KOLLAM: Governor P. Sathasivam said cyber laws should be introduced as part of the academic syllabus right from the school level to make the public aware of the dangers posed by the misuse of social media. “It is true that the social media are the best tools of self-expression, but a large percentage of its users are not aware of the dangers posed by the misuse of such media. In fact, for a majority of people, the line between use and abuse is just not clear. This calls for introducing cyber laws as part of the syllabus, right from the school level,” the Governor said.
He was inaugurating the 9th edition of the two-day international cyber security conference COCON 2016 organized by the Kerala Police with the support of POLCYB (The society for policing of cyber space) and ISRA (Information Security Research Association) here on Friday. N.K. Premachandran MP presided over the function in which Loknath Behra, State Police Chief, Bessie Pang, Executive Director of Polcyb, Scott Warren, Secretary of Polycyb, Julie Gommes information security consultant Devoteam, and Kollam Police Commissioner Satheesh Bino were also present.
The Governor also emphasised the imminent need to form protocols to maximize the benefits and advantages of cyber space, and also at the same time to control its disadvantages. “There has emerged an IT wing to many a crime, as well as terrorist and other sabotage acts perpetuated. An elaborate Cyber Security Infrastructure is the need of the day to ensure that the blessings of technology are not misused, and if misused, those culprits could be immediately brought before the law,” he said. In the technical session that followed the inaugural session, a talk on ‘emerald city of cyber security’ was presented by Ben Herzberg (Security Group Manager, Imperva Incapsula, Israel).
The talk highlighted the major security issues and misconceptions related to systems and applications on the internet. Julie Gommes (Devoteam, France) gave an enthralling talk about Jihadism and Cryptography titled “From Internet to Softwares”. This talk was about how terrorists use cryptography as a means of communication, email encryption file transfers, and the evolution of pro-jihadist websites. Various other dignitaries and experts from the field presented sessions and talks on areas of cyber hacking and the need for security....