Asian School Plans To Restore Cyber 'Law & Order'
Asian School of Cyber Laws (ASCL), a Pune based educational institute imparting knowledge and consultancy in the field of cyber laws and cyber crime investigation, has designed innovative training programs for enterprise security.
Communicating to CXOtoday, Rohas Nagpal, president, ASCL, said, It has been our experience that despite adequate systems being implemented in various organisations, the awareness levels amongst the employees is minimal or non-existent. The weakest link in the security chain is the human mindset, which can be the prime reason behind a large number of cyber crimes that organisations face today. CTOs and CIOs need to understand that it is not merely firewalls and Intrusion Detection Systems that implement security in an organisation. A larger part of a security strategy is the kind of policies that organisations implement, and the type of awareness programs that are conducted for the employees. We have designed specific programs that cater to exactly that.
So what kind of courses does ASCL provide for enterprise security? Nagpal replied, We offer education, training and consultancy in the field of cyber laws, cyber crime investigation, cyber forensics and ethical hacking. These courses provide a thorough understanding of the techno-legal mechanism in India as well as address the crucial element of cyber crime, something that is affecting all organisations today. It is also imperative to understand issues related to cyber crime investigation so that organisations can be prepared if any threat is faced by them.
Detailing some of ASCL’s major accomplishments, Nagpal said, We have recently trained senior government officials and law enforcement personnel from Mauritius and Malaysia on cyber crime investigation at our institute in India. An intensive program that lasted for a month, covered topics such as cyber crime investigation, specifically designed for police officers from the Island of Mauritius.
According to Nagpal, ethical hackers play a crucial role of testing the IT systems of an enterprise. Organisations, whilst implementing security systems fail to take adequate measures to ensure their successful working and subsequently pay the price. The role of an ethical hacker is to find the critical flaws in the organisations systems so that the enterprise may take corrective measures and prevent any threats that they are likely to face, explained Nagpal.
Detailing a few instances where ASCL used its expertise in detecting security leaks and catching hackers, Nagpal said, We assisted the police to trace an ex-employee of a well known MNC, who had installed a backdoor on a project that he was working on. It gave him remote access to the servers of the organisations. On being terminated from the organisation, the ex-employee would take control of the servers and change critical information. We managed to track him down. There have also been instances where we utilized advanced forensics tools to recover critical information thought to have been destroyed by ex-employees. We have also used tools developed by us in-house to track and pinpoint the exact location of cyber criminals.
ASCL also advises, assists and trains the police force in the states of Maharashtra, Goa, Gujarat, Karnataka and West Bengal, in matters relating to cyber crimes and cyber crime investigation. It has also developed in-house tools to aid and assist the law enforcement machinery in cyber crime investigation. Our faculty members have also been invited to conduct training programs on Cyber Crime Investigation at the National Police Academy (NPA) at Hyderabad, India, concluded Nagpal.
- Password Protected Wi-Fi Is Also Prone To Hacks: Study
- The 10 Best Companies For Women In India
- Delving Into The ABC Of Cyber Security
- Large-Scale IoT Projects Doubled In Last One Year: Study
- Weekly Rewind: Top 10 Stories On CXOToday (Oct 9-13)
- There's No Stopping The IoT Growth; Here's Why
- Weekly Rewind: Top 10 Stories On CXOToday (Oct 2-6)
- Gartner: Top 10 Strategic Tech Trends For 2018
- Are You Choosing The Best Software For Your Business?
- Insider Threats and Its Impact On Data Security