Quantcast
Channel: Team M@tr!x
Viewing all 34 articles
Browse latest View live

Cyber Security Awareness Month – A Shared Responsibility

$
0
0

Cyber Security Awareness Month – A Shared Responsibility

Over the years Internet has by all means evolved as the medium of communication for a common man. Internet, of course has made each of our lives simple but inadvertently the internet has magnified its presence and identity. Social networking or Cloud computing, it is the internet which runs the show backstage.

Either knowingly or unknowingly each of us is connected to the internet 24 *7. When we connect to the internet we are one among a million on the internet. So is it not important to uphold our privacy on the web?  Is it not every individual’s responsibility to take measures for our resources to stay safe online?  The agenda to empower every individual who owns a stake on the internet gave birth to National Cyber Security Awareness Month a decade ago. CSAM, observed in the month of October is an initiative by the U.S. to reinforce National Cyber security and reduce cyber crime. This awareness program has had a global outreach in the government, corporate and academic sectors.


Spreading security awareness!

 The Government finds that the CSAM awareness month helps them spread the word to the nation – to both citizens and hackers that Cyber laws and rules are being imbibed, adapted and followed more strongly than ever before. The corporate sectors strongly endorse the awareness programme because upholding cyber security for a business implies enhancing reputation of the organization and reducing financial losses. Students and academic committees from various colleges across the globe participate to toe the line for cyber security. The focus is more on nurturing the growth of Information technology by making each of us self-reliant and responsible for securing ourselves online.

When people from various communities come together for the CSAM, it is more of a collective responsibility. Let us all collectively gather for CSAM to make an impact on every individual’s mind about Cyber Security.

Students here at Symbiosis Centre for Information Technology, Pune celebrate and spread awareness about CSAM in a majestic way. Our next post will speak about how SCIT, under the banner of Team Matrix, celebrated the Cyber Security Awareness Month last year in grand style. So stay tuned!

Information security enthusiasts can follow us on –

Join our Facebook Group – https://www.facebook.com/groups/TeamMatrix0911/

Follow Team Matrix on Twitter – https://twitter.com/MatrixSCIT

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Rewind: CSAM’12

$
0
0

October is celebrated as the National Cyber Security Awareness month around the world building a culture of awareness and preparedness among people about cyber security.

We students at Symbiosis Centre for Information Technology, Pune understand the importance of it and celebrate every year keeping in mind the same intent through our CSAM Event. CSAM is organized by the “Team Matrix” group of SCIT and is designed with a goal to engage and educate people about the importance of information security in our daily lives through events and initiatives.

Last year also SCIT organized an information filled CSAM’12 event comprising of quizzes, poster designing, newsletters/blog posts, and guest talks by eminent speakers from the information technology industry.

The main event took place on October 7th, 2012 with the global theme “Our Shared Responsibility”.  The half black half white poster in the background with lines – “Don’t be in the dark about security; There is no darkness but ignorance!” explained the true reason for the need of this event.

 

CSAM’12: Quite an eye-opener!

The one day event started with an expert advice by Mr. Dinesh Bareja, President – Open Security Alliance, on career prospects in information security to the students. This was followed by Cdr. M Lingesh giving students tips on being a smart security manager in dynamic IT space. Both of their insights and views were very much appreciated not only by the students looking forward for careers in Information Security but towards other IT careers as well.

The post lunch events at CSAM’12 began with Mr. Manu Zacharia, President – Information Security Research Association, talking about Critical National Information Infrastructure (CNII) to students. Explaining why its damage through being a target for terrorists, criminals and hackers would be potentially serious and the answers to the questions of who owns and protects CNII.

Mr. Niranjan Reddy, Consultant for Pune Cyber Crime Cell, Maharashtra Police, took the second guest talk post lunch speaking to students about Cyber Warfare & Crime. He spoke on how everyone needs to be aware of hacking, identity theft and how security awareness helps reducing the crime cases.

Our last guest was Mr. Sunil Bakshi, CISO – NSETECH who spoke on the Information Systems Audits. He shared great real life experiences and dos and don’ts with the students about auditing.

With October 2013 less than a month away, CSAM will be back with it awareness mantras.

Be a part of the worldwide program and spread the word.  Join us at CSAM’13!

“Let’s STOP. THINK. CONNECT as Internet is a shared resource and securing it is Our Shared Responsibility!”

 

Information security enthusiasts can follow us on –

Join our Facebook Group – https://www.facebook.com/groups/TeamMatrix0911/

Follow Team Matrix on Twitter – https://twitter.com/MatrixSCIT

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’13: The Online Security Quiz!

$
0
0

Every day we hear news about the latest computer viruses, phishing scams and identity theft dangers.  Today more than ever it is necessary for the people to consider threats that the Internet brings right into their lives.  That doesn’t mean we all have to become certified experts at information security, but each one of us must be prepared to work safely in the online environment. Cyber security awareness is the key to our information security problems.

But how much should one know about information security? Do you have the common knowledge enough to prevent you from falling victim to cybercrime?

As a part of supporting online events of CSAM’13, Team Matrix and Symbiosis Center for Information Technology, in association with PenTest, presents you the Online Security Quiz, which gives you a chance to assess yourself.  The online security quiz will be a series of fun and challenging questions allowing participants to test their knowledge in a variety of security disciplines like General Information Security Awareness and Privacy, Compliance, IT Auditing, Vulnerability Assessment and more.

The Online Security Quiz event is spread across three days. Each day participants will take a quiz, consisting of 20 questions each, which need to be answered within 10 minutes of time. All the questions will be a mix of the above mentioned security disciplines assessing individual’s security knowledge.

Now coming to the more interesting part! There are prizes to be won! Three winners are entitled to a massive subscription worth INR 30,000/- from the PenTest Magazine! PenTest Magazine is a weekly downloadable IT security magazine, devoted exclusively to penetration testing.

The quiz is intended to spread awareness among people, awaken them about information security and especially NOT to judge one’s skills/knowledge. So don’t hesitate, just take out 10 minutes of your valuable time and measure the security awareness inside you.

The event starts @ 10 PM on 13th September, 2013! So come one, come all! Registrations are open!

To get more details visit our CSAM’13 page – https://www.facebook.com/CSAM.SCIT

 

Information security enthusiasts can follow us on –

Join our Facebook Group – https://www.facebook.com/groups/TeamMatrix0911/

Follow Team Matrix on Twitter – https://twitter.com/MatrixSCIT

 

Divyaraj Khangarot | Marketing & Branding – CSAM’13

Symbiosis Centre for Information Technology

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Blogathon

$
0
0

BLOGATHON – Blog and Win Big!

 

Opportunity never knocks on an open door – it simply walks right in. CSAM’13 at Symbiosis Center for Information Technology proudly presents BLOGATHON, an online event for Blogging on Information Security for prizes to be won worth INR 30,000!

 

The theme of CSAM’13 being Shared Responsibility, this event rightly throws the platform open to all members of Team Matrix and various student Communities across the globe to fervently articulate their thoughts and ideas by means of a blog. The Top 3 blogs will be adjudged winners of BLOGATHON. The first prize winner is entitled to prize worth $221.4 (Rs. 14,012.406) from PenTest Magazine. Details of the prizes for the 2nd and 3rd winning blog entries are as follows:

2nd Winner – Prize from PenTest Magazine worth $159.9 (Rs. 10,120.071)

3rd Winner – Prize from PenTest Magazine worth $98.4 (Rs. 6,227.736)

The winners might also get an invincible opportunity to see their blogs being published on the most sought after IT security magazine, the PenTest magazine.

 

Guidelines:

Pen down your views on any of the below mentioned topics

  • Social Engineering
  • Security Audits
  • Security Tool (Elaborate a particular tool)
  • Security Incidents (Analysis of recent security incident with detail covering vulnerability, exploit used, risk, impact)
  • Why hire, just pay Bounty! (Opinion on Bug Bounties)
  • Can hacking ever be ‘Ethical’?
  • Privacy in Connected world
  • Bitcoin, past – present – future
  1. Count your words to a minimum of 400 and a maximum of 600
  2. Participants have to mail us their entries (in word or pdf format ) at blog@teammatrix.org
  3. Ensure to put your Full Name, Contact/Mobile Number, Email Address in the document.
  4. Multiple blog entries per participant is permissible
  5. Entries will be accepted till 25th September, 2013
  6. Once submitted, PenTest Magazine reserves rights to publish the articles provided by the participants
  7. No pattern or template to be adhered to, write freestyle!

Blogging is to writing what extreme sports are to athletics: more free-form, more accident-prone, less formal, and more alive. It is, in many ways, writing out loud. So..  Get ready to blog on a topic and share your ideas about Information security. Now is a chance to become a part of CSAM’13 by winning valuable prizes and spreading awareness through your own writing!!

The event starts from 15th September, 2013! So come one, come all!

To get more details visit our CSAM’13 page – https://www.facebook.com/CSAM.SCIT

Information security enthusiasts can follow us on –

Join our Facebook Group – https://www.facebook.com/groups/TeamMatrix0911/

Follow Team Matrix on Twitter – https://twitter.com/MatrixSCIT

 

Swetha Sivankumar | Marketing & Branding CSAM’13

Symbiosis Centre for Information Technology

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’13 TShirt, Buy today!

$
0
0

Here we unveil our Most awaited T Shirt for CSAM’13.

Price: Rs.300 – Best Quality T Shirt Guaranteed.

Delivery of T Shirt by 30th September.

For people ordering from outside Pune, we will ship it to your desired location but Courier charges will be extra!

Don’t worry about Quality, you are paying for one of the best T Shirt that you have ever bought from college fests/events.

For any other details mail us at – csam@teammatrix.org

Click on the images to Zoom | To Order fill Form : Order Online


Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

IBM Cyber Security Challenge

$
0
0

The “IBM Cyber Security Challenge” is presented by CSAM’13 in association with IBM. It provides an opportunity for students to assess their techno-managerial capabilities on Cyber Security. The students have to form a group of 2 members. They will be given a great chance to work on a real life case study. The flow of events will be as follows:

  • In the first round, the students have to identify the risks in the case study provided to them
  • After short listing the top groups, the mitigation plans have to be provided for the same by the students
  • The final round would be conducted on 2nd October and the shortlisted students will have to present their ideas to a panel from IBM

This event aims at spreading better awareness and understanding of information security programs. It promises to help the students to connect with like-minded people and build new networks of friends that share similar interests and ambitions. The students will have to make a face to face presentation to an experienced panel from IBM, thus giving them an unmatched exposure.

The prizes for the winners will be:

  • The team securing the first prize would be awarded 2 laptops
  • The Runner Up team would be awarded 2 portable hard disks
  • Certificates would be awarded to the participants

The IBM Cyber Security Challenge Event schedule looks like below –

To get more details visit our CSAM’13 page – https://www.facebook.com/CSAM.SCIT

Information security enthusiasts can follow us on –

Join our Facebook Group – https://www.facebook.com/groups/TeamMatrix0911/

Follow Team Matrix on Twitter – https://twitter.com/MatrixSCIT

 

Rugved Mehta | Marketing & Branding – CSAM’13

Symbiosis Centre for Information Technology

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

IBM Webinar Series

$
0
0

In the wake of the upcoming Cyber Security Awareness Month, Team Matrix of SCIT has been organizing a series of Webinars in collaboration with IBM – our Title Sponsor.

These Webinars cover the most burning and trending topics that affect the world of Cyber Security these days and have been rendered by some of the Best Industry Experts from IBM

They covered topics such as:

  • Risk Assessment-A security Concern
  • IBM Security Overview
  • Cyber Security
  • Mobile Security

The students were enlightened on a plethora of concepts and topics related to Information Security and Risk Management.

According to Survey conducted by IBM, the top 3 risks include:

  • Data Breach
  • System Failure
  • Data Loss

Companies have off lately started recognizing the relation between IT Risk and Reputation.

The speakers also raised a case of increased investments in IT Risk and Security.

The most impressive part of the entire series was the clarity of content and the comprehension with real life examples that made it so easy to understand these topics.

Khushboo Srivastava | Marketing & Branding – CSAM’13

Symbiosis Centre for Information Technology

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’14: The Events Catalogue

$
0
0

csam14fbnew

Team Matrix and SCIT will be back this October when we celebrate the Cyber Security Awareness Month! This awareness programme which has a global outreach will invite people from various communities together to discuss how Information Security is everyone’s shared responsibility. With an array of assorted events and discussions lined up, CSAM’14 is on course to scale new heights!

While the Online events will generate a buzz, a sense of inquisitiveness about what’s to come during the main event, the D-Day events will focus on how we should nurture the growth of Information technology by making each of us self-reliant and responsible for securing ourselves online.
The dossier of assorted online events to generate interest among the audience is given below.

Online Pre-Events:

Sr. No Event Week Description
1 Hackathon Starting from 14th September to 28th September Draw out your tools of hacking to do the ultimate cracking!!!For the first time in SCIT, we showcase the “HacKaThoN” for our premium InfoSec event of the year CSAM-2K14. The paradise for the hackers and champion code crackers is here as we bring on 10 challenging levels with each be littering the other. The mission is to lookout for all the possible vulnerabilities that the challenges present. To make it easier, multiple hints are plotted at each of the level. The competition extends over the extended duration of two weeks to grab the final bounty. As the game progresses, you add points to your tally to keep up in the fight. The ultimate warrior who completes the challenges in the minimum time span eliminates all its competitors and will be crowned as the first titleholders of “HacKaThoN”. So here’s your chance to say “Bring It On” and beat the sloggers.
2 Crossword Starting from 10th September to 14th September This CROSSWORD event provides an opportunity for the participants to know his/her awareness and depth of knowledge on various modules in security domain and tests his/her logical thinking and time efficiency. The team which fills more number of correct words in the CROSS WORD will be declared as the winner of the event.CROSS WORD is one of the CSAM pre events which comprises of 10 clues. Each clue can be a definition or a question and its answer constitutes to a word in the Cross Word. These clues will be from security domain covering various topics like database security, risk management, principles and standards of security management, security models. Each correctly filled word in the Cross word gains one point.

CSAM aims at creating an impact on every individual’s mind about the importance of Cyber Security. What better way to achieve this than to hear the thoughts from prominent professionals from the field of Information Security themselves! The D-Day events will see industry experts coming together to have healthy discussions which would endorse the security awareness programme and how upholding cyber security for a business implies enhancing reputation of the organization and reducing financial losses.

Flagship Day events*: 2nd October 2014

Event Description
Treasure Hunt All that glitters is not always gold. But it can be precious stones and pearls as well!!!The Pandora’s Box is finally open as we at SCIT give you the opportunity to grab the ultimate bounty of its own kind. This October SCIT brings to you “Treasure Hunt” on its premium InfoSec event of the year CSAM-2K14. This unique event helps you not only to team up and look for the clues, but also tickle your gritty brain cells to decode them in the most distinctive way possible. To add to the challenge, a ticking clock is always there to keep everyone on their toes. If you think it’s a child’s play, then get ready to be boggled as you cannot triumph this without your opponent’s help. So if you think you know how to convince or confuse, here’s your path to be the “Supreme Pirate”.
Panel Discussion
Interested in Information Security? Do you have a thirst to be updated about the latest happenings in this field? Have you always wanted to share your views in a forum with successful people from the industry? The wait is now over.
This Cyber Security Awareness Month we bring to you the chance to take part in PANEL DISCUSSION. In this on-the-day event you get to hear pioneers from the field share their insights on various emerging security topics. You get to listen to their experiences over the years and how cyber security has evolved over time. You can also interact and share your views with them.
As technology grows, the importance of security grows too. Huge organizations have ceased to exist because they dint give much importance to information security. We no longer live in the era where having a password meant we are secure. We can no longer be deaf and blind to the various security developments around us. It’s time we updated ourselves with the latest hypes in this field. So don’t miss this great opportunity to get your queries sorted and to take back loads of new security information.
Case Study From Keywords CASE STUDY FORM KEYWORDS is one of the CSAM pre events which comprises of 3 sets of 5 keywords given to each participating team. Each team has to first select one set of key words from the given 3. Then each team has to use the 5 selected keywords to write a meaning full case study. Each team will get 30 minutes.
Role-Play Audit Participants’ would be provided with a case/ scenario for which they have to come up with suitable information security practises (general and not specific to any standard) that can be implemented. The case studies would be rolled out to the participants 10 days prior to the CSAM event day (Oct 2, 2014). This round would test the participants’ ability to frame relevant information security practises and the ability to foresee any risk in the case of the absence of those practises and policies. Only those teams that are selected in this round would move on to the next round (Round-2).

Register For Events

For more details reach us on:
Facebook: https://www.facebook.com/CSAM.SCIT
Twitter: https://twitter.com/TeamMatr1x

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’14: A Fight Against All Odds

$
0
0

Cyber Security Awareness Month- A fight against all odds

We as human like to stay connected with our close and dear ones may whatever be the medium. And internet being the mother of all communication channels in the current shrinking world has become a vital part in our daily life. Due to the overutilization of internet in the present scenario, it is now under the greatest risk of threats life cyber fraud, information theft and unethical abuse of the system breaches. The vulnerabilities that the internet is showing everyday have opened an ocean of opportunities for the cyber criminals. To fight this; probably ever going battle, a need for spreading awareness on the issues and challenges has given rise to the concept called Cyber Security Awareness Month.

National Cyber Security Awareness Month (Commonly called NCSAM) was started by the United States of America in 2004 under the sponsorship provided by the National Cyber Security Division (NCSD) within the Department of Homeland Security and the National Cyber Security Alliance (NCSA, a non-profit organization). Each year NCSAM is observed in the month of October to encourage observance and fortification by all the computer users. Looking at the growing need and encouragement for a cause as such, various European countries have started to adopt this in their culture as well.

Ever since the inception of CSAM, we at SCIT have been the only institutional body to perceive this each year around India. The SCIT family has been the only vigilante to spread the awareness with the help of their sponsors and the participants by conducting events on a national level and observing it in the campus on a particular day to make it a bigger success. This year being the 11th year of the episode, SCIT is back with larger than life events to fight the greater battle.

 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’14: SCIT Gears Up For CSAM

$
0
0

There are lots of prizes to be won; so, don’t miss out on this opportunity!

What started in October 2004 as National Cyber Security Awareness Month by the U.S. Department of Homeland Security as a broad effort to help all Americans stay safer and secure online, has turned into a worldwide event now. CSAM aims to spread awareness about cyber security and how it is everyone’s “shared responsibility”. This theme reflects the role that everyone – from large enterprises to individual computer users – has in securing the digital assets in their control.

This year SCIT, along with ISACA and Team Matrix, is proud to present the annual Cyber Security Awareness Month at SIC campus. SCIT is the only institution in India that conducts this event every year-round. Like before, we have plenty of online events and flagship day events lined up for you. These events are aimed at spreading knowledge and awareness about information security along with bringing a bit on fun element. Go ahead, start registering yourself for the events at Team Matrix website.

Stay Safe, Stay Secure 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Paper Presentation

$
0
0

“You are a whiz kid when it comes to articulating an idea and stating your viewpoint. And this is your golden chance to do so.”


This is your platform to express yourself, make your views known, explore your ideas and make the best paper presentation ever. Compete with the sharpest minds, lock horns with the best all while standing your ground!

CSAM 2015 welcomes research papers on topics related to Information Security in sufficient detail and depth to be of practical use to interested readers. Selected papers will be published in the CSAM’15 compendium of SCIT.

Areas of interest include the following but not limited to :
1) Internet of Things (IoT).
2) Bring Your Own Devices (BYOD).
3) Cybercrime and Computer Forensics.
4) Securing Virtual machines In Cloud.
5) Big Data Analytics for Security Intelligence.

Team Size: 3

EVENT RULES
1. All papers must be in standard IEEE 2-column format and electronically submitted through mail teammatrix@associates.scit.edu in PDF file with mail subject “Paper Submission for CSAM’15 ”.
2. File name should be the complete topic of the paper.
3. Papers should be original and not submitted elsewhere for publication
4. The maximum paper length is of 8 printed pages.

EVENT SCHEDULE
1. Abstract submission Due: 11th Sept 2015
2. Notification of Abstract Acceptance: 18th Sept 2015
3. Final Paper Due: 25th Sept. 2015
4. Camera ready Paper Submission: 3rd Oct 2015
 
 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Panel Discussion

$
0
0

Interested in Information Security?
Do you have a thirst to be updated about the latest happenings in this field? Have you always wanted to share your views in a forum with successful people from the industry? The wait is now over.

This Cyber Security Awareness Month we bring to you the chance to take part in “PANEL DISCUSSION”. In this on-the-day event you get to hear pioneers from the field share their insights on various emerging security topics. You get to listen to their experiences over the years and how cyber security has evolved over time. You can also interact and share your views with them.

So don’t miss this great opportunity to get your queries sorted and to take back loads of new security information.
 
 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Surfathon

$
0
0

The SEARCH IS ON!

In this Google dependent world, here we are to challenge you to think beyond! Welcome to “Surfathon” where the internet is your playground. Be ready to accumulate all your internet savvy tricks because you will be tested here not on your I.Q but on your “I.Q” (Internet-quotient).
He came. He saw. He searched.

Team Size: maximum 2

EVENT RULES

1. Participants are required to bring their College ID Cards and registration receipts.
2. Details about the Final Round will be given on the spot.
3. All Rounds would be eliminatory in nature.
4. Participants will have to carry watches and manage their time. Volunteers will not assist them in keeping time for any round.
5. Participants are not allowed to communicate/ seek help from anyone other than their own team members.
6. Any damage to property within the SIC campus will lead to immediate disqualification of the team from the game and monetary penalty.
7. Use of cell phones or any other communication device is not allowed during the Final Round.
8. Teams will have to strictly adhere to reporting time for every round, failing which they would be disqualified
9. In case of any changes or discrepancies, the decision of the event coordinators would be final and binding.

EVENT DESCRIPTION

• Teams will be evaluated based on searching speed and time management.
• Rounds:
1. 1st Round will be an online Round in which participants need to search and submit maximum correct responses in least possible time.
2. 2nd round will be held at SIC Campus.

EVENT SCHEDULE
• The 1st round will be an online round going live on 26th & 27th Sept for a specific time.
• The 2nd round i.e. the final round will be held at SIC campus on 3rd Oct.

Contact:
Jenil Desai (9510042441)
 
 

Register for Events

 
 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Sherlock Holmes

$
0
0

THE GAME IS ON!


Do you believe you can be as shrewd as Sherlock Holmes? Do you believe you have that enigma?
Get ready to unleash the detective in you!
One symptom and a dozen possible causations. One stimulus and a hundred plausible responses. Dissecting the cause from the effect, rational from the abstract, critical from the mundane- now possible all at the Symbiosis Campus! Presenting to you the Sherlock Holmes – Case Challenge at CSAM’15, SCIT Pune. Be a part of it to churn the suave investigator out of you!
Solve the case and take the game away!

Team Size: 4

EVENT RULES

1. Teams will have to strictly adhere to reporting time for every round, failing which they would be disqualified.
2. Participants are required to bring their College ID Cards and registration receipts.
3. Details about the Case will be given on the spot.
4. In case none of the teams come with a solution, the teams with nearest to solving the case will be the winner.
5. Participants will have to carry watches and manage their time. Volunteers will not assist them in keeping time for any round.
6. Participants are not allowed to communicate/ seek help from anyone other than their own team members.
7. Any damage to property within the SIC campus will lead to immediate disqualification of the team from the game and monetary penalty.
8. Use of cell phones or any other communication device is not allowed during the event.
9. In case of any changes or discrepancies, the decision of event coordinators would be final and binding.

EVENT DESCRIPTION

• Teams will be tested based on Investigative skills, Observational skills, Critical Thinking skills and Team Co-ordination.
• What the teams should expect when they come to the campus for the event:
1. The teams should be ready to think out of the box as Sherlock Holmes would investigate any case.
2. They will be provided with the actual simulation of a case/situation during the time of the event.

EVENT SCHEDULE
• This event will be held at SIC campus on 3rd Oct.

Contact:
KIRUBAKARAN M (9488469839)
PREETI MOHANTY (7506081251)
 
 

Register for Events

 
 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Quiz Wire

$
0
0

Everything starts with a question, do you have the answer?

Let your intellect shine, let the rolling of brain race with every passing of minute. Let’s bring the sharpest minds together to take on the heat of challenging quiz of the year. CSAM ’15 proudly announces its flagship quizzing event Quiz wire. So put on your thinking hats and come, enjoy this mega event.

What you seek is seeking you. ~ Rumi

Team Size: 2

EVENT RULES

1. The Quiz competition is open for all.
2. The Event is conducted in two phases:

  • Online quiz
  • Offline quiz

3. The Teams qualified from Online Quiz will be intimated through mail for the final round.
4. The team should be of 2 members.
5. First, the team leader first has to register online with the team member(s).
6. Offline quiz will be conducted in college premises on CSAM-2015 event day.
7. The participating team members should carry their College ID Card and registration mail copy.
8. Use of cell phones or any other communication device is not allowed during the event.
9. In case of any changes or discrepancies, the decision of event coordinators would be final and binding.

EVENT DESCRIPTION

• Teams will be tested based on Team Co-ordination, Leadership Skills, General knowledge, Basic Knowledge related to information security, Decision making based on intuitive skills and Analytical Skills.

EVENT SCHEDULE
• The online quiz will be live on 19th-21st September for a specific time. The results of this round will be announced after a week.
• The offline quiz i.e. the final round will be held at SIC campus on 3rd Oct.

Contact:
Swaminathan S (9767934938)
Shiv Sanket (9920730282)
 
 

Register for Events

 
 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Cryptic

$
0
0

What’s the Clue?

Do you think you know every part of your computer, everything that runs in it? And you could be a treasure hunter like Indiana Jones. Then this is the game for you. Solve the mystery and become a mastermind.

Crack the conundrum and take the game away!

Team Size: 3-4

EVENT RULES

1. Teams will have to strictly adhere to reporting time, failing which they would be disqualified.
2. Participants are required to bring their College ID Cards and registration receipts.
3. Details about the hunt will be given on the spot.
4. In case none of the teams complete hunt, the teams with nearest to complete the hunt will be the winner.
5. Participants will have to carry watches and manage their time. Volunteers will not assist them in keeping time for any round.
6. Participants are not allowed to communicate/ seek help from anyone other than their own team members.
7. Any damage to property within the SIC campus will lead to immediate disqualification of the team from the game and monetary penalty.
8. Use of cell phones or any other communication device is not allowed during the event.
9. In case of any changes or discrepancies, the decision of event coordinators would be final and binding.

EVENT DESCRIPTION

• Teams will be tested based on Problem-Solving skills, Decision making skills, Analytical Skills and Team Co-ordination.
• What the teams should expect when they come to the campus for the event:
1. The teams should be ready to think on the lines that a treasure hunter or scavenger is expected to think.
2. They have to solve the clues and find the treasure, but you never know what comes next.

EVENT SCHEDULE
• The event will be held at SIC campus on 3rd Oct.

Contact:
Ameya Wakaskar (9421547754)
 
 

Register for Events

 
 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

Detective Dramebaaz

$
0
0

Every man at the bottom of his heart believes that he is a born detective.
-John Bucan


So you think you can act and have a detective brain too, well then we have all the right ingredients to make you our own “Byomkesh Bakshi”. Presenting to you detective dramebaaz, a quasi-acting event to take out the actor out of you.

Be ready to smash as it is a dubsmash.

Team Size: 1 or 2.

EVENT RULES
1. Teams will have to register themselves on the official event’s facebook page first.
2. The maximum length of the video should not be more than 10 seconds. Participants will have to manage their own time.
3. Participants are allowed to portray Hollywood or Bollywood dialogues.
4. There should not be any abusive, offensive or double entendre language in the video.
5. Video will be first reviewed by the Admin and then uploaded on the official page.
6. In case of any changes or discrepancies, the decision of event coordinators would be final and binding.

EVENT SCHEDULE
• This event will go live from 19th Sept to 30th Sept.

Contact:
Drashtant Nanavati (7698015090)
 
 ‘

Register for Events

 
 

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’15: Our Shared Responsibility

$
0
0

CSAM’15: Our Shared Responsibility

We live in a world which is more connected than ever before. Whether we realize it or not, but the Internet touches almost all aspects of our daily life. We connect with friends and family, conduct business and online banking and rely on many services, like transportation and electricity that are supported by online systems. Technology has spearheaded advancements in healthcare, education, business, music, government, and many other industries. As technology advances, our lives become easier and more connected. However, being constantly connected brings increased risk of theft, fraud, and abuse. As individuals, cyber security risks can threaten our finances, identity, and privacy. Since our way of life depends on critical infrastructure and the digital technology that operates it, a need for spreading awareness on the issues and challenges has given rise to the concept called “Cyber Security Awareness Month”.
National Cyber Security Awareness Month
(Commonly called NCSAM) was started by the United States of America in 2004 under the sponsorship provided by the National Cyber Security Division (NCSD) within the Department of Homeland Security and the National Cyber Security Alliance (NCSA, a non-profit organization). Each year NCSAM is observed in the month of October to encourage observance and fortification by all the computer users. The overall NCSAM theme is “Our Shared Responsibility” to reflect the notion that cyberspace cannot be secured without the help of all users. Looking at the growing need and encouragement for a cause as such, various European countries have started to adopt this in their culture as well.
Ever since the inception of CSAM, SCIT have been the institutional body which perceives this awareness month in collaboration with SCIT’s own TeamMatrix- Student InfoSec Club and ISACA. As part of CSAM various events are held at the SCIT campus which has its reach on national level making it a huge success. This being the 5th year of the episode, SCIT is back with many lively events to fight the greatest battle.

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’15: The Events Catalogue

$
0
0

Team Matrix and SCIT will be back this October when we celebrate the Cyber Security Awareness Month! This awareness program which has a global outreach will invite people from various communities together to discuss how Information Security is everyone’s shared responsibility. With an array of assorted events and discussions lined up, CSAM’15 is on course to scale new heights!

While the Online events will generate a buzz, a sense of inquisitiveness about what’s to come during the main event, the D-Day events will focus on how we should nurture the growth of Information technology by making each of us self-reliant and responsible for securing ourselves online.

The dossier of assorted events to generate interest among the audience is given below.

Dubsmash Surfathon1 Cryptic1
sherlock Holmes csam15 Quiz Wire
Paper presentation

 

 

 

Register for Events

 
 
For more details reach us on:
Facebook: https://www.facebook.com/CSAM.SCIT
Twitter: https://twitter.com/TeamMatr1x

Share and Enjoy

FacebookTwitterDeliciousLinkedInStumbleUponAdd to favoritesEmailRSS

CSAM’16

Viewing all 34 articles
Browse latest View live




Latest Images