Wednesday, 30 November 2022 06:34

The Department of Computer Engineering holds a scientific symposium on electronic extortion and cybersecurity

The Department of Computer Engineering at the University of Technology held a scientific symposium entitled Electronic Extortion and Cybersecurity, in the presence of the Assistant Head of the Department for Scientific Affairs, Prof. Dr. Ahmed Sabah Abdel-Amir, the Administrative Assistant, Dr. Ahmed Musa Dinar, the Department Rapporteur, asst. Lecturer. Ali Abdel-Razzaq, and a number of members The faculty, staff and students of the department.

The seminar included two main axes, which were presented by the Head of the Network Engineering Branch, Dr. Amir Musa Thuwaini, and asst. Lecturer Zahra Abbas

 The one who gave the lecture on the first axis included the most important gaps resulting from the misuse of the mobile, including lending the mobile to a stranger in the event of a request for help and the resulting consequences that expose the owner to danger, and when buying or selling a used mobile, the owner may be subject to legal accountability in addition to what the mobile device contains From personal photos and videos, important work information or passwords for financial transactions via the Internet, which may expose the individual to extortion in the event of losing the mobile phone or if the person owns more than one mobile phone and does not use the SIM for a certain period and the telecom company sells it and recycles its purchase after a specified period has passed. The slide into problems is indispensable, as there are specific and well-known programs that work to retrieve all files previously saved in the device when used by another person. It showed that Iraq today suffers from a large number of crimes of extortion, threats, electronic defamation, and terrorism, so there was an urgent need to define users and security and government agencies with loopholes. Communication technology, especially security ones.

  Therefore, it is necessary to enact laws regulating the use of these technologies in addition to criminalizing any misuse of these technologies, as most governments in the world have developed special laws for electronic crimes for the purpose of controlling and limiting these crimes.

As for the second axis, Dr. Amir Musa Thuwaini discussed in his lecture the definition of the term cybersecurity and what are the cyber risks that information and networks that transmit it can be exposed to. And the definition of the concept of electronic piracy and its types and expensive of each kind. And a list of requirements to provide protection against cyber attacks.

 In his lecture, he focused on presenting some of the tools used to carry out cyberattacks and others to detect and avoid them in the future. Focusing on mechanisms to prevent unauthorized access to information systems networks. In order to clarify the mechanisms for preventing penetration of information networks, a Cisco global network simulator was used to present a system that adopts a simple mechanism that limits illegal entry and prevents penetration practically.

In conclusion, the symposium recommended spreading the required awareness to avoid using smart devices in a way that allows them to be hacked for the purposes of electronic piracy or electronic extortion by avoiding links from unknown sources and ensuring the protection of personal data in private storage spaces and ensuring that important data is removed when handling smart devices with expert hands and destroying recharge cards The balance and not to buy electronic balances from unreliable sources to discourage blackmailers from marketing their electronic balances, and to secure national and local information networks and systems at the individual and institution levels through the use of protection systems that occur periodically from solid origins and knowledge of hacking methods and tools. Intrusion detection methods and tools, and the application of mechanisms to limit access to trusted persons only and to the data they are allowed to access, to perform pre-planned assignments, with the recording of all operations that took place on them.

1655108
  Today Today84
YesterdayYesterday0
  This_Week This_Week84
  This_Month This_Month84
  All_Days All_Days1655108
Highest Visitors 04-20-2024 : 84
                                Web Designers
Top