Skip to content

Latest commit

 

History

History
83 lines (77 loc) · 2.75 KB

Seminar.md

File metadata and controls

83 lines (77 loc) · 2.75 KB

22CYS Projects


Seminar Status

Semester 2

Date Name Topic
05-May-2023 Pavan Shanmukha Madhav Gunda OWASP Top 10 Vulnerabilities
19-May-2023 Namitha Sudhishkumar Nair Cyber Attacks on Indian Organisations
25-May-2023 Mukund Kumarappan S OSI Layer
25-May-2023 Joshua Anto A Artificial Neural Network

Semester 3

Date Name Topic
Kaushik M Cryptography in Blockchain
Parthiv Kumar Nikku PenTest
Lalitha K Stock Market Cyber Security Attacks

Seminar Topics

  1. [Standards] SEI CERT C Coding Standard
  2. [Hardware] Hardware Security
  3. [Blockchain] Cryptography in Blockchain Technology
  4. [LAW] Information Technology Act (IT-Act), 2000 (India)
  5. Open-Source Software
  6. CyberPsychology
  7. [Software Engineering] Software Development Life Cycle
  8. [Software Engineering] Software Version Control (SVM)
  9. Cloud Computing
  10. [LAW] Personal Data Protection Bill (PDPB), 2022 (India)
  11. [LAW] General Data Protection Regulation (GDPR), 2015 (EU)
  12. [LAW] Health Insurance Portability and Accountability Act (HIPAA), 1996 (US)
  13. Internet of Things (IoT)
  14. Internet of Vehicles (IoV)
  15. [Cyber] Vulnerability Assessment (VA)
  16. [Cyber] OWASP Top 10
  17. Metaverse in Education
  18. [Software Engineering] Agile Methodology
  19. [Cyber] Social Engineering
  20. Industrial Control Systems
  21. [Standards] ISO 27001 - Information security management
  22. [Cyber] Android Security
  23. [Cyber] Steganography
  24. [Cyber] Secret Sharing
  25. Interplanetary File System (IPFS)
  26. Game Theory
  27. ChatGPT-4
  28. [Cyber] Evolution of Cyber Security
  29. [Cyber] Prominent Cyber Attacks on Indian Organisations
  30. [Networks] Internet Watchdog
  31. [Cyber] Computer Emergency Response Team
  32. [Networks] Software Defined Network(SDN)
  33. Linux Distributions
  34. Job Scheduling in Windows
  35. [Hardware] Raspberry Pi
  36. [Hardware] Arduino Board
  37. [Cyber] Penetration Testing
  38. [Cyber] Red Team and Blue Team
  39. [Networks] OSI Model
  40. [Cyber] Security Auditing
  41. [Hardware] Open-Source Hardware
  42. [Cyber] Cyber Threat Intelligence
  43. [Cyber] Threat Modeling
  44. [Cyber] Ransomware Attacks
  45. Role Based Access Control
  46. [Wireless] Bluetooth Low Energy
  47. [Wireless] ZigBee
  48. 4G Mobile Network
  49. 5G Mobile Network
  50. Graphics Processing Unit (GPU)
  51. Capacitive And Resistive Touch Displays
  52. Wardriving
  53. Database Management - MySQL
  54. Darkweb
  55. Quantum Computers
  56. Artificial Neural Networks
  57. Self Organizing Maps
  58. Working of reCAPTCHA
  59. Wireless Gigabit
  60. Web3.0