It involves using mathematical concepts and a set of calculations in order to maintain integrity and security of the information being transmitted through various encryption algorithms. It ensures data protection and is widely used.
Mainly used in cybercrimes, it is the investigative process of collecting, recovering, analysing and reporting any valuable digital information in devices. It is used to identify network and memory vulnerabilities and develop ways to mitigate them.
We conduct research on topics such as Side-Channel Attacks, Intrusion Detection and Privacy Enabled Machine Learning. Apart from that we also deal with the different approaches which bring together other fields such as AI/ML & Quantum Computing.
It is the task of deconstructing software to extract information from it. Reverse engineering helps to make a system robust hence ensuring that a system doesn’t have any significant security flaws and protects it from hackers and spyware.
It is a commonly used method to attack websites. It takes advantage of vulnerabilities that exist in order to gain control of the site, such as hosting server, which could result in loss or theft of information. SQL Injection is a common method of Web Exploitation.
A type of cybersecurity competition where competing teams attempt to find security vulnerabilities in services run by the opposing teams. Each team works finding vulnerabilities in other team’s services while protecting their own.
We coordinate the working of the different subsystems of the team. We handle the finance, sponsorship and publicity with regards to all events held by the team, along with handling the Social media handles and the design and graphics