Telecommunications System & Management

ISSN: 2167-0919

Open Access

Volume 10, Issue 2 (2021)

Short Communication Pages: 1 - 1

Cyber security plays an important role in the field of information technology

Zinedine Sayad

Cyber security plays an important role in the field of information technology. Securing the information have become one of the biggest challenges in the present day. Whenever we think about the cyber security, the first thing that comes to our mind is ‘cybercrimes’ which are increasing immensely every day. Various Governments and companies are taking many measures in order to prevent those crimes. Besides various measurements are taken seriously to stop the growth of those crimes. Cyber security is still a very big concern to many companies. This paper mainly focuses on the challenges faced by cyber security on the latest technologies. It also focuses on the cyber security techniques, ethics and the trends changing the face of cyber security. This paper will focus on firewalls, intrusion type, encryption and hashing, VPN, attacks, and Security.

Short Communication Pages: 2 - 2

Energy Efficiency and Security for Embedded AI: Challenges and Opportunity

Dr. Muhammad Shafique

Gigantic rates of data production in the era of Big Data, Internet of Thing (IoT), and Smart Cyber Physical Systems (CPS) pose incessantly escalating demands for massive data processing, storage, and transmission while continuously interacting with the physical world under unpredictable, harsh, and energy-/power- constrained scenarios. Therefore, such systems need to support not only the high-performance capabilities under tight power/energy envelop, but also need to be intelligent/cognitive and robust. This has given rise to a new age of Machine Learning (and, in general Artificial Intelligence) at different levels of the computing stack, ranging from Edge and Fog to the Cloud. In particular, Deep Neural Networks (DNNs) have shown tremendous improvement over the past 6-8 years to achieve a significantly high accuracy for a certain set of tasks, like image classification, object detection, natural language processing, and medical data analytics. However, these DNN require highly complex computations, incurring huge processing, memory, and energy costs. To some extent, Moore’s Law help by packing more transistors in the chip. However, at the same time, every new generation of device technology faces new issues and challenges in terms of energy efficiency, power density, and diverse reliability threats. These technological issues and the escalating challenges posed by the new generation of IoT and CPS systems force to rethink the computing foundations, architectures and the system software for embedded intelligence. Moreover, in the era of growing cyber-security threats, the intelligent features of a smart CPS and IoT system face new type of attacks, requiring novel design principles for enabling Robust Machine Learning.
In my research group, we have been extensively investigating the foundations for the next-generation energy-efficient and robust AI computing systems while addressing the above-mentioned challenges across the hardware and software stacks. In this talk, I will present different design challenges for building highly energy-efficient and robust machine learning systems for the Edge, covering both the efficient software and hardware designs. After presenting a quick overview of the design challenges, I will present the research roadmap and results from our Brain-Inspired Computing (BrISC) project, ranging from neural processing with specialized machine learning hardware to efficient neural architecture search algorithms, covering both fundamental and technological challenges, which enable new opportunities for improving the area, power/energy, and performance efficiency of systems by orders of magnitude. Towards the end, I will provide a quick overview of different reliability and security aspects of the machine learning systems deployed in Smart CPS and IoT, specifically at the Edge. This talk will pitch that a cross-layer design flow for machine learning/AI, that jointly leverages efficient optimizations at different software and hardware layers, is a crucial step towards enabling the wide-scale deployment of resource-constrained embedded AI systems like UAVs, autonomous vehicles, Robotics, IoT-Healthcare / Wearables, Industrial-IoT, etc.

2021 Conference Announcement Pages: 3 - 3

Market Analysis- Cyber Security and Ethical Hacking

Richard Lynn

The After the successful completion of artificial intelligence conference series, we are pleased to welcome you to the “Cyber Security and Ethical Hacking." The congress is scheduled to take place on November 18-19, 2021 in the beautiful city of Paris, France. Cybersecurity-2021 Conference will give you exemplary experience and great insights in the field of research.
Meetings LLC Ltd Organizes 1000+ Conferences Every Year across over USA, Europe, and Asia with assistance from 1000 progressively sensible social requests and Publishes 700+ Open access journals which contain in excess of 100000 well-known characters, assumed scientists as article board people.
Cyber Security is becoming a crucial driving force behind innovation in robotics and Lot, with a range of advances including Cloud Security & Virtualization, Cyber Crime and Fraud Management, Cyber Vulnerabilities, Incidents, And Mitigations Ethical Hacking and Countermeasures, Future Of Cyber security, Hacking & Hacking Tools. Universities also have begun to offer dedicated Internet of Things programs. Robotics will be getting to be progressively prevalent these times around learners. Actually, if you follow again of the Inception about Artificial Intelligence, you will discover that many technologies likewise have robotics that fills done the individuals minor cracks more successfully Furthermore provides for you a shinier vehicle. There need aid likewise robotics technology items accessible with stay with your eyewear What's more different optical units What's more that's only the tip of the iceberg tough.

Short Communication Pages: 4 - 4

Ransomwares: How to build it and how to protect from it

Sami Fakhfakh

Ransomware is a type of malware. It restricts access to the computer system that it infects or the data that it stores (often using encryption techniques), and demands a ransom be paid to the creator(s) of the malware. This is in order for the restriction to be removed. Some forms of ransomware encrypt files on the system's hard disk. Others may simply lock the system and display messages intended to persuade the user to pay. Ransomware first became popular in Russia. Now the use of ransomware scams has grown internationally. In June 2013, McAfee said it had collected over 250,000 unique samples of ransomware in the first three months of 2013. This is more than double the number of the previous year. Crypto Locker, a ransom ware worm that surfaced in late-2013, had collected an estimated $3 million USD before it was taken down by authorities. In May 2017, a piece of ransom ware called WannaCry spread around the world. It lasted four days and affected over 200,000 computers in 150 countries.[4] Only about $130,000 (USD) was ever paid in ransom, but the attack affected a lot of large companies and organizations. The United Kingdom's National Health Service (NHS) was hit hard by WannaCry. Hospitals could not access their files, and so many surgeries were cancelled and patients had to be turned away.[5] The NHS was especially at risk because it was using a version of the Windows operating system called Windows XP that Microsoft no longer supported.[6] This meant that Microsoft had not been sending out security updates for this version of Windows, leaving it open to the WannaCry virus. Other systems were affected even though they were running newer versions of Windows, because their users had not yet installed the most recent security updates. Even though it was not designed to actually damage computers or their files, WannaCry led to a lot of wasted time and money, showing how vulnerable the world still is to ransom ware attacks. Nowadays, several companies, organizations or individuals are affected by a ransomware attack. in the philosophy of learning defense by attack. we will explain how this malware works, do a live code review example, test it on live and teach you how to protect yourself from it..

Short Communication Pages: 5 - 5

Security Operations Center for OT environment ?? A framework


Operational technology or OT is a category of computing and communication systems to manage, monitor and control industrial operations with a focus on the physical devices (also known as Cyber Physical Devices) and processes being used by these Cyber Physical Devices (or Systems). OT often control essential services which affect people at large, such as water and power supply, oil & gas extraction to supply, mostly all large manufacturing units etc. Additionally, operational technology is also used to monitor these critical services to prevent hazardous conditions. Manipulation of these systems and processes could have extreme impacts on the end users of these services as well as workers within operational environments.Cyberattacks on critical infrastructure and strategic industrial assets are on the rise for some years now and is now believed to be among the top five global cyber risks. The cyberattacks have cost companies millions of dollars through the disruption of services and critical operations. To keep critical systems running and protect the financial results and reputation of any organization that includes industrial processes, it’s essential to improve industrial cyber security. However, securing OT environments, assessing them to determine remediation plans and strategies, and gaining visibility into them is challenging and requires different approaches than traditional IT environments.The IT environment is fairly protected and well-guarded by a Security Operations Center which keeps a constant vigil on the activities of the IT ecosystem under watch. The SOCs across the world have evolved and have reached a certain maturity in operations. However, for an OT environment, the SOC is still a new concept – primarily because the objectives of SOC of OT are different from those of IT. The mission and objectives of newer SOCs of today is about having an integrated security information and event management (SIEM) with a big data platform — complemented by workflow, automation and analytical tool. To create a SOC for OT would require re-engineering some of the OT processes, which because of being heavily dependent on the OT vendors result in a major task.Hence, there is a need to create a framework for OT SOC which helps organizations define a clear mission and objective statement for a fully operational OT SOC. The framework needs to define the roles (give directions) of the SOC team, the MSSP (if any), the OT vendors and the customer.

arrow_upward arrow_upward