IEEE Computer Society (Singapore Section)

IEEE

Seminars by Prof. Subramanian

Subramanian pic

Today we had two interesting talks presented by Prof. K Subramanian.
Vice Chair, IEEE Computer, Education Society Delhi Section;
Chair, Technology Management Council, IEEE Delhi.

About the speaker:

Prof. K Subramanian was the first director and Professor at Advanced center for Informatics and Innovative Learning (ACIIL) and introduced Advanced Technology, Engineering and Management Courses at the Masters Level and started Research Programs in the Interdisciplinary areas of Knowledge Management, Informatics and Information and Communications Technologies and Management through Partnership Institutions at IGNOU.

He has contributed to many International/National Bodies: as a Panel Member in some of UN Technological Committees including ICAO(International Civil Aviation Organisation), served as the Indian Representative in the International Federation for Information Processing (IFIP), TC-11, Immediate Past Chairman of Bureau of Indian Standards’ LTD-38 -Committee on Information systems & Security, Member-MSD 7: Quality management systems committee of BIS in finance and also as a Member for Universal curriculum committee in the area of IT security and audit–ISACA (USA). He was the Vice chairman of the Task force on Identity managemet, set up by Government of Indias Department of Information Technology and awarded a UN fellowship.

Prof. Subramanian was also a Visiting Professor at National Institute for Multimedia Education, Japan, adjunct professor at IIM Lucknow, IIT Delhi, Fore School of Management, IIM Bangalore, IMT Ghaziabad, MDI and NILLM, IIITM Kerala, IIIT Bangalore.

Prof. Subramanian holds a B.Sc. degree from Madras University and B.E., M.E. in Electronics and Communications Engineering and Ph.D. in Computer Science & Automation from Indian Institute of Science, Bangalore. Awarded Doctor of the Faculty Degree from Commonwealth Open University, UK and appointed as a Life Visiting Professor at COU.

[nggallery id=17]

Securing the Unsecured in Cyberspace: Cyber Security→Cyber Assurance

Internet, Globalization, the Information technology and web technologies have made the world flat today as a global village, transcending political and national boundaries.  They interconnect people all over the world in the virtual world of cyberspace– the virtual space behind the computer screen. Innovations in communications technology keep us all wired 24/7.  Cyberspace is currently used for social interactions and networking through emails, instant messaging or video telephony, while the commercial enterprises and organizations transact business globally, transferring massive information and funds at phenomenal speed through optical fibres using wireless and satellite technology.

With the advent of Internet of Things and the associated technologies, we can see and feel the reorientation of business transformations, business deliveries and electronic transactions handled and Electronic Delivery Systems undergoing massive transformation.  As organizations have become more dependent on the networks and business transactions, external data sharing and simple day to day communications, the need drives the networks to be more transparent and accessible but also protected from illegal access and abuse.   It is also fraught with threats from organized criminals of the Cyber underworld running an underground Cyber Economy.  There is thus a need for governing this virtual world to support global social, political, economic collaboration and exchange while managing associated risks. The objective is to provide trustworthy and efficient computing in Cyber space, calling for a effective Governance of cyberspace. This is a paradigm shift from eSecurity to eAssurance1 in cyberspace. This presentation outlines the ramifications of governing such a cyberspace that impacts individual human life, social life, global business and governments on such a massive scale in a border-less world, and describes the different facets of Cyber Governance and how do we design and implement efficient, effective and trustworthy Cyber Governance systems?  Ultimately Cyber Governance must lead to cyber-assurance, that Governance leads to IT value delivery and IT risk management, with due consideration of  the global, national and corporate perspectives of Cyber Governance and Cyber Assurance. A multilayer model Cyber/Business Assurance will be outlined, comprising managerial, operational, technical, financial, legal and revenue assurance. The Research Challenges and Cooperation covers Digital Asset Protection, & Assurance, Digital/Cyber Forensics for BFSI, Energy, Aviation, Transportation, IT/ITes services, Health Care & education, Threat Models for insiders’ threats & External Threats, Security Assurance for Digital Archives-Protect tools and techniques.

Today the current security solutions are basically comprised of multi-point products designed for an isolated task (such as detecting a virus, preventing an intrusion).  This results in lack of interoperability, unmanageability and a higher cost of ownership. Integrated security is emerging as an effective approach to address the new challenges. Multiple security technologies such as anti-virus, firewall intrusion and combines policy compliance management, service and support and advance research for more complete protection.  The holistic addressing of security at each tier and of the network (i.e. client, server, gateway), the organizations are able to reduce cost, improve manageability, enhance performance, tighten security and reduce risk exposure. A challenge of perfect security is not practical, economical, or achievable—Sound practices, not best practices, will prevail. The elements of any holistic model need to address culture, policy and procedures, technology, alliances, harmonized legislation, and trusted enterprise challenges. eSecurity, Group sector specific standards & Six Sigma Approach:

Different standards covers different aspects of the process, environment, services, quality etc., No one Standard Covers All.  Every enterprise expects an assurance and cyber assurance is complex.

Assuring Quality Engineering Education for ALL

A Techno-Management framework covering content development, faculty interaction, and delivery and Educational governance Using Open source-Technology is an Enabler for Sustainable development

Emerging Telecommunications, Information & Media Technologies play a vital role in social development of any nation.  In a developing country like India, the Information Technologies and another associated supporting technologies facilitate, catalyze and help in organizing, gathering, structuring, analyzing and making information available for decision makers for devising and implementing various socio-economic development programs for making India as “super power in the new millennium”.  In order to thrive in this transition economies, the Information and Communication Technologies play a vital role in the way in which businesses are conducted, enable cost economy and improve the productivity of the work force in order to compete and survive in the market/consumer driven environments.  What we have at present is “a first generation system/process, a second generation layer, third generation concepts, fourth generation computers and fifth generation aspirations”.  The parameters, which are driving global competitiveness such as TQM, use of IT, innovation, market penetration, implementation strategies and up gradation in the work place are vital to be adapted in the Indian environment to adapt a “framework of transition”.  This involves, Re-literate the Mind, Re-tool the Body and Re-vitalize the Spirit.  We have to graduate from not only automating the environments but also work out strategies for managing around outcomes, from individual excellence to team excellence and also utilizing communication to service at all levels.  Legacy systems/processes/procedures/rules inherited to be reframed for self-reliance.  We are going to experience a fast phase of change in the next few years compared to the last 50 years what we had.  We are going to be pushed into living with uncertainty in the years to come.  What we need is speed of action, which matters the entire operation of the Governance, Government, Industry and Services.  The technological/regulatory/time/distance barriers are slowly disappearing.  The convergence of technologies and use of Internet as a catalyst and emerging of global telecommunication is opening new worlds for the individuals and society.  The more high tech we get, the more high touch we are in this paradoxical world.  The challenges such as People, Processes, Customers and Partners to work out successful relationship and achieve operational excellence and make organizations more effective by use of these technologies and processes.  The global network is driven by self-organizing concept and the feedback system enables self-correction.  The transformation is from the “Technological phenomena” to the “Social phenomena” which will enable the money to grow towards “Talent Energizing Resources”.  “The Internet changes everything”.  Every worker is transformed to be a knowledge worker.  The businesses will become customer centric.  The knowledge management assumes greater significance.  The business and commerce will become more “E” centric.  The companies/industry will reform itself to work in the newly wired economy.  The whole world will become global village.  The Technologies will pave the way for better-managed economies.  Any country adapting the above strategies will certainly become the super power in the next millennium.  Every country has to frame a strategy, vision, mission and implementation priorities with customization and localization of needs. The Internet, which is a fast development open infrastructure, is deployed for education and has opened up new opportunities in learning.  It offers companies a powerful tool to turbo charge their work-force learning efforts.  It creates new “learning space” industry.  E-Learning enables reinventing the way we learn things in our life.  e-Learning is an appealing innovative concept for companies and learners.  New learning value proposition where the power of the responsibility of learning is given to the individual learners.  In the past, organizations and trainers were the ones who took charge in providing learning opportunities and designing contents.  With e-learning, learners can receive customized training curricula according to his needs and his own time, pace and plays without compromising its effectiveness.  Learning content can be granulized into bite-sized modules that meets the learners’ needs.  Learner can also engage in collaborative learning and benefit from the experience and expertise of like-minded learners worldwide.  This is impossible at the traditional set up except at an exorbitant cost.  E-Learning offers plug-and-play training modularity, thus benefiting adult learners, enabling them effectively balance their work and family commitments while learning and enriching their skill sets.  It enables learner access to knowledge information resources and services on a scale unimagined before. E-Learning hence makes learning “convenient, relevant and enjoyable”. Everyone is talking about “change” in the new millennium.  The only one constant thing in the world is “change”.  The change is changing faster with new generation of inventions.  There are two components of the change, one is pace of change and other one is force of change.  To achieve 15 Million users penetration, telephone technology took 75 years, radio technology took 30 years, TV technology took 13 years, wireless technology took 12 years and Internet technology took only less than 5 years.  The convergence of technologies leads to e-revolution.  The four ‘C’s assume greater significance. C-ComputerGiga htz. Chips will make super computers to be available on desktops; C-Communication Voice over I/P, fax over I/P, email, Music (MP3), video image (streaming technology), 3 G wireless. C-Content New media development-multi-media technologies ;C-Consumer Electronics Intelligent and interactive appliances and interfaces.  Today personal computers streams video; the telephone provides access to WEB, wireless phones handle online transaction, tomorrow Internet based devices will do everything with the limitation of our own Imagination and Creativity. Technology is Neutral; the challenge is to enhance technology and innovate with it ahead of competition.   Creative destruction is the new rule of the game.  What worked well in the old economy has lost relevance in the new economy.  Old economies thrust on quality and productivity level to low cost production and high margin of productivity.  New economy stress on bright ideas, which are the new raw materials from making everything intelligent and integrated to the work culture.  Competitive issue is value creation; new break through products and services is the need of the hour.  Designing effective learning solutions to implement on demand learning.-Success of e-learning depends on the way learning solutions are designed and content is delivered.  An effective and appropriate pedagogy is required to teach learners and verify that they acquire the knowledge and competence to the desired level.  Design of response in e-learning environment is the need of the hour.  It is based on the content and process information based cognitive and learning models.

Comments are closed.