Engineering and Business Intelligence

Is a scientific concentration in the Undiksha Information Systems Study Program which focuses on fields related to the use of data to support business and organizational analysis to be transformed into meaningful knowledge so that it is useful in decision making and business strategy. The concentration of business intelligence engineering focuses on the process of data acquisition, processing data into information, and information dissemination to support business processes.

The research areas covered include:

  • Business Analytics: Data/Web/Text Mining; Sentiment Analysis, Web Analytics; Forecasting/Prediction.
  • Data Management: Big Data, Database and Database Management System (DBMS); Extraction, Transformation, and Load (ETL) System; Data Warehouse (DW), Data Visualization,
  • Computerized Decision Support : Decision Support System, System Modeling and Analysis.
  • Intelligent Systems: Deep Learning, Expert System, Artificial Neural Network, Fuzzy Logic, Genetic Algorithm, Intelligent Agent

Cyber Security

This is one of the scientific concentrations in the Undiksha Information Systems Study Program that focuses on areas related to practices to protect systems, networks, and programs from digital attacks.

Cyber could be a prefix determined from the word cybernetics and has procured the common meaning of through the utilize of a computer which is additionally named as the internet. The word security in common utilization is synonymous with being secure, but as a specialized term security implies not as it were that something is secure, but that it has been secured. Joining the two words together shape the word cyber security is concerned with making the internet secure from dangers, to be specific cyber dangers.

The data and communications innovation (ICT) industry has advanced incredibly over the final half century. With the approach of the web, security gets to be a major concern. ICT gadgets and components are for the most part connect reliable and defenseless to the security assaults. The act of securing ICT frameworks and their substance has come to be known as cybersecurity. Cybersecurity is an vital apparatus in securing and anticipating unauthorized reconnaissance. As commonly utilized, the term cybersecurity alludes to three things:

  • A set of exercises and other measures, specialized and non-technical, aiming to ensure computers, computer systems, related equipment and gadgets program, and the data they contain and communicate, counting computer program and information, as well as other components of the internet, from all dangers, counting dangers to the national security.
  • The degree of assurance coming about from the application of these exercises and measures.
  • The related field of proficient endeavor, counting inquire about and examination, pointed at executing and those exercises and progressing their quality

To secure a computer framework, it is vital to get it the assaults that can be made against it, and these dangers can ordinarily be classified as underneath:

Backdoor attacks Denial of service attack

  • Direct Access attack
  • Eavesdropping
  • Spoofing
  • Phishing

Technology for cybersecurity

  • Cryptographic systems : A widely used cybersecurity system involves the use of codes and ciphers to transform information into unintelligible data.
  • Firewall : Use to block traffic from outside, but it could be also used to block traffic from inside.
  • An Intrusion Detection System (IDS): IDS is an additional protection measure used to detect attack.
  • AntiMalware Software and scanners : Viruses, worms and Trojan horses are all examples of malicious software, or Malware for short. Special so called antiMalware tools are used to detect them and cure an infected system.
  • Secure Socket Layer (SSL) : It is a suite of protocols that is a standard way to achieve a good level of security between web browser and websites.
  • Research Areas in cyber Security
  • Identity, Privacy and Trust Management
  • Malware
  • Biometrics.
  • Cloud Security
  • Computer Forensics
  • Data protection legislation and security
  • Cryptography and Formal Methods

The cyber security investigate activity is an endeavor to characterize a national R&D motivation that's required to enable the nation to urge ahead of enemies and create the innovations. These cutting edge innovations can secure data frameworks and systems. The investigate, improvement, test, assessment and other life cycle contemplations required are distant coming to from innovations that secure people and their data to innovations that will guarantee National Basic Frameworks are much more versatile. The R&D ventures prescribed in this activity must handle the vulnerabilities of nowadays and envision those of long-term . The activity may be a stage to work together to cultivate R&D to advance transformative arrangements and address basic cyber security challenges, through associations among scholastics, Industry and Govt.

Broad research areas

  1. Information Security
    1. Computer Network Security
    2. Application Security
    3. Web Services Security
    4. Mobile Security
    5. Protective Security
    6. Software Security
    7. Wireless & Sensor Network Security
    8. Software Coding Security
    9. Data Capturing devices and Security
    10. Security in Middleware, Interface and Interaction
    11. Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Non-repudiation
    12. Security Management
    13. Security Operations
    14. Digital Trust and Reputation
    15. Spatial Location (Geo-location) and Cyber Travel
    16. Spatial Intelligence Networks (Centralised, Distributed & Hybrid)
    17. Policy, Legal, Legislation & Compliance
    18. Security Standardisation
    19. Law, Legal and Ethical issues
  2. Digital Services
    1. Web Services, Internet Banking, E-Booking
    2. E-Government, Electronic Commerce
    3. Citizens Public Online Services
    4. Mobile Commerce
    5. E-Postal Services, E-Health, E-Learning and Online & Virtual Education
    6. Secure Protocols, Coding and Development
    7. Security Principles, Theory and Analysis
    8. Security Policy, Standards and Procedures
    9. Security in Business Processes
    10. Security Enforcing Function (SEF) Gateways
    11. Intrusion Detection Systems
    12. Intrusion Prevention Systems
    13. Firewalls & Spam identification and protection
    14. Anti-Virus and Anti-Malware Gateways
    15. Data Loss Prevention and Encryption Services
  3. Protection of Digital ServicesΒ 
    1. Protection of Business Information Systems
    2. Protection of Online Services
    3. Public Online Services
    4. Internet Banking
    5. Security, Trust, Privacy
    6. Security in Online Gaming Systems
    7. Security in e-Government and Electoral Systems
    8. Content Security
    9. Protection of Public Online Content Distribution Systems
    10. Secure practices, processes and procedures in Public Online Services
    11. Cryptography -PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
    12. Digital Forensics and Investigations
    13. HoneyPots and Honey Nets
    14. National Information Infrastructure (NII) protection
    15. National Critical Infrastructures (NCI) protection
    16. Critical Network Systems (CNS)