Presentation Material
Presentation
Video
Abstract
Description: With the development of technology, the interdependence of various infrastructures has increased, which also enhanced their vulnerabilities. The National Information Infrastructure security concerns the nation’s stability and economic security. So far, the research in Internet security primarily focused on securing the information rather than securing the infrastructure itself.
The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber attacks we need immediate solutions for securing the Internet infrastructure. Given the prevailing threat situation, there is a compelling need to develop Hardware redesign architectures, Algorithms, and Protocols to realize a dependable Internet infrastructure. In order to achieve this goal, the first and foremost step is to develop a comprehensive understanding of the security threats and existing solutions. These attempts to fulfil this important step by providing classification of Security attacks are classified into four main categories: DNS hacking, Routing table poisoning, Packet mistreatment, and Denial-of-Service attacks. We are generally discussing on the existing Infrastructure solutions for each of these categories, and also outline a methodology for developing secured Nation.
AI Generated Summarymay contain errors
Here is a summarized version of the content:
The speaker discusses the importance of cybersecurity in today’s digital age, highlighting the need for universities to adopt a multidisciplinary approach that combines computer science, international relations, and social sciences. The thrust areas mentioned include border security, cyber security research, and dedications to traditional scientific research.
To address the challenges in cybersecurity, the speaker suggests:
- Implementing security training in virtual labs.
- Utilizing neural network systems and computational models to tackle security problems.
- Improving network infrastructure and technologies, including geospatial technologies.
- Adopting a cyclic approach to infrastructure development, starting with strategic assessment and deployment, followed by remote management and security integration.
- Emphasizing continuous monitoring as the only solution for cybersecurity in various sectors, including banking and finance.
The speaker also mentions the importance of data visualization, online process maintenance, and securing usable internet interfaces. Additionally, they highlight the need for information security certifications and promoting economic growth through digital means.
Finally, the speaker emphasizes the importance of citizen participation, effectiveness, and efficiency in making cybersecurity a reality, and shares their personal view that 60% of corruption can be eliminated through digital means.