Hactivism - An Ethical Hackers Battle (ENVISION2011)

Venue: S V Institute of Computer Studies

Location: Kadi, Gujarat, India

Event Date/Time: Apr 01, 2011 End Date/Time: Apr 02, 2011
Registration Date: Mar 27, 2011
Early Registration Date: Mar 07, 2011
Paper Submission Date: Mar 13, 2011
Report as Spam


The last couple of years have seen Information technology services drop roots in all aspects of human life. IT enables the delivery of public and-or private sector services as it caters to a large base of people across different segments and geographical locations. It also gives citizens easy access to tangible benefits, be it through simple applications such as online form filling, bill sourcing and payments, or complex applications like distance education and tale-medicine.
Despite significant investment in technology and infrastructure, cyber terrorism represents one of the greatest challenges in combating terrorism. Every day the Internet and countless other computer systems are under attack. In the 2002 research study conducted by the Computer Crime Research Center, 90% of respondents detected computer security breaches within the last twelve months. In another more recent study conducted by CIO Online, 92% of companies have experienced computer attacks and/or breaches in the last 12 months. If that is not shocking enough, security professionals are worried about the increased sophistication of threats against computer systems.
The broad aim of, HACKTIVISM – 2011 “A National Students Convention–CSI & National Conference” is to bring together students of various courses of computer Science field to share their know-how and develop action plans for successful implementation of workable ideas and proposals. The effective use of IT services can greatly enhance existing efficiencies, drive down communication costs, and increase transparency in the functioning of various departments.

Track – I Cyber Tools, Methods and Technologies
• Scanner and Analyzers
• Cyber Warfare, Lawful Interception
• Digital Evidence, Cyber Forensics
• Anti Money Laundering Tools
Track – II Emerging and Future Threats
• Botnets, Spam, Phishing, Cross-network attacks, Virtualisation
• Security Policies and Models, Risk Analysis and Management
• Cybercrime and Technology of Law Enforcement Agencies
• Vulnerability of Next Generation Networks (e.g. IPv6)
Track – III Combating Cyber terrorism and Cybercrime
• Role of National Ministries and NSA’s
• International memoranda’s and treaties
• Economic issues
• Police and Law Enforcement Agencies Role and Tactics
• Privacy and Intellectual Property
• Computer Security Incident Response Teams (CSIRTs) Services
Track – VI Terrorism on the Internet
• Terrorist group Webs, Internet Recruitment
• Defacement and Ideology
• Money Laundering & Fraud as a source of financing of Terrorist Groups
Track – V Plenary Session – Political and Global Visions
• EU policy in Combating Cyber Terrorism and Cybercrime
• International Treaties and Combating Cyber Terrorism
• Cyber Terrorism Policy and Legal Issues
• Responding to Cyber Terrorism


S V Campus, B/h Railway Station,

Additional Information

National Conference CSI Member Non_Member Researcher: 1,000/- 1,200/- Academician: 1,000/- 1,200/- Industry: 1,500/- 2,000/- National Students Convention Student: 500/- 750/-