Events

10 Mar 2018-11 Mar 2018|Gwalior | Amity University Madhya Pradesh

Amity School of Engineering & Technology, Amity University Madhya Pradesh organized a Workshop on Ethical Hacking & IOT on 10-11 March, 2018

In today’s Scenario, the various challenges of Cyber Security & Internet Technology are play a major role in our day today life. In view of this, Department of Computer Science and Engineering, ASET conducted a National Workshop on 'Ethical Hacking and IOT’ on 10th – 11thMar, 2018 in the Seminar Hall, Block - A of the University to create a forum for discourse over this contemporary topic. This workshop was organized with the collaboration of IIT Kanpur. Two trainers from IIT Kanpur made their benign presence felt and participated in the workshop to share their ideas and valuable inputs with the participants in the field of ‘Ethical Hacking and IOT’ and how acutely it has permeated into our society, how indispensable it has become, and what are the various roles, issues and challenges that are involved in it.

Proceedings of the Work shop: 10 March 2018 (First Day)

Dr. S C Jain, Director ASET delivered his opening remarks and enlightened the participants with the importance of Ethical Hacking & IOT. He explained that the Internet of Things (IoT) has grown by leaps and bounds in just a short span of time. With the creation of everything from smart watches to Internet connected washing machines, more and more appliances and electrical devices are now connected in some shape or form to the Internet. These devices can do everything from boosting company's productivity, slashing overhead and reduce energy consumption a house. The possibilities are endless with what can be done and businesses are expected to find new ways to use IoT devices over time. However, IoT devices may provide a backdoor into a corporate network for skilled hackers and cyber criminals. The weakest link defines the strength of network security and many a times this weak link lies within an Internet of Things connected device.

Understanding the impact of IoT on cyber security should prove essential for any enterprise, as while being hacked through a security breach in a light bulb may sound humorous, it is no laughing matter when confidential information and client financial documentation leaks through this hack. 

The IoT has the ability to greatly improve the company productivity, cut expenses and drive future projects for nearly every department. However, it could prove total if proper security measures are not taken to safeguard these newly minted Internet access points. Internet of Things may only make up a small percentage of data usage within a network, but every point of entry needs specific and often unique cyber security in place. When considering the implementation of any new IoT hardware, the impact on the company's bottom line and potential cyber security risks must also be considered. 

Mr. Ankit from IIT Kanpur was the trainer of the workshop. He delivered his talk on “Ethical Hacking”. In his talk Mr. Ankit spoke about the ethical hacker in the field  of ethical hacking and the challenges in this field.

He explained an ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible.

He further opined that Ethical hacking is a proactive form of information security and is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a legal or white hat hacker and its counterpart a black hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. The term "ethical hacker" is frowned upon by some security professionals who see it has a contradiction in terms and prefer the name "penetration tester."

11 March 2018 (Second day)

On the second day Mr. Amir Khan was the trainer from IIT Kanpur. He delivered his talk on IoT. He said that the Internet of Things is any internet/working of a device that connects to the Internet in order to exchange data. This covers a wide range of devices, spanning from watches to computer programs, hardware sensors and a host of others. In modern terms, IoT devices are often called "Smart" devices. So a smart phone, smart watch or anything else with the tag "smart" on the front end of it generally is part of the IoT category.

Modern IoT has greatly evolved over the last year. As the Internet of Things now not only covers a number of unique devices, but many of these devices commnicate in real time, provide in-depth analytical information and often learn on the fly. IoT dates back to the early 1980s, when researchers at Carnegie Mellon University created a vending machine connected to the Internet. The vending machine could relay information back upon request, indicating its stock, needed inventory and the current temperature of stored beverages. 

The Hod CSE-  ASET , in his concluding remark, appreciated the efforts put in by the faculty of CSE and also thanked the trainer for sparing his valuable time. Also, he anticipated that, in future more such events may be organised to encourage the faculties and students.

He opined that such workshops would enhance the employability among the students. The workshop ended with the Certificate distribution to the participants. The vote of thanks was proposed by Mr. Rajeev Goyal, Associate Professors, Computer Science & Engineering, Amity School of Engineering & Technology.