|
CSI National Conference on Internet Governance & Internet Security |
30th & 31st March 2015 |
|
|
|
CSI Gurgaon Chapter & NIXI organized a two days National Conference on Internet Governance and Internet Security (IGIS 2015) at KIIT College of Engineering, Gurgaon on 30th & 31st March 2015. Five students, Ronit Yadav (15083), Ravinder Yadav (14077), Rajat Wason (15080), Sahib Arora (15088) and Sahil Jindal (15089) from Computer Science & Engineering Department of Dronacharya College of Engineering attended the workshop. |
|
During the inauguration ceremony, Prof. S. K. Aggarwal, Principal, KIIT College of Engineering, gave introduction about IGIS-2015. He told that Internet is a critical element of the infrastructure of knowledge society and Evolution of Internet is largely organic. He discussed that Free and open Internet along with minimal regulation attracted investments and innovation. Internet is a collaborative engagement model involving researchers, business, civil society, and government, which is transparent and decentralized based on multi-stakeholder involvement, which can be termed as Internet Ecosystem. Prof. Aggarwal said that Internet Governance broadly involves the development and application by Governments, the private sector and civil society in their respective roles of shared principles, norms, rules, decision making procedures and programmes that shape the evolution and use of the Internet. |
|
Dr. K K Bajaj, D.G., Data Security Council of India, the Chief Guest at the event discussed about Internet Security. Dr. Bajaj said that Internet Security is an integral issue and a challenge which needs to be given serious consideration for a sustainable Internet space. He said Internet security is the embodiment of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Ensuring internet security requires coordinated efforts throughout an information system. He highlighted that one of the most problematic elements of internet security is the quickly and constantly evolving nature of security risks. After that there was a technical session in which Ms. Monika Agarwal explained about New Stenographic methods and an Invited talk on Cryptanalysis using Neural Networks by Prof. B. Chandra. |
|
The next phase was a technical session on Modelling & Simulating denial-of-service attack by Ms. Anu Raheja and Dr. S.B. Goyal, in which they shared there experiences about Cloud Computing and issues in cloud computing. Dr. Goyal explained that Cloud computing is a computing term based on utility and consumption of computer resources. Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources and focuses on maximizing the effectiveness of the shared resources. He discussed that cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. |
|
Dr. A.K. Chaturvedi discussed that Internet security is a tree branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. He said that Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. He said that the traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, with some less important system components undefended and some less dangerous risks not protected against. With the growing volume and sophistication of cyber- attacks, serious attention is required to protect sensitive business and personal information, as well as safeguard national security. |
|
The next phase was Introduction to Cyber Security & Information Security in which the Speaker Dr. Amita Kapoor and Ms. Shilpa Bahl Gera, on behalf of the organizing committee introduced information security with various tools and technique of information security over internet and technical words related to it like Onion Routing, C99 shell, C100, Rl 57, RFI and LFI. |
|
The session was followed by another technical session in which Dr. Surjit Dalal discussed on how to enhance the Information Security of multi-agent system based Web Applications with JADE & JAAS and Ms. D. Santhadevi shared her experience about how to Secure Pervasive Computing Environment through Lightweight Cyber Security Techniques. |
|
At the end, there was a panel Discussion and valedictory Session by the following eminent speakers, Mr. Anang Mohapatra, Chairman CSI Gurgoan Chapter & VicePresident, Tech Mahindra, Mr. Deepak Maheshwari, , Head Government Affairs, Symantec, Mr. Shiv Kumar Sharma, M.D., Inception and RDCPL, New Delhi, AVM Atma Singh-VSM, Mr. Saurabh Aggarwal, M.D., Skill Cube, Mr. Nishith Seth, M.D., SSPL, Dr. A K Chaturvedi, Dr. S B Goyal, Dr. Amita Kapoor, Mr. K B Narayanan, Advisor NIXI, Col. Mahesh Khera and Ms. Geetha Hariharan. They encouraged and motivated students to identify the new areas for research and improvement in Internet governance and Internet security technology. |
|
The main objectives of the conference was to create awareness on Digital Security and digital governance from the view point of development and identifications of policy and technical matters for a sustainable global Internet ecosystem in digital economy and to explore the scope of Internet governance and Internet security in the emerging technological era. Many International bodies such as ICANN, WSIS, IGF are deliberating on the bigger issue of whether to govern the internet or not. Many global level deliberations have been taking place after the Tunis Summit WSIS-2005 and it is clear that India has to play a major role in this area of global responsibility because of its larger number of users with multi-cultural and multilingual back ground. |
|
The Conference was very fruitful and knowledgeable. |
|
Some Glimpses: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|