The complex interconnection of services has multiplied the points of vulnerability, i.e. "doors" through which potential attackers can act. As a consequence, the need of improving society’s collective resilience to cyber-attacks can be only achieved with the involvement of all actors regardless of their level of ICT expertise. Cyber risk is not only an IT risk, as today's reality is one in which cyber-attacks involve, and in almost every case, a human. In this reality, education in cyber security cannot be limited to technical approaches by– and for– IT professionals, but must extend to include eventually all the citizens. It turns out that one size does not fit all, and personalised educational paths adapted to the role of the person in the interconnected environment, are needed for effective cyber defence.
Workshop on using open-source software in digital forensics investigation.
Workshop on using AccessData® FTK® in digital forensics investigation.
Malware attacks constitute a significant threat to Android, the most adopted mobile operating system. To counteract such attacks, machine learning systems are more and more employed both by researchers and anti-malware companies, since they provide an effective solution for the detection of previously-unseen (zero-day) samples. The development of such systems requires an accurate process of analysis of the Android applications and design of machine learning algorithms. The workshop will present these procedures, with a particular focus on the Android ransomware threats, where the attacker can either lock or encrypt the target devices, and victims are forced to pay ransoms to restore their data. Hence, the prompt detection of such attacks has a priority in comparison to other malicious threats. In particular, the workshop will explain how to characterise Android ransomware applications and illustrate with a practical session the strategies to analyse and detect them through machine learning-based algorithms.
An overview of using Tableau for producing visualisations of data analytics.
The increasing “digitalisation” of our era makes our social, economic, and political lives highly dependent on computers. This complex environment is causing different and multiple weaknesses that allow malicious actors to misuse the systems and cause threats at different levels of severity. The defence is a priority for all professionals who need to be aware of the best practices and current technologies for designing secure systems and be prepared to be resilient to attacks. When facing an attack, not only damages have to be limited, but also information needs to be properly collected in order to assess the impact, locate the vulnerabilities that caused the attack, and eventually attribute the attack. In this reality, artificial intelligence plays a pivotal role in early detection and post-mortem data analysis, and its effectiveness is related to its resilience to adversarial attacks aimed at evading detection and misleading the decision process. Considerable efforts in research, education, and public awareness are needed to build a secure environment and promote trust.
A workshop on replicating fingerprints by using common materials, thus obtaining finger replica whose characteristic are similar to those of the finger skin and can deceive a standard fingerprint recognition system if it is not equipped of a particular liveness detection algorithm.
Two workshops; CTI by Prof. Giacinto and Mobile Forensics by Dr. Maiorca.
On the sidelines of the British Ambassador to Jordan visit to PSUT, a tour of the university's Cybersecurity and Digital Forensics laboratory took place.