Media Release
Bengaluru, Jul 5: On behalf of CyberSapiens, Chirag Suvarna and Harshitha Vijay had successfully conducted a two-day workshop on ‘Cyber Security & Ethical Hacking’ at Global Academy of Technology, Bengaluru on June 26-27 to the department of computer science & engineering. Dr Jyothi R, associate professor & Prof Veena V Pattankar, assistant professor CSE were the programme coordinator to the event.
The agenda of the programme was to provide an complete hands on approach to Cybersecurity & Ethical hacking domain, the concepts such as Introduction to Linux and Red Hat, Discussion about vulnerabilities and the CIA triad (Confidentiality, Integrity, and Availability), explored into networking concepts using the Cisco Packet Tracer tool, delved into topics like Cryptography, Steganography, Android hacking, Wi-Fi bandwidth limit attack, sniffing, man-in-the-middle attacks, and social engineering attacks, Phases of Ethical hacking, Bug hunting and the Career guidance session exploring the students to the depth of Cybersecurity domain.
The CIA triad is crucial for securing data. It involves ensuring the confidentiality, integrity, and availability of data. Based on these principles, organizations and individuals determine how to protect their data and maintain data privacy. The workshop had also included practical sessions, such as cryptography, that involves methods to secure data by implementing mechanisms that shall prevent unauthorized access or interception by attackers.
Sniffing attacks involve unauthorized individuals gaining access to a network that is shared by multiple parties. In social engineering attacks, hackers typically use phishing links to trick people into revealing sensitive information when they click on those links. Man-in-the-middle attacks are similar, as they involve intercepting and manipulating communication between two parties using proxy-based techniques.
On the second day of the workshop, the focus was shifted to the Bug hunting, career guidance, and various testing methodologies included in Phases of Ethical hacking process. Bug hunting refers to the process of finding vulnerabilities or weaknesses in software or systems, often with the intention of improving security.