kallam haranadhareddy institute of technology · cyber capabilities. there is of course great...

9
Editor: Prof. B. Satyanarayana R Kallam Ha Advisory Committee: Dr. B. Tara Associate Editors: Mr. Ch. Sams Reddy Department of CSE News Lett aranadhareddy Institute o akeswara Rao , Mr. V Rajiv Jetson sonu , Mr. P. Lakshmikanth Volume 1: Issue:2 July - December 2015 ter of Technology

Upload: others

Post on 08-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

Editor: Prof. B. Satyanarayana Reddy

Kallam Haranadhareddy Institute of Technology

Advisory Committee: Dr. B. Tarakeswara Rao

Associate Editors: Mr. Ch. Samsonu , Mr. P

Satyanarayana Reddy

Department of CSE News Letter

Kallam Haranadhareddy Institute of Technology

Tarakeswara Rao , Mr. V Rajiv Jetson

Samsonu , Mr. P. Lakshmikanth

Volume 1: Issue:2

July - December 2015

Department of CSE News Letter

Kallam Haranadhareddy Institute of Technology

Page 2: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

Message From HOD:

Prof. B. Satyanarayana Reddy

Head , CSE

I would like to appreciate both the students and faculty for supporting the department activities on the

campus and off the campus. Congratulations to the students who got good results and stood as the

toppers in the department.

" Desire is the key to motivation, but it's determination and commitment to an

unrelenting pursuit of your goal - a commitment to excellence - that will enable you to

attain the success you seek".

My dear students and fellow colleagues, Keep Doing the best and wishing you All the best.

We are confident that you will emerge as assets not only to this institution and to the organization you

belong, but also to the country at large.

Computer Science and Engineering Department of KHIT

provides a quality learning environment, in terms of inspiring

teachers, state-of-the-art facilities, experience sharing and

widening the knowledge horizon, interacting with experts from

academia and industry, facilitating the student in the process of

growth in the computer field. Learning is a continuous process and

does not end with the acquisition of a degree, especially because

steady and rapid advances in Computing Technologies shorten the

life of tools and techniques prevalent today.

Page 3: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

Article:

Stuxnet: The World's First Cyber... Boomerang?

Introduction

In June 2012, two years after the initial discovery

of the Stuxnet worm,

an excerpt from David

Sanger's then soon to be released book

entitled Confront and Conceal was published in

the New York Times. This piece, purportedly based

on the testimony of several current and former

American, European and Israeli officials, declared

that Stuxnet – "the world's first fully fledged cyber

weapon" was engineered by the United States and

Israel as part of a wider covert operation aimed at

undermining the Iranian nuclear program. Whilst

the United States and Israel had long been

suspected of developing this complex piece of

malware, Sanger described the nature of their involvement more fully than any previous

account. Operation Olympic Games, the codename for this alleged joint venture, may well have succeeded

in achieving its goal of disrupting Iran's nuclear enrichment program (although this debate is far from

settled) but the deployment of a weaponised worm, which would cause physical damage to a nation-state's

nuclear infrastructure, is likely to have spawned some rather sour implications for International Politics.

The release of the worm is likely to have: 1) fueled an on-going cyber arms race by demonstrating

to other nations the strategic utility of cyber weapons; 2) elevated the severity of the cyber threat by

providing a broad range of actors with a template from which to construct their own cyber weapons; 3) set

a precedent for the use of cyber weapons as instruments of state policy.

Stuxnet's Influence on the Cyber Arms Race: Interest and development in offensive cyber weapons

programs certainly predates the release of Stuxnet. Even prior to its discovery in June 2010, U.S.

intelligence officials had estimated there to be around twenty to thirty militaries with respectable offensive

cyber capabilities. There is of course great difficulty in determining the precise period in which nations

began to build-up their cyber arsenals as, in the words of Richard Clarke, former U.S. presidential advisor

for cyber security, "the entire phenomenon of cyber war is shrouded in such government secrecy that it

makes the Cold War look like a time of openness and transparency".

Events such as the distributed denial of service (DDOS) attacks on Estonia and Georgia in

2007/2008, which saw their business, financial and media online communications severely

hampered, demonstrated the strategic utility of cyberspace and thus would have intensified the emerging

cyber arms race. Stuxnet, however, is widely regarded as a "game changer". Unlike the malware used in

previous cyber attacks, it was highly targeted and designed to achieve a real world outcome. As Industrial

Control System (ICS) security analyst Ralph Langner notes, rather than being designed for denial of

service attacks or industrial espionage, "Stuxnet's goal was to physically destroy a military target not just

metaphorically, but literally".

The appeal of generating a Stuxnet-like cyber weapon for the implementation of state policy is then vast.

The impact the release of this worm is likely to have had on the development and proliferation of cyber

weapons worldwide should not be ignored. Not only are future variants of Stuxnet perfectly suited to

Page 4: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

covert operations because they afford their user a high degree of anonymity, (meaning that states need not

be fearful of retaliation or international condemnation) but they are also low cost when compared to

conventional weaponry and likely to possess tremendous asymmetric properties. But ownership of these

future versions may not be limited to nation-states with ample resources. As the following section will

demonstrate, Stuxnet is likely to have altered the nature of the cyber threat by inspiring and empowering a

wide range of actors.

Stuxnet: A Blueprint for Future Cyber Weapons: Sean Collins and Stephen McCombie state that

"Stuxnet and the future cyber weapons it will inspire have fundamentally changed the scope of cyber

threats". Indeed, whilst the potential of cyber-attacks to be a significant threat to critical infrastructure had

long been discussed, it was the discovery of this malware in 2010 that finally provided the proof of

concept. Not only would this have been likely to inspire militaries to develop similar cyber weapons, but

also a host of other actors including terrorist organizations, organized crime syndicates and hacktivist

groups. Parties interested in replicating this potentially lethal cyber weapon may also be aided by the

freely available analysis on it by security firms and anti-virus vendors such as Symantec, Kaspersky Labs

and Langer Communications. Each have carefully dissected the malware and provided commentary on it.

Whilst this information is of course highly valuable from a defensive standpoint, it could also, as Paulo

Sharkarian has argued, be turned on its head and be used to provide inspiration, information and guidance

for future cyber weapons development.

Cyber Weapons as Instruments of State Policy: Soon after the discovery of the malware in June 2010

speculation grew that this offensive cyber action would open the floodgates to newer, increasingly

devastating digital attacks. The role of the U.S. as a global leader with considerable power to set the

agenda on issues of what is acceptable in terms of global conflict sets a precedent for future consideration

of cyber weapons as a legitimate and effective tool of statecraft. Indeed, the non-violent nature of the

attack may make it appear preferable to conventional kinetic weapons in some ways.

In fact, there have been no follow up attacks on the scale of Stuxnet. However, given the long

planning process for that project and the fact that it remained undetected for many years, this is not in

itself indicative of anything conclusive. The important implications of U.S. involvement in Stuxnet

remain in terms of the way the use of cyber weapons is perceived by the international community.

Whether that is a positive development leading to less violent solutions to global tensions or a negative

development leading to an increase in state-based attacks on critical infrastructure remains to be seen.

Conclusion: It is quite clear that the goal of Stuxnet was to disrupt Iran's nuclear enrichment program.

Regardless of whether this was part of a grander covert operation codenamed Olympic Games, the

implications remain much the same. This paper has argued that the deployment of Stuxnet is likely to

have: 1.) fueled an on-going cyber arms race by demonstrating to other nations the strategic utility of

cyber weapons; 2.) elevated the nature of the cyber threat by not only providing evidence that well-

guarded critical infrastructure could fall victim to a cyber-attack, but also because the malware and the

analysis on it is readily available for a broad range of actors to access; and 3.) set a precedent, which

contributes to the legitimization of cyber weapons as instruments of state policy. This highly sophisticated

weaponized worm may have achieved its objective, but this is likely to have come at a cost; a cost which

may in fact someday come back to harm its original creators.

Page 5: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

Faculty Achievements:

1. Why did the computer go to

the doctor?

2. What belongs to you but

others use it more than you

do?

3. What flies without wings?

4. What is black when you buy

it, red when you use it, and

gray when you throw it away?

5. What five-letter word

becomes shorter when you add

two letters to it?

• Mr. B. Satyanarayana Reddy , Head of the Dept.

attended an International conference conducted at NEC,

13th and 14th Aug,2015. He published a paper in IJCST

Vol. 6 Issue 4, from Oct to Dec 2015. He Attended 21

days DST sponsored training conducted at University

college of Engineering from 14th Oct to 3rd Nov, 2015.

He attended a workshop conducted at R.V.R. & J.C. on

27th and 28th Nov,2015.

• Dr. B. Tarakeswara Rao , attended an International

conference conducted at NEC on 13th and 14th

Aug,2015. He has attended 21 days DST sponsored

training program conducted at University college of

Engineering from 14th Oct to 3rd Nov,2015. He has

attended a workshop conducted at R.V.R & J.C. on 27th

and 28th Nov,2015. He published papers in IJCA Vol. 10

No. 6 in Oct 2015, IJCST Vol.6 issue 4 from Oct to Dec,

2015 , IJCA Vol 132 No.15 in Dec 2015, IJCA Vol 131

No.14 in Dec 2015.

• Mr. V. Rajiv Jetson attended 21 days DST sponsored training at University College of Engineering from 14th

Oct to 3rd Nov 2015. He received “Best Teacher” award for the academic year 2014-15.

• Mr. G. Lakshmi Narayana, attended a 2 day workshop conducted at R.V.R. & J.C. on 27th and 28th Nov 2015.

• Mr. R. Chitti babu attended a 2 day workshop conducted at R.V.R. & J.C. on 27th and 28th Nov 2015.

• Mrs. P.Naga Lakshmi attended a 2 day workshop conducted at R.V.R. & J.C. on 27th and 28th Nov 2015. She

published a paper in IJCA vol. 132 No.15 in Dec 2015.

• Mrs. K. Shanthi attended a 2 day workshop

conducted at R.V.R. & J.C. on 27th and 28th

Nov 2015.

• Mr. CH.Samsonu has attended 21 days DST

sponsored training conducted at University

College of Engineering, from Oct 14th to 3rd

Nov 2015.

• Mrs. M.Nirmala has attended a 2 day

workshop conducted at R.V.R. & J.C. on 27th

and 28th Nov 2015.

• Mr. P. Lakshmi Kanth has attended 21 days

DST sponsored training conducted at

University College of Engineering, from Oct

14th to 3rd Nov 2015.

• Mr. S. Krishna Reddy has attended a 2 day

workshop conducted at R.V.R. & J.C. on 27th

and 28th Nov 2015.

Page 6: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

Students Achievements:

Student Articles:

A beautiful speech by Sundar Pichai - an

IIT-MIT Alumnus:

The cockroach theory for self development

Name: P Sasikala

Year:III Regd.No: 138X1A0553

• Mr. Siva Kishore Student of C.S.E. M.tech, has published a paper,IJCA Vol. 132 No. 15 in Dec, 2015.

• Mr. Kommuri Manoj Student of C.S.E. M.tech, has published a paper, IJCA vol. 131 No.114 in Dec, 2015.

The following inspirational words by Sundar Pichai

makes us to think and change our behavior with people.

At a restaurant, a cockroach suddenly flew from somewhere and sat on a lady. She started screaming out of

fear.

With a panic stricken face and trembling voice, she started jumping, with both her hands desperately trying to

get rid of the cockroach. Her reaction was contagious, as everyone in her group also got panicky. The lady

finally managed to push the cockroach away but ...it landed on another lady in the group.

Now, it was the turn of the other lady in the group to continue the drama.

The waiter rushed forward to their rescue. In the relay of throwing, the cockroach next fell upon the waiter.

The waiter stood firm, composed himself and observed the behavior of the cockroach on his shirt. When he

was confident enough, he grabbed it with his fingers and threw it out of the restaurant.

Sipping my coffee and watching the amusement, the antenna of my mind picked up a few thoughts and

started wondering, was the cockroach responsible for their histrionic behavior? If so, then why was the waiter

not disturbed? He handled it near to perfection, without any chaos.

It is not the cockroach, but the inability of those people to handle the disturbance caused by the cockroach,

that disturbed the ladies.

I realized that, it is not the shouting of my father or my boss or my wife that disturbs me, but it's my inability

to handle the disturbances caused by their shouting that disturbs me. It's not the traffic jams on the road that

disturbs me, but my inability to handle the disturbance caused by the traffic jam that disturbs me. More than

the problem, it's my reaction to the problem that creates chaos in my life.

Lessons learnt from the story:

I understood, I should not react in life. I should always respond. The women reacted, whereas the waiter

responded. Reactions are always instinctive whereas responses are always well thought of.

A beautiful way to understand.......LIFE.

Person who is HAPPY is not because Everything is RIGHT in his Life..

He is HAPPY because his Attitude towards Everything in his Life is Right..!!

Page 7: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

List of events conducted in department:

The following events were conducted in the department during the period july 2015 to December 2015.

26-08-2015

Dr. H.Kalyan Rao

NRI Medical College,

Mangalagiri Guest Lecture on “ Health Awareness”

26-08-2015 Mr.D.Venkata Reddy

CEO,GEMSoft Technologies Interactive Session with students for campus placements

26-08-2015 Mr.Dileep Vaka SDE III,Flipkart,

Hyderabad.

A seminar on Importance of E-Commerce

23-09-2015 Mr. K.Ravi Kumar

National Manager-Technical Training,EDS Technologies,

Bangalore.

Interactive Session with students for campus placements

15-09-2015 Dr. M.Sridhar RVR&JC College of Engg.,

Chowdavaram,Guntur. Guest Lecture

14-12-2015 Mr Sridhar Gatpa

Principal-Education & Research, Infosys,

Bangalore

Interactive Session with students for campus placements

26-09-2015 & 27-09-2015

Mr. R Bala Bhargav

Mr. N Rajesh Reddy

Senior Software Engineer,

Techmahindra

FDP on “ Big Data Analytics and Hadoop”

07-10-2015 &

08-10-2015

Mr. Sk Mansoor Ahmed

E-Systems,

Hyderabad

A Two day workshop on “ Cloud Computing”

Page 8: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their

Toppers List:

Batch: 2012-16 Year: III Sem: II

Results Released on Aug_2015

Photo Regd. No. Name Percentage

128X1A0506 B. Priya Reddy 77.07

128X1A0519 N. Lavanya 76.80

128X1A0530 M. Sri Lakshmi Sindhuja 76.80

Batch: 2013-17 Year: II Sem: II

Results Released on Aug_2015

Photo Regd. No. Name Percentage

138X1A0553 P. Sasikala 90.34

138X1A0573 V. Srikala 80.97

138X1A0513 B. Niharika 80.55

138X1A0557 S. Bhavya 75.59

Answers: 1. Because it had a virus

2. Your name 3. Time 4. Charcoal

5. short

Page 9: Kallam Haranadhareddy Institute of Technology · cyber capabilities. There is of course great difficulty in determining the precise period in which nations began to build-up their