BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Asia/Kolkata
BEGIN:STANDARD
DTSTART:19451014T230000
TZOFFSETFROM:+0630
TZOFFSETTO:+0530
TZNAME:IST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260225T061751Z
UID:B257B060-1B5B-453F-B5AA-A3B0E8577DE3
DTSTART;TZID=Asia/Kolkata:20260117T100000
DTEND;TZID=Asia/Kolkata:20260117T130000
DESCRIPTION:The Cyber Session was conducted to introduce students to the fu
 ndamentals of cybersecurity and ethical hacking. The session focused on bu
 ilding awareness about digital threats and the importance of securing pers
 onal and organizational data in today’s technology-driven world.\n\nKey 
 Topics Covered:\n\n• Network Security: Understanding how networks operat
 e and how firewalls and security protocols help protect data.\n• Digital
  Threats and Vulnerabilities: Overview of malware\, ransomware\, and syste
 m weaknesses that attackers exploit.\n• Phishing and Social Engineering:
  Explanation of how cybercriminals manipulate users through fake emails\, 
 messages\, and websites.\n• Encryption Techniques: Basic understanding o
 f data encryption and secure communication methods.\n• Ethical Hacking C
 oncepts: Introduction to penetration testing and the role of ethical hacke
 rs in identifying security loopholes.\n\nLive demonstrations were conducte
 d to show how weak passwords\, unsecured websites\, and phishing attempts 
 can compromise data. The session also highlighted preventive measures such
  as strong password policies\, multi-factor authentication\, and regular s
 ystem updates.\n\nThe interactive nature of the session encouraged student
 s to ask questions regarding cybersecurity careers\, certifications\, and 
 practical applications. Overall\, the session successfully enhanced awaren
 ess about digital safety and motivated students to explore cybersecurity a
 s a potential career domain.\n\nRoom: CR-3\, Bldg: Academic Block\, Jaypee
  University Of Information Technology\, Solan\, Himachal Pradesh\, India\,
  173234
LOCATION:Room: CR-3\, Bldg: Academic Block\, Jaypee University Of Informati
 on Technology\, Solan\, Himachal Pradesh\, India\, 173234
ORGANIZER:ieee.juit@juitsolan.in
SEQUENCE:7
SUMMARY:IOT Cyber Session
URL;VALUE=URI:https://events.vtools.ieee.org/m/542346
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: cente
 r\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;\,serif\; m
 so-no-proof: yes\;&quot;&gt;&lt;!-- [if gte vml 1]&gt;&lt;v:shapetype\n id=&quot;_x0000_t75&quot; coo
 rdsize=&quot;21600\,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot;\n path=&quot;m@4@5l@4@11@
 9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;\n &lt;v:stroke joinstyle=&quot;miter&quot;/&gt;\n &lt;v:f
 ormulas&gt;\n  &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;/&gt;\n  &lt;v:f eqn=&quot;sum @0
  1 0&quot;/&gt;\n  &lt;v:f eqn=&quot;sum 0 0 @1&quot;/&gt;\n  &lt;v:f eqn=&quot;prod @2 1 2&quot;/&gt;\n  &lt;v:f eqn
 =&quot;prod @3 21600 pixelWidth&quot;/&gt;\n  &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;/&gt;\n 
  &lt;v:f eqn=&quot;sum @0 0 1&quot;/&gt;\n  &lt;v:f eqn=&quot;prod @6 1 2&quot;/&gt;\n  &lt;v:f eqn=&quot;prod @7 
 21600 pixelWidth&quot;/&gt;\n  &lt;v:f eqn=&quot;sum @8 21600 0&quot;/&gt;\n  &lt;v:f eqn=&quot;prod @7 21
 600 pixelHeight&quot;/&gt;\n  &lt;v:f eqn=&quot;sum @10 21600 0&quot;/&gt;\n &lt;/v:formulas&gt;\n &lt;v:pa
 th o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;/&gt;\n &lt;o:lock 
 v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;/&gt;\n&lt;/v:shapetype&gt;&lt;v:shape id=&quot;Picture_x0020_5
 &quot; o:spid=&quot;_x0000_i1027&quot; type=&quot;#_x0000_t75&quot;\n style=&#39;width:226.8pt\;height:
 234pt\;visibility:visible\;mso-wrap-style:square&#39;&gt;\n &lt;v:imagedata src=&quot;fil
 e:///C:/Users/harsh/AppData/Local/Temp/msohtmlclip1/01/clip_image001.png&quot;\
 n  o:title=&quot;&quot;/&gt;\n&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!-- [if !vml]--&gt;&lt;img src=&quot;https://
 events.vtools.ieee.org/vtools_ui/media/display/7525823f-c123-45e5-bf29-b0c
 93ef69f83&quot; width=&quot;302&quot; height=&quot;312&quot;&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;M
 soNormal&quot;&gt;&lt;span style=&quot;font-size: 12.0pt\; line-height: 107%\; font-family
 : &#39;Times New Roman&#39;\,serif\;&quot;&gt;The Cyber Session was conducted to introduce
  students to the fundamentals of cybersecurity and ethical hacking. The se
 ssion focused on building awareness about digital threats and the importan
 ce of securing personal and organizational data in today&amp;rsquo\;s technolo
 gy-driven world.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;strong&gt;&lt;span style=&quot;fon
 t-size: 12.0pt\; line-height: 107%\; font-family: &#39;Times New Roman&#39;\,serif
 \;&quot;&gt;Key Topics Covered:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span st
 yle=&quot;font-size: 12.0pt\; line-height: 107%\; font-family: &#39;Times New Roman
 &#39;\,serif\;&quot;&gt;&amp;bull\; &lt;strong&gt;Network Security:&lt;/strong&gt; Understanding how n
 etworks operate and how firewalls and security protocols help protect data
 .&lt;br&gt;&amp;bull\; &lt;strong&gt;Digital Threats and Vulnerabilities:&lt;/strong&gt; Overvie
 w of malware\, ransomware\, and system weaknesses that attackers exploit.&lt;
 br&gt;&amp;bull\; &lt;strong&gt;Phishing and Social Engineering:&lt;/strong&gt; Explanation o
 f how cybercriminals manipulate users through fake emails\, messages\, and
  websites.&lt;br&gt;&amp;bull\; &lt;strong&gt;Encryption Techniques:&lt;/strong&gt; Basic unders
 tanding of data encryption and secure communication methods.&lt;br&gt;&amp;bull\; &lt;s
 trong&gt;Ethical Hacking Concepts:&lt;/strong&gt; Introduction to penetration testi
 ng and the role of ethical hackers in identifying security loopholes.&lt;/spa
 n&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: 12.0pt\; line-height:
  107%\; font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;Live demonstrations were 
 conducted to show how weak passwords\, unsecured websites\, and phishing a
 ttempts can compromise data. The session also highlighted preventive measu
 res such as strong password policies\, multi-factor authentication\, and r
 egular system updates.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-
 size: 12.0pt\; line-height: 107%\; font-family: &#39;Times New Roman&#39;\,serif\;
 &quot;&gt;The interactive nature of the session encouraged students to ask questio
 ns regarding cybersecurity careers\, certifications\, and practical applic
 ations. Overall\, the session successfully enhanced awareness about digita
 l safety and motivated students to explore cybersecurity as a potential ca
 reer domain.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;mso-no-proof: y
 es\;&quot;&gt;&lt;img src=&quot;https://events.vtools.ieee.org/vtools_ui/media/display/965
 071a1-e81f-4d04-9b1e-5304def5fb7e&quot; width=&quot;565&quot; height=&quot;259&quot;&gt;&amp;nbsp\; &amp;nbsp\
 ;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span style=&quot;mso-no-proof: yes\;&quot;&gt;&lt;!-- [if gte vml 1
 ]&gt;&lt;v:shape\n id=&quot;Picture_x0020_29&quot; o:spid=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75
 &quot; style=&#39;width:451.2pt\;\n height:301.2pt\;visibility:visible\;mso-wrap-st
 yle:square&#39;&gt;\n &lt;v:imagedata src=&quot;file:///C:/Users/harsh/AppData/Local/Temp
 /msohtmlclip1/01/clip_image005.jpg&quot;\n  o:title=&quot;&quot;/&gt;\n&lt;/v:shape&gt;&lt;![endif]--
 &gt;&lt;!-- [if !vml]--&gt;&lt;img src=&quot;https://events.vtools.ieee.org/vtools_ui/media
 /display/30336968-75c0-4d53-b9cf-f4c0ab22d177&quot; width=&quot;384&quot; height=&quot;257&quot;&gt;&lt;!
 --[endif]--&gt;&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

