Sessions

Nov 16-17, 2022    Dubai, UAE
2nd International Conference on

Cyber Security Ethical Hacking

Sessions

Biometric Security

Biometric identification has a growing role in our everyday security. Physical characteristics are relatively fixed and individualized — even in the case of twins. Each person’s unique biometric identity can be used to replace or at least augment password systems for computers, phones, and restricted access rooms and buildings.Once biometric data is obtained and mapped, it is then saved to be matched with future attempts at access. Most of the time, this data is encrypted and stored within the device or in a remote server. Biometrics scanners are hardware used to capture the biometric for verification of identity. These scans match against the saved database to approve or deny access to the system.

Ethical Hacking and Countermeasures

Ethical Hacking and Countermeasures include discussions around the growing underground economy, advanced threats, ransom ware, cyber-weapons, new classes of vulnerabilities, exploitation techniques, reverse engineering, and how to combat these problems. The second track, Ethical Hacking and Countermeasures, is technically advanced and will include live demos and code dissection.

Hacking & Hacking Tools

Hacking include discussions around the growing underground economy, advanced threats, ransom ware, cyber-weapons, new classes of vulnerabilities, exploitation techniques, reverse engineering, and how to combat these problems. The second track, Hacking and Hacking Tools, are technically advanced and will include live demos and code dissection.

Malware and Spyware

Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware is used for many purposes.

Cyber Vulnerabilities, Incidents and Mitigations

Cyber security threat mitigation refers to policies and processes put in place by companies to help prevent security incidents and data breaches as well as limit the extent of damage when security attacks do happen. Threat identification: Security tools and management to identify active security threats.The vulnerability issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address the lack of empirical research, this paper aims to primarily explore the relationship between vulnerability mitigation strategies and supply chain effectiveness with security culture as a moderator.

Cyber Security Threats

  • Malware: Malware is an umbrella term for a broad range of software designed to intrude on, compromise or harm digital systems. As cyber security researcher Dr. Samuel Mc Quade has noted, all malware has one thing in common: It is unwanted, unknown.
  • Viruses: Though often used interchangeably with the term “malware”, viruses are actually a specific subtype of malware. Viruses require action by the user, such as clicking on an email attachment or running an infected program, in order to activation
  • Trojan Horses: A Trojan horse is a type of malware that’s disguised as legitimate software. According to anti-malware firm Kaspersky, Trojans are unlike viruses and worms, in that they don’t self-replicate. Once activated, Trojans can give hackers the a
  • Phishing attacks typically take the form of an email or other communication made to look like it came from a trusted source, such as a user’s bank, university or employer. They are often sent with the intention of manipulating users into discloser.

Block Chain & Applied Cryptography

Explore emerging use cases and practical applications for this rapidly changing, transformative technology. Topics include encryption, distributed ledgers, crypto currency, decentralized identity, tokenization, key management, hemimorphic encryption and the implications of quantum computing on encryption

  abstracts@longdom.com
  finance@longdom.com
  support@longdom.com
Speakers Interview