Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
Published:
Published:
On Thursday, 15th December 2022, the BTech CYS second years organized the monthly Cyber Movie Evening, which took place in the E-learning studio located in Academic Block-2. The event was aimed at educating attendees about cyber safety in an entertaining manner. The movie evening started at 5 pm and went on till 7:30 pm.
The movie that was streamed during the event was "Searching". The movie revolves around the protagonist David Kim, who becomes desperate when his daughter Margot disappears. The police investigation leads to nowhere, and David decides to search his daughter's laptop, hoping that her digital footprints might give them clues. The movie shows David contacting her friends and thoroughly looking through her photos and videos to find clues about her whereabouts. The event was attended by the departments of CSE, AI, and CYS, with the strength being close to 50 B. Tech students, including the organizers. The movie evening was a platform for attendees to learn about the importance of cyber safety through an engaging storyline. Overall, the Cyber Movie Evening was a success, with attendees enjoying the movie and gaining insights into the importance of cyber safety. The event was well-organized and executed, and the organizers are looking forward to the next movie evening.
Published:
On Thursday, 12th January 2023, the BTech CYS first and second years organized the monthly Cyber Movie Evening, which took place in the E-learning studio located in Academic Block-2. The event aimed to educate regular attendees about the importance of cyber safety in an entertaining manner. The movie evening started at 5:15 pm and went on till 7:25 pm.
Published:
We are pleased to present this report documenting the successful execution of the Cyber Clinic 1.0 at Anokha 2023 Techfair. The Cyber Clinic, based on the Cyber Readiness Interactive Simulation, aimed to educate and raise awareness about cybersecurity among participants and equip them with practical skills to navigate the evolving digital landscape. The event took place from the 27th to the 29th of April 2023 and witnessed an impressive turnout of participants from diverse backgrounds, including industry professionals, students, and technology enthusiasts. The Cyber Clinic 1.0 was a collaborative effort between Women in Cyber Security (WiCyS) Amrita Student Chapter and CybeReach, with the shared objective of fostering a cyber-ready culture and empowering individuals to protect themselves and their organizations from cyber threats.
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Cyber Clinic is an assessment based on Incident Response Simulation to understand the Cyber Readiness of the Participants who takes the examination which will include various degrees of Awareness, Attack Scenarios, and Reaction Challenges to analyze their Cyber Quotient (CQ).
We are following our custom-created ART approach (Awareness, Recognize, Treatment) where each level requires an increasing level of awareness and knowledge to proceed to the next level thereby estimating their CQ.
Based on the obtained CQ, the advisory panel will recommend the General and Participant-Specific Cyber Readiness Guidelines and Tips.
Published in , 2022
The necessity for safeguarding wireless networks has increased due to an increase in the number of associated cyber-attacks on unsecured and weak wireless networks. It is critical for individuals, homeowners, and businesses to protect their wireless networks from external hackers. Wardriving is the act of an attacker foraging for wireless networks while driving a vehicle or while using a laptop or a smartphone. It is an efficient method for gathering information about nearby Wireless Access Points (WAPs), which aids in the analysis of a particular WAPs weakness.
Recommended citation: A. M. Thomas, G. A. Kumaran, R. Ramaguru, R. Harish and K. Praveen, "Evaluation of Wireless Access Point Security and Best Practices for Mitigation," 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), 2021, pp. 422-427, doi: 10.1109/ICEECCOT52851.2021.9707914. https://doi.org/10.1109/ICEECCOT52851.2021.9707914
Published:
Organised by: Dept. of Digital and Cyber Forensic Science and Cyreack Association
Represented: Amrita Vishwa Vidyapeetham, Coimbatore