Cybersecurity

Cybercrime: This violates the individual's privacy and security of their data and is escalating worldwide at a rapid pace. Cybercrime is a criminal activity where computers, networks, and network devices are used as tool to execute the illegal ends of crime such as Online Harassments, Hacking, e-mail Hacking, Sabotage, Malware, Phishing, Identity Theft, Cyberbullying, Online Scams, Online Frauds, Cyber Stalking, Sextortion, Offensive content, Invasion of Privacy, File Sharing & Piracy,  Counterfeiting & Forgery, Cyberterrorism, Child Pornography, Denial of Service Attacks, Distributed Denial of Service Attacks, Financial or Card payment theft, Cyberextortion, Ransomware attacks, Cryptojacking, Cyberespionage, and, many. Cybercriminals exploit new technologies to execute cyberattacks. Social media is one of the daily activities of many individuals and is being used by billions of users worldwide. Cybercrime on social media has taken a drastic turn since cybercriminals exploit social media to execute illegal online activities.

Cybersecurity: With the recent COVID-19 pandemic, many countries have shifted to the new trend of online learning and working from home; cybersecurity plays a major role in securing personal and organizational data and information. Users of cyberspace need to secure their information by following certain minimum Cyber Hygiene tips recommended by INTERPOL like Backup online and offline files regularly and securely, Managing social media profiles, Strengthen your home network, Check privacy and security settings using strong passwords, keep your software updated, Avoid opening and delete suspicious emails and attachments. Cyberspace constitutes sensitive data, health information, personal information, intellectual property, governmental information, business information, and many others. Cybercriminals utilize the full spectrum of intrusion techniques to exploit the network to steal this information.  Cybersecurity plays an important role in protecting the data and the system from theft and damage using strong cryptographic controls.

In consideration of research in Cybersecurity, I am interested in supervising the below-listed topics but not limited to: