Special Issue on Cyber Security and Ethical Hacking | Telecommunications System & Management

Telecommunications System & Management

ISSN: 2167-0919

Open Access


Pages: 1 - 1

2021 Conference Announcement on Cyber Security and Ethical Hacking and Its Applications

Joe Hansard

We are pleased to welcome you to the “International conference Announcement on Cyber Security and Ethical Hacking “after the successful completion of the series of Cyber Security Congress. The Conference is scheduled on November 18-19, 2021 Paris time zone. This Cyber Security 2021 Conference will provide you with an exemplary research experience and huge ideas. The perspective of the Cyber Security and Ethical Hacking Conference is to set up technology research to help people understand how Technology techniques have advanced and how the field has developed in recent years. Cyber Security s the state or process of protecting and recovering networks, devices and programs from any type of cyber-attack. Cyber-attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. A strong cyber security system has multiple layers of protection spread across computers, devices, networks and programs. But a strong cyber security system doesn’t rely solely on cyber defense technology; it also relies on people making smart cyber defense choices. Biometric identification has a growing role in our everyday security. Physical characteristics are relatively fixed and individualized — even in the case of twins. Each person’s unique biometric identity can be used to replace or at least augment password systems for computers, phones, and restricted access rooms and buildings. Once biometric data is obtained and mapped, it is then saved to be matched with future attempts at access. Most of the time, this data is encrypted and stored within the device or in a remote server. Biometrics scanners are hardware used to capture the biometric for verification of identity. These scans match against the saved database to approve or deny access to the system. The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services, virtualization technologies/services, segmentation, deployment models, network function virtualization.

Short Communication

Pages: 2 - 2

Free-space optic WDM bidirectional transmission: Design and Evaluation

Shien-Kuei Peter Liaw

In this talk, high-speed free space optics communication (FSO) technologies will be reviewed and introduced. We design and demonstrate two proposed FSO schemes. The first scheme is a bi-directional, short-range and free-space optical (FSO) communication with 2x4x10 Gb/s capacity in wavelength division multiplexing (WDM) channels for short-distance transmission. Compared to the backto- back link and uni-directional transmission system, the measured power penalties for bi-directional, four-channel WDM FSO communication are less than 0.8 dB and 0.2 dB, respectively. The second scheme is the hybrid optical fiber and FSO link for outdoor environment, such as cross bridge or inter-building system. In case that the bridge breaks, the transmission path can be switched from fiber link to FSO link to ensure the connectivity of data link. In both cases, the single-mode-fiber (SMF) components are used in the optical terminals for both optical transmission and receiving functions. The environmental and infrastructure factors including window glasses, air turbulence and rainfall that influence the case will also be addressed. The air turbulence induces extra transmission loss and instability in the received power. We found that raindrops are the most influential environmental factor. The bit error rate (BER) test shows that raindrops seriously increase the BER that may interrupt the transmission instantaneously. After appropriate performance improvement, the proposed transmission structures show potential applications for outdoor transmission under various natural weather conditions.

Short Communication

Pages: 3 - 3

Information Security Risks, Vulnerabilities and Threats in IR 5.0.Ô?Ł

Rabiah Ahmad

Recent information technologies are able to facilitate the transformation of traditional administrative processes to services which can be performed online. The rapid growth of ICT is proved to be aligned with its application for the 4th Industry Revolution. Today, information security has become a vital entity to most organizations due to current trends in information transfer through a borderless and vulnerable world. The concern and interest in information security is mainly due to the fact that information security risk analysis (ISRA) is seen as a focal method not only to identify and prioritize information assets but also to identify and monitor the specific threats that an organization induces; especially the chances of these threats occurring and their impact on the respective businesses. Thus, a total of 18 years research in Information Security was conducted, and their findings were gathered and analysed meticulously. Most of the researches were particularly focusing in exploring the various aspect of security threats and its countermeasure through empirical researches, tool development, systematic literature review and dynamic analysis impacted from theoretical knowledge development to its implementation growth in Organization. Our reviews suggested that risks analysis demand critical and deep research to make sure they are able to introduce effective security counter measure. Our research focused on critical information infrastructure such as Healthcare, Power System and Manufacturing. One of the study, we applied empirical study to categorize threats and calculate risks for Healthcare system. In addition to that we developed tool using Machine Learning to explore various type of risks categories using the same dataset.

Short Communication

Pages: 4 - 4

Advances in Silicon photonics Technologies and Fiber optics Applications

G. de Valicourt

The field of silicon photonics is rapidly expanding, similarly to electronics in the 1970s, and much of the knowledge of this mature platform is applicable to photonics. As in electronics, the need for reduced footprint and cost as well as large-scale production pushed for higher levels of integration in photonic devices. In this paper, we will focus on fiber optic communication applications for this technology. On one side, coherent technologies have spurred a revolution in optical core networks and are expected to conquer a large market share in metropolitan and inter-datacenter networks in the very near future; however, these segments are particularly sensitive to cost, and therefore to footprint and power consumption, while still requiring high transmission performance. In order to contain cost, several chips can be co-packaged in the optoelectronic transmitter. For example, in [1], co-packaged laser and modulator chips produced optical data at 32 GBaud; however, monolithic integration is expected to provide even greater cost savings than co-packaging. In fact, novel integrated transceivers have been recently proposed and are being commercially deployed [2]. On the other side, on-chip optical interconnects require extremely low power and compact optical devices, which can be integrated closely with integrated circuits (ICs). Emerging silicon photonics technology has demonstrated low-power optical devices [3] that can operate in combination with energy-efficient CMOS drivers and amplifiers.

Short Communication

Pages: 5 - 5

Hybrid Ring /Linear Cavity Fiber Laser Operating at 1064 nm Band for Sensing

Shien-Kuei Liaw

Laser sources with wavelengths at around 1064 nm have many practical applications and are widely used in materials processing, display technology, biomedical engineering, and remote sensing applications [1]. The 1064 nm laser also has other applications in frequency doubling, optical coherence tomography, micromachining, optical wireless, time-resolved spectrum, etc. In the application of display technology, it is an excellent excitation source for nonlinear optics and biomedical engineering as the biological sample is usually composed of water. Lightwave at 1064 nm band is not absorbed by water or oxygen inside the tissue. Hemoglobin, deoxyhemoglobin or melanin absorption can reduce the damage of biological samples [2], and the Raman light source near the 1064 nm is an ideal light source for medical detection [3]. Semiconductor optical amplifier based hybrid ring cavity/linear cavity fiber laser can also be used as optical sensing source. Compared with conventional sensors, fiber sensors present several advantages, including high sensitivity, great mechanical stability, electromagnetic interference immunity, low cost, compactness, and easy maintenance. The proposed 1064 nm SOA based fiber laser can also play as a sensor. In a fiber-laser-based FBG sensing system, the laser cavity forms part of the FBG sensor. Therefore, the changes in the FBG physical condition can be detected directly via the laser spectrum. The dynamic range of the fiber laser sensor is equivalent to the cavity length.

Short Communication

Pages: 6 - 6

Efficacy of Machine Learning in Analyzing Amino Acids & Minerals Using Fourier Transform Infrared Spectroscopy

Yuriy Markushin

Infrared spectroscopy provides chemical information pertinent to several Mars biological questions. Life as we know it is composed of carbon-containing building blocks, organic molecules. This study was conducted to classify and predict varying concentrations of amino acids and rock using machine learning techniques. The selection of instruments for landing on Mars poses particular challenges. Instruments must withstand launch, vacuum space conditions and landing in the extreme environment. Fourier-transform infrared spectroscopy (FTIR), an analytical technique, meets the challenges and is broadly used to identify organic materials. In this study, several concentrations of L-stereoisomer serine and rock were pulverized and measured using FTIR to obtain a spectrum of absorption. Each sample was measured in 5 sets then averaged to exclude errors. Using the R software environment, we performed Principal Component Analysis (PCA), a machine learning method for dimensionality reduction, to better visualize the story or data told. Preliminary results of our investigation indicate a separation of amino acid/rock mixture and pure rock at our sample concentrations 0.001g and 0.0001g. Further study includes measuring the separation of amino acid/rock mixture and pure rock at the parts per million level, improving on our analysis techniques and developing a method to detect signatures of life in Martian rocks.

arrow_upward arrow_upward