June July Aug Sep
Area Specification
Identify the Problem
Review the Literature
Methodology – Interview, Observation
Develop Criteria’s to Compare
Analysis & Interpreting Data
Documenting Result & Evaluation
Conclusion and Recommendation
Cost Estimation
15
SL Purpose of Cost Approximate Cost
1 Transportation 3,000 /=
2 Hardware 10,000 /=
3 Analyzing Resources 6,000 /=
4 Printing and Binding 1,000 /=
Total Cost 20,000 /=
Limitation of the Research Work
Not getting permission for collecting all the required information.
Less resources for conducting the research.
Lack of required technologies to analysis data and
Not getting real life environment to test the framework.
16
Future Works of the Research
Properly utilize the given time period.
Perform all the formalities to get access of necessary
information to work on for the research.
Be sure of the required resources to conduct the research
and therefore collect them accordingly.
Revise and evaluate the research work time to time for better
correctness and appropriateness.
17
Conclusion
By completing the research we will discover about the security
threats that may corrupt the confidential information of university
automation system. We will do a comparative search among the
security frameworks and therefore we will propose a new model
that will be more efficient and effective to ensure data security of
university level large institution.
18
Bibliography
1. Laudon, Kenneth C., and Jane Price Laudon. Management Information
Systems: Managing the Digital Firm. Verlag Nicht Ermittelbar, 2014.
2. Thuraisingham, Dr. Bhavani. “Data and Applications Security: Developments
and Directions.” Annual International Computer Software and Applications
Conference , 2002.
3. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in
Cloud Computing. "IEEE International Conference on Circuits and Systems
(2017):76-81.
4. Mindmajix. “List Of Cybersecurity Frameworks.” Mindmajix, Mindmajix
Technologies INC, 7 Sept. 2017, mindmajix.com/cyber-security-
frameworks
19
Bibliography
5. Aviel , Rubin D. and Geer Jr Daniel E. "A Survey of Web Security." IEEE
International Symposium on Advanced Research (1998): 34-41.
6. Craggs, Barnaby and Rashid Awais. "Smart Cyber-Physical Systems:
Beyond Usable." ACM 3rd International Workshop on Software
Engineering for Smart Cyber-Physical Systems (2017).
7. Nader, Sohrabi Safa, et al. "Information security collaboration formation
in organisations." IET Information Security (2018): 238-245. Document.
8. Wade , Baker H. and Wallace Linda. "Is Information Security Under
Control? Investigating Quality in Information Security Management."
IEEE COMPUTER SOCIETY (2007): 36-44. Document. 23 April 2019.
20
Bibliography
9. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in
Cloud Computing." IEEE International Conference on Circuits and Systems
(2017): 76-81.
10.Techopedia. Cybersecurity. 10 March 2018. Online. 10 March 2019.
<https://www.techopedia.com/definition/24747/cybersecurity>.
11. Ward, R. and P Skeffington. "Network Management Security." IEEE
(1990): 173-180.
12.Wikipedia. Cyberspace. 13 February 2019. Digital. 10 March 2019.
<https://en.wikipedia.org/wiki/Cyberspace>.
13.Wikipedia.. Security. 6 March 2019. Online. 10 March 2019.
<https://en.wikipedia.org/wiki/Security>.
21
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System

More Related Content

What's hot

44
4444
Big Data becomes Big Analysis
Big Data becomes Big Analysis Big Data becomes Big Analysis
Big Data becomes Big Analysis
OSTHUS
 
Cybersecurity Safety
Cybersecurity SafetyCybersecurity Safety
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
Michigan State University Research
 
AI is the Future of Drug Discovery
AI is the Future of Drug DiscoveryAI is the Future of Drug Discovery
AI is the Future of Drug Discovery
David Leahy
 
Data lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseData lifecycle mgt across the enterprise
Data lifecycle mgt across the enterprise
OSTHUS
 
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
William Gunn
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the Cloud
PaaSword EU Project
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cybera Inc.
 
Running Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and EthicsRunning Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and Ethics
Lancaster University Library
 
NetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana MilenkovicNetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana Milenkovic
Alexander Pico
 
cloudComputing_ProjectJunior
cloudComputing_ProjectJuniorcloudComputing_ProjectJunior
cloudComputing_ProjectJuniorDominic Searson
 
Challenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life SciencesChallenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life Sciences
OSTHUS
 
From allotrope to reference master data management
From allotrope to reference master data management From allotrope to reference master data management
From allotrope to reference master data management
OSTHUS
 
LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021
Sean Manion PhD
 
Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks
Alexander Pico
 
Expert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with UnileverExpert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with Unilever
Eagle Genomics
 
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
Robert Oostenveld
 

What's hot (20)

44
4444
44
 
Big Data becomes Big Analysis
Big Data becomes Big Analysis Big Data becomes Big Analysis
Big Data becomes Big Analysis
 
Cybersecurity Safety
Cybersecurity SafetyCybersecurity Safety
Cybersecurity Safety
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
 
AI is the Future of Drug Discovery
AI is the Future of Drug DiscoveryAI is the Future of Drug Discovery
AI is the Future of Drug Discovery
 
Data lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseData lifecycle mgt across the enterprise
Data lifecycle mgt across the enterprise
 
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the Cloud
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
 
Running Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and EthicsRunning Research as a Service. Implications for Privacy Policies and Ethics
Running Research as a Service. Implications for Privacy Policies and Ethics
 
NetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana MilenkovicNetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana Milenkovic
 
cloudComputing_ProjectJunior
cloudComputing_ProjectJuniorcloudComputing_ProjectJunior
cloudComputing_ProjectJunior
 
Challenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life SciencesChallenges & Opportunities of Implementation FAIR in Life Sciences
Challenges & Opportunities of Implementation FAIR in Life Sciences
 
From allotrope to reference master data management
From allotrope to reference master data management From allotrope to reference master data management
From allotrope to reference master data management
 
LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021LASYR Slides IEEE event 07 APR 2021
LASYR Slides IEEE event 07 APR 2021
 
Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks Visualization and Analysis of Dynamic Networks
Visualization and Analysis of Dynamic Networks
 
Doc
DocDoc
Doc
 
Expert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with UnileverExpert panel on industrialising microbiomics - with Unilever
Expert panel on industrialising microbiomics - with Unilever
 
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...
 

Similar to Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System

ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
toolboc
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
FACE
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
guesta67d4a
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
Fred Kautz
 
Bin saleem
Bin saleemBin saleem
Bin saleemanesah
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Fat-Thing Gabriel-Culley
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2Abi Reddy
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
David Sweigert
 
Big Data and Cloud Readiness
Big Data and Cloud ReadinessBig Data and Cloud Readiness
Big Data and Cloud Readiness
AIRCC Publishing Corporation
 
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESSBIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
ijcsit
 
Step 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docxStep 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docx
whitneyleman54422
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
Chadni Islam
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination Systems
IOSR Journals
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
roushhsiu
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
ijseajournal
 
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
Anita Miller
 
Systematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk AssessmentSystematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk Assessment
Ade Ajasa
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPL
csandit
 

Similar to Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System (20)

De carlo rizk 2010 icelw
De carlo rizk 2010 icelwDe carlo rizk 2010 icelw
De carlo rizk 2010 icelw
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
 
De carlo rizk 2010 icelw
De carlo rizk 2010 icelwDe carlo rizk 2010 icelw
De carlo rizk 2010 icelw
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Bin saleem
Bin saleemBin saleem
Bin saleem
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
Big Data and Cloud Readiness
Big Data and Cloud ReadinessBig Data and Cloud Readiness
Big Data and Cloud Readiness
 
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESSBIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
 
Step 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docxStep 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docx
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination Systems
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
 
Systematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk AssessmentSystematic Literature Review of Information Security Risk Assessment
Systematic Literature Review of Information Security Risk Assessment
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPL
 

More from Rihab Rahman

Presentation on House Rent Management System
Presentation on House Rent Management SystemPresentation on House Rent Management System
Presentation on House Rent Management System
Rihab Rahman
 
Presentation on Transmission Media & Switching
Presentation on Transmission Media & SwitchingPresentation on Transmission Media & Switching
Presentation on Transmission Media & Switching
Rihab Rahman
 
Presentation on Automated Prescription Management System
Presentation on Automated Prescription Management SystemPresentation on Automated Prescription Management System
Presentation on Automated Prescription Management System
Rihab Rahman
 
Global Warming Poster Presentation
Global Warming Poster PresentationGlobal Warming Poster Presentation
Global Warming Poster Presentation
Rihab Rahman
 
Impact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladeshImpact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladesh
Rihab Rahman
 
Display Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment DisplayDisplay Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment Display
Rihab Rahman
 
Display a Character on a 7 Segment Display
Display a Character on a 7 Segment DisplayDisplay a Character on a 7 Segment Display
Display a Character on a 7 Segment Display
Rihab Rahman
 
Blinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a PortBlinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a Port
Rihab Rahman
 
Blinking a Single LED
Blinking a Single LEDBlinking a Single LED
Blinking a Single LED
Rihab Rahman
 
Combinational logic circuit
Combinational logic circuitCombinational logic circuit
Combinational logic circuit
Rihab Rahman
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
Rihab Rahman
 
Bernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with StakeholdersBernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with Stakeholders
Rihab Rahman
 

More from Rihab Rahman (12)

Presentation on House Rent Management System
Presentation on House Rent Management SystemPresentation on House Rent Management System
Presentation on House Rent Management System
 
Presentation on Transmission Media & Switching
Presentation on Transmission Media & SwitchingPresentation on Transmission Media & Switching
Presentation on Transmission Media & Switching
 
Presentation on Automated Prescription Management System
Presentation on Automated Prescription Management SystemPresentation on Automated Prescription Management System
Presentation on Automated Prescription Management System
 
Global Warming Poster Presentation
Global Warming Poster PresentationGlobal Warming Poster Presentation
Global Warming Poster Presentation
 
Impact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladeshImpact of technology in agricultural sector of bangladesh
Impact of technology in agricultural sector of bangladesh
 
Display Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment DisplayDisplay Characters of a String one by One on a 7 Segment Display
Display Characters of a String one by One on a 7 Segment Display
 
Display a Character on a 7 Segment Display
Display a Character on a 7 Segment DisplayDisplay a Character on a 7 Segment Display
Display a Character on a 7 Segment Display
 
Blinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a PortBlinking LED's Animation Connected to a Port
Blinking LED's Animation Connected to a Port
 
Blinking a Single LED
Blinking a Single LEDBlinking a Single LED
Blinking a Single LED
 
Combinational logic circuit
Combinational logic circuitCombinational logic circuit
Combinational logic circuit
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
Bernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with StakeholdersBernard Matthews Communicating with Stakeholders
Bernard Matthews Communicating with Stakeholders
 

Recently uploaded

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System

  • 1. What Do You Think? Security is a journey? Or A destination? According to Microsoft Vice President Dave Thompson, “Security is a journey, not a destination.”
  • 2. “Study on Cyber Security: Establishing a Sustainable Cyber Security Framework for University Automation System” Presentation on Supervised By M.M. Rakibul Hasan Lecturer Department of Computer Science and Engineering Prepared By Rihab Rahman ID: SECRET Program: BCSE Kaisary Zaman ID: SECRET Program: BCSE
  • 3. Table of Content Introduction Background of Study Problem Statement Rationale of Study Research Objective Research Methodology Data analysis tools Test and Evaluation Plan of Work Time Schedule Cost Estimation Limitation of research work Future Works of the Research Conclusion Bibliography 3
  • 4. Introduction  Cyberspace  Security  Cyber Security  Security Framework  University Automation Systems 4
  • 5. Data Security - The process of protecting the data from unauthorized users, preventing alterations and restricting the access of sensitive information[1]. 5 Background of Study
  • 6. Background of Study Some Security Frameworks 6
  • 7. Problem Statement Privileged information should be easy accessible for the students, teachers and stuffs but in a controlled manner with proper monitoring. 7
  • 8. Rationale of Study To let people know about the importance of cyber security because in today’s technology-based world is a very vast thing. To cope up with this situation we should read this paper titled as “Study on Cyber Security: Establishing a Cyber Security Framework for University Automation System.” It will be helpful to develop idea and model about information security of university level institution. 8
  • 9. Research Objective Broad Objective: The broad objective of our research is to propose a cyber security framework for the university automation system so that we can ensure the safety of the confidential information of the university. 9 Specific Objective: 1.Identify the sensitive and confidential information to protect. 2.Identify whose are the stakeholder of the sensitive and confidential ..information. 3.Identify lacking and security threats of running automation system. 4.Propose a security framework to ensure the future safety of the system
  • 10. Research Methodology As we are studying on some frameworks to propose a new one therefore, we are following comparative research methodologies. It studies to identify, analyses and explain similarities and differences across various cyber security frameworks. 10 Collect Data Study Existing Security Framework Propose New Framework Check efficiency of new framework Get final Result Figure: Sequence of Research Work
  • 11. Data Analysis Tools Google Forms MS Excel MS Word MS PowerPoint SurveyMoneky 11
  • 12. Test and Evaluation Collect some data security models to study on their efficiencies, ….advantages and limitation Propose a model with comparatively less limitations Test the proposed method with real life situation to justify the …. …. efficiencies, advantages and usability than pervious models. 12
  • 13. Plan of Work Step 1: Area specification. Step 2: Identify the Problem. Step 3: Review the Literature. Step 4: Methodology – interview, observations. Step 5: Develop criteria's to compare. Step 5: Analysis and interpreting data. Step 6: Documenting Result & evaluation. Step 7: Conclusion and recommendation. 13
  • 14. Time Schedule 14 Work List / Week Distributions Feb Mar Apr May June July Aug Sep Area Specification Identify the Problem Review the Literature Methodology – Interview, Observation Develop Criteria’s to Compare Analysis & Interpreting Data Documenting Result & Evaluation Conclusion and Recommendation
  • 15. Cost Estimation 15 SL Purpose of Cost Approximate Cost 1 Transportation 3,000 /= 2 Hardware 10,000 /= 3 Analyzing Resources 6,000 /= 4 Printing and Binding 1,000 /= Total Cost 20,000 /=
  • 16. Limitation of the Research Work Not getting permission for collecting all the required information. Less resources for conducting the research. Lack of required technologies to analysis data and Not getting real life environment to test the framework. 16
  • 17. Future Works of the Research Properly utilize the given time period. Perform all the formalities to get access of necessary information to work on for the research. Be sure of the required resources to conduct the research and therefore collect them accordingly. Revise and evaluate the research work time to time for better correctness and appropriateness. 17
  • 18. Conclusion By completing the research we will discover about the security threats that may corrupt the confidential information of university automation system. We will do a comparative search among the security frameworks and therefore we will propose a new model that will be more efficient and effective to ensure data security of university level large institution. 18
  • 19. Bibliography 1. Laudon, Kenneth C., and Jane Price Laudon. Management Information Systems: Managing the Digital Firm. Verlag Nicht Ermittelbar, 2014. 2. Thuraisingham, Dr. Bhavani. “Data and Applications Security: Developments and Directions.” Annual International Computer Software and Applications Conference , 2002. 3. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in Cloud Computing. "IEEE International Conference on Circuits and Systems (2017):76-81. 4. Mindmajix. “List Of Cybersecurity Frameworks.” Mindmajix, Mindmajix Technologies INC, 7 Sept. 2017, mindmajix.com/cyber-security- frameworks 19
  • 20. Bibliography 5. Aviel , Rubin D. and Geer Jr Daniel E. "A Survey of Web Security." IEEE International Symposium on Advanced Research (1998): 34-41. 6. Craggs, Barnaby and Rashid Awais. "Smart Cyber-Physical Systems: Beyond Usable." ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (2017). 7. Nader, Sohrabi Safa, et al. "Information security collaboration formation in organisations." IET Information Security (2018): 238-245. Document. 8. Wade , Baker H. and Wallace Linda. "Is Information Security Under Control? Investigating Quality in Information Security Management." IEEE COMPUTER SOCIETY (2007): 36-44. Document. 23 April 2019. 20
  • 21. Bibliography 9. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in Cloud Computing." IEEE International Conference on Circuits and Systems (2017): 76-81. 10.Techopedia. Cybersecurity. 10 March 2018. Online. 10 March 2019. <https://www.techopedia.com/definition/24747/cybersecurity>. 11. Ward, R. and P Skeffington. "Network Management Security." IEEE (1990): 173-180. 12.Wikipedia. Cyberspace. 13 February 2019. Digital. 10 March 2019. <https://en.wikipedia.org/wiki/Cyberspace>. 13.Wikipedia.. Security. 6 March 2019. Online. 10 March 2019. <https://en.wikipedia.org/wiki/Security>. 21