Тёмный

Top Five Emerging Cybersecurity Challenges | Srini Sampalli | TEDxDalhousieU 

TEDx Talks
Подписаться 41 млн
Просмотров 79 тыс.
50% 1

Srini Sampalli is a Professor and 3M National Teaching Fellow in the Faculty of Computer Science, Dalhousie University, and brings with him more than 20 years of teaching and research experience in computer science, with specialization in cyber security and cyber technologies. How do hackers launch cyber attacks? What are the best defense mechanisms against cyber intrusions? What are the top emerging cyber threats and what can be done to mitigate the risks? These are some of the research challenges and questions that he loves to investigate. Srini has led numerous industry-driv- en research projects funded by Canadian federal government grants and research organizations. He currently supervises 7 Ph.D. and 13 Masters students in his MYTech (EMerging WIreless Technolo- gies) Lab and has supervised over 100 graduate students in his career.
Deeply passionate about teaching and sharing knowledge, Srini’s primary joy is in inspiring and motivating students with his enthusiastic teaching. Srini has received the Dalhousie Faculty of Sci- ence Teaching Excellence award, the Dalhousie Alumni Association Teaching award, and the Asso- ciation of Atlantic Universities’ Distinguished Teacher Award. In 2000, the “Srini Teaching Award”, a teaching award in his name, was instituted by the students within the Faculty of Computer Science, and in 2005, he received the 3M National Teaching Fellowship, Canada’s most prestigious teaching acknowledgement. In 2016, he received the Outstanding Educator Award by IEEE Canadian Atlantic Section. Since September 2016, he holds the honorary position of the Vice President (Canada), of the International Federation of National Teaching Fellows (IFNTF).
Srini Sampalli is a Professor and 3M National Teaching Fellow in the Faculty of Computer Science, Dalhousie University, and brings with him more than 20 years of teaching and research experience in computer science, with specialization in cyber security and cyber technologies. How do hackers launch cyber attacks? What are the best defense mechanisms against cyber intrusions? What are the top emerging cyber threats and what can be done to mitigate the risks? These are some of the research challenges and questions that he loves to investigate. Srini has led numerous industry-driv- en research projects funded by Canadian federal government grants and research organizations. He currently supervises 7 Ph.D. and 13 Masters students in his MYTech (EMerging WIreless Technolo- gies) Lab and has supervised over 100 graduate students in his career.
Deeply passionate about teaching and sharing knowledge, Srini’s primary joy is in inspiring and motivating students with his enthusiastic teaching. Srini has received the Dalhousie Faculty of Sci- ence Teaching Excellence award, the Dalhousie Alumni Association Teaching award, and the Asso- ciation of Atlantic Universities’ Distinguished Teacher Award. In 2000, the “Srini Teaching Award”, a teaching award in his name, was instituted by the students within the Faculty of Computer Science, and in 2005, he received the 3M National Teaching Fellowship, Canada’s most prestigious teaching acknowledgement. In 2016, he received the Outstanding Educator Award by IEEE Canadian Atlantic Section. Since September 2016, he holds the honorary position of the Vice President (Canada), of the International Federation of National Teaching Fellows (IFNTF).
This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at www.ted.com/tedx

Опубликовано:

 

26 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 40   
@SFMExtraordinare
@SFMExtraordinare 3 года назад
Timestamps 4:09 - Mobile Technologies 6:38 - Ransomware 8:01 - Internet of Things 10:35 - Big Data 12:20 - The Human Factor 15:00 - Epilogue
@sandhyapal6306
@sandhyapal6306 4 года назад
Great speech ..
@ChetanVithlani
@ChetanVithlani 6 лет назад
Great content, thanks for sharing awareness!
@pratikkadam8603
@pratikkadam8603 4 года назад
Nice concept about Cyber Hygiene
@Beni439
@Beni439 5 лет назад
Great speech about CyberSecurity love it
@LevonsWound
@LevonsWound 5 лет назад
im no expert, but the hand sign guy seems less than credible, or maybe he's signing in slang ...lol
@yienglingwong4874
@yienglingwong4874 4 года назад
Good speech..and out of my box
@kiranlodhi4537
@kiranlodhi4537 5 лет назад
Thanks for this great knowledge 😊😊😊
@MDARIFULISLAM-xs4ni
@MDARIFULISLAM-xs4ni 4 года назад
wow so great
@michellealicialamothe2108
@michellealicialamothe2108 4 года назад
That was NICE!!
@tloveline15
@tloveline15 2 года назад
Woow awesome 👌 👏 thanks for sharing
@ninirema4532
@ninirema4532 Год назад
very great dear all gentle super great lecture.
@lukeleon1203
@lukeleon1203 5 лет назад
Im getting into cyber security
@BatJeff
@BatJeff 4 года назад
So am I! How are you finding it now a year later?
@anashimedan939
@anashimedan939 4 года назад
I am supposed to write an essay about cyber security, have no idea where to start. If you have any articles please send it to me.
@ganymeade5151
@ganymeade5151 4 года назад
There are lots of well-paying jobs in cybersecurity. If I were younger, I would go to Tech school rather than waste my time in an expensive university.
@1fatouseye
@1fatouseye 3 года назад
@Harry Pannu. higihhihugvv o
@lukeleon1203
@lukeleon1203 2 года назад
@Farooque Ahmed creating an Alexa skill
@BobBob-bn5jc
@BobBob-bn5jc 6 лет назад
Less than 1000 views? Well, no one really seems to care about this sort of thing.
@CybercrimeMagazine
@CybercrimeMagazine 5 лет назад
11,435 views as of today ....
@RollinWithRolli
@RollinWithRolli 5 лет назад
Facts Guy
@richb0199
@richb0199 4 года назад
50000 now.
@tapiwakay
@tapiwakay 4 года назад
What matters is the people who care are here watching.
@chinonsowilson5514
@chinonsowilson5514 2 года назад
Is two factor authentication an alternative to password? I thought it's a step further towards protecting the account against unauthorised access.
@tylerbarker4763
@tylerbarker4763 5 лет назад
the thing is ,its not pyschic abilities , you use to influence people. - i think a pyhsic , in his right mind , is more like a tracker, (using encompassments to bring things out, to guide) using the past, to make developements in the future. (its kinds of like a time capsule your working in) . Imagine a indian tracker from back in the day, the path is in the past ( the signs left the trail is the path). The trail, the area, the time the distance the space is the time capsule. So he would use developements to create rendvous or bring things out to light, guidance. ( put things out there, based on the current situation). - this how i see the trackers working being used in the past). ( some may call it "phreaking") Conartist, use a little bit of positivity, darkweb used all of bad or whatever. Conartist, are people who pretend to believe something and use politics, and encompassments to create a similiar effect. ( conartist, use your beliefs, technology, icons, and coins). - think of the Haiti scam artist that kept people on the line, to get win, the prize. Mrs. Cleo, came before that, she was like the first bot, using a checklist of aligrothim or algirthimic thinkin. IF your blogging (you altering or protection perception through spell ) to influence, you are kind of being sourcers physcic, deppends on how you see it. But when your putting your true feeling out there, your creating something, its kind of like a printed phycic reading, if your have followers. But for it to carry, you have to be putting your true feelings out there, when you do that, you are kind of becoming a "key" a code to what your are doing, it can only be broke by you changing or becoming. - (So i dont call my self a phsycic.) But i go deep, i put all my feelings out there history and past, with building for the feature. Its personal stuff that only i can know the key too, and its honest and deep, and it powers me, when i get out, its powers everything i do, and everything else. and it building. Its not intential i definetly wake up and im like well i definetly put that out there last night, on the main stream, its part of being true, building where your honesty is where trust is, its a protection of positive influence im making. And to tell you the truth, i learn from it, i learn so much from it, its a good thing. I figure out things from my past, that i can use to develope . And its all real, not computer, soul takes the computer everytime if use it and build it the right way. I put things together from it, i walk out every day saying im the best at what i do. I gain every day. im the best at people. You cant take back Love, so when you put love out there you build on it, to maintain it, to make it. I love everybody, everything. Its a strong influence that has trust. I memorized peoples keys i help make, influencing. Were kinda connected on it, its got little bit of both of our juju on it. You can also think of a "probe" as a key, made by technology cloning influence. ( if one probe works for 90 million people, were getting close to a "clone" type though process). So i went, i go personal and honest, non computer checklist, it takes all the probes easy. ( i can do whatever i want there work), the computers work. I know everybody has there orginality there own style ,perception on things, there own body size, bone construction and weight, I know alot of this from radiology. I have x-ray vision if you will, i look at somebody, i say i would have to take there x-ray at this angle, with this energy there is 206 bones in the body (and lots of guts, with a cardiovasuclar system [interventional radiology], i know how they probe ( or body habitus, with bone densisity and muscle). I know what keys and a cellphone look like in there pocket, there electric field keys, ( some call it FOLK or radio towers). But mostly i know the person and thats whats important. they create the enviroment. I call it all "lace'n them up" sometimes to keep 2018 and plus it sounds cool. (less phychology words it simple, off the beaten path) I like the macrena probe, becuase it laces em up head knees, fingers,elbows,toes,and hug , with hipps and shimmy. Its does this in a group, with other people, all different sizes ( its a pretty american dance) ( have "you ever heard your all knees and elbows") I like the electric slide too.. gets you ankles goin, breaks that high heels ankle health syndrome . (the boots) (getting booted up) There all kinds of ways we can be using, building these things, some are functional, Revival and wickah has some good ones too, there hundreds of them that our great, but what im saying realize what they our. its not all static rap music for your head, put some dance in it. love and teach it.
@tylerbarker4763
@tylerbarker4763 5 лет назад
put something in for the people that dont sign up for the classes, make it a generational thing, a group thing, something for everybody, every situation.
@-SACR3D-
@-SACR3D- 5 лет назад
Very interesting view point. Thank you for sharing
@theblobinc
@theblobinc 2 года назад
4 years later... the united states was brought to a near full stop not only once, but twice. this is kinda prophetic.
@pyroslavx7922
@pyroslavx7922 6 лет назад
Make backups on non-eraseable media (CD, DVD...) to combat ransomware? I am so lucky i NEVER EVER owned data worth more than cheap new hard disk ;-) HA! delete this ;-) I got somethin similar - i zero filled EVERY connected HDD, reinstall all the pirated software from DVD-R disk images - DONE. 15 minutes later - everything is back.
@VinodSharmatelco_pro
@VinodSharmatelco_pro 6 лет назад
TeDx Team .... and @SriniSampalli .... Password needs to be killed completely and let behaviour analytics takes over so .... no need to have password and when we don't have then no need to remember... ... again this is my own personal thought
@markwang5846
@markwang5846 5 лет назад
Why is the guy on the left doing gang signs?
@pragathiparu8267
@pragathiparu8267 5 лет назад
it is for the people who cant listen so its there language to communicate with
@theippster8891
@theippster8891 4 года назад
Mark Wang lol
@sophieelsom3937
@sophieelsom3937 4 года назад
grow up
@ganymeade5151
@ganymeade5151 4 года назад
Probably a Sign-Language Interpreter for deaf people.
@bwigengesosthene3681
@bwigengesosthene3681 3 года назад
Thank you for your explanation, this topic is well understandable and interesting
@kerloz3094
@kerloz3094 3 года назад
The ragged secretary synchronously trip because bumper collaterally continue above a confused dessert. colorful, open millimeter
Далее
2000 vs 2100
00:15
Просмотров 20 тыс.
КРАФЧУ NAMELESS СКИН!
1:53:35
Просмотров 439 тыс.
ААААА СПАСИТЕ😲😲😲
00:17
Просмотров 1,8 млн
Cybersecurity every day | Jaya Baloo | TEDxRotterdam
16:11
Cyber Self-Defense | Paul Carugati | TEDxSpokane
14:48
Hacking 101: Frank Heidt at TEDxMidwest
15:37
Просмотров 1 млн
Cyberwar | Amy Zegart | TEDxStanford
16:54
Просмотров 160 тыс.
2000 vs 2100
00:15
Просмотров 20 тыс.