ZITEH '19 2019 - International scientific conference ZITEH '19 MODERN INFORMATION TECHNOLOGY - USE, MISUSE AND PROTECTION
Date2019-10-25 - 2019-10-26
Deadline2019-09-10
VenueBelgrade, Serbia
KeywordsNew Technologies; Protection; IT Expert Witness
Topics/Call fo Papers
NEW TECHNOLOGIES
Blockchain Technology
Internet of Things
Cryptocurrency
...
MISUSE OF INFORMATION TECHNOLOGY
Criminogenic factors
Potential goals of abuse
Categories of abuse
Computer crime
Cyber-terrorism
Intelligence
New forms of IT abuse
Methods and techniques of abuse
Motives and profiles of the perpetrators
Terminology and standards
Informatics ethics
...
PROTECTION
Detection and proof
Place and role of state authorities, educational institutions and the media
Judicial expertise in IT
Sanctioning
International cooperation in the field of computer crime
Forensic tools, hardware and software tools, tool verification and validation
Digital forenzics
Forensic techniques and computer incident management tools
Information security
Protection policies
Architecture of the protection system
Aspects of protection: normative, physical-technical and logical aspect
Crypto protection - CER and protection
TEMPEST standard and protection
Steganography and digital watermark
Protection: on the Internet, database, PC
Protection of computers and computer networks
Web application protection methodology
Protection of privacy and intellectual property
Evaluation of the protection systems (certification, etc.)
Metric systems in the field of protection
Risk management (models and methods)
Protection Program Management
Documents and standards of protection
Methodologies for the development of the protection system
Designing of a security system
Ethical Hacking
Evaluating and improving of protection processes
Legislation in the world and in Serbia
Training Models
Blockchain Technology
Internet of Things
Cryptocurrency
...
MISUSE OF INFORMATION TECHNOLOGY
Criminogenic factors
Potential goals of abuse
Categories of abuse
Computer crime
Cyber-terrorism
Intelligence
New forms of IT abuse
Methods and techniques of abuse
Motives and profiles of the perpetrators
Terminology and standards
Informatics ethics
...
PROTECTION
Detection and proof
Place and role of state authorities, educational institutions and the media
Judicial expertise in IT
Sanctioning
International cooperation in the field of computer crime
Forensic tools, hardware and software tools, tool verification and validation
Digital forenzics
Forensic techniques and computer incident management tools
Information security
Protection policies
Architecture of the protection system
Aspects of protection: normative, physical-technical and logical aspect
Crypto protection - CER and protection
TEMPEST standard and protection
Steganography and digital watermark
Protection: on the Internet, database, PC
Protection of computers and computer networks
Web application protection methodology
Protection of privacy and intellectual property
Evaluation of the protection systems (certification, etc.)
Metric systems in the field of protection
Risk management (models and methods)
Protection Program Management
Documents and standards of protection
Methodologies for the development of the protection system
Designing of a security system
Ethical Hacking
Evaluating and improving of protection processes
Legislation in the world and in Serbia
Training Models
Other CFPs
- Leadership Development for Aspiring Executive Assistants
- Medical Imaging and Case Reports Conference
- 9th International Conference on Advances in Computing and Information Technology (ACITY 2019)
- Tattoos, Sandals, Yarmulkes, Dress and Appearance: Increasing Legal Challenges for Employees and Employers
- ISER - 643rd International Conference on Science, Technology, Engineering and Management (ICSTEM)
Last modified: 2019-07-15 20:07:20