Security of Naval Base

This writing is in response to and continuation of Prof. Ross Anderson’s book’s first chapter topic – i.e. Example of MilitaryBase [1].The security of the Naval base is also as important as the security of other military bases. However, one needs to investigate it from the perspective of a Naval war strategist. Imagine a war […]

PHD Proposal – Privacy Enhancing Technologies to Support Anonymous Communication

In year 2011, after coming from the United Kingdom I submitted a PHD Proposal to the Security Group of Cambridge University (to Dr. Steven J. Murdoch) which was rejected by him (Reason: not known. But probably my PHD research proposal was not well written in the eyes of Dr. Steven J. Murdoch). Dr. Murdoch [7] […]

Shadow IT

Quite recently, I submitted an assignment on “Shadow IT”. I want to share some of its data with the blog readers. According to Forcepoint.com [1], “Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval”. E.g. BYOD, use of cloud services like Dropbox, Google Drive, One […]

How to bridge the gap between industry and academia in Pakistan

First of all, let me justify why I am writing on this topic. The answer is that, as per my own experiences and apart from foundation knowledge that is taught in academic institutes in Pakistan, it does not meet the up-to-date requirements of the industry. The question is why I am saying it? The educational […]

میں سیکیورٹی انجینئرنگ کے بارے میں کیوں لکھ رہا ہوں؟

اسکول، کالج اور یونیورسٹیوں میں تعلیم کے دوران، میرے میجر سائنس/کمپیوٹنگ/آئی ٹی/انجینئرنگ کے شعبے میں تھے۔ خاص طور پر، آکسفورڈ یونیورسٹی میں، میں نے حفاظتی اصولوں کے عنوان کے ساتھ ایک کورس میں شرکت کی جسے پروفیسر اینڈریو مارٹن نے پڑھایا تھا۔ پیشگی مطالعہ کے لیے، میں نے سیکیورٹی انجینئرنگ کے عنوان کے ساتھ کتاب […]

Autobiography of Edward Snowden – Permanent Record

Last week, I read the autobiography of Edward Snowden – Permanent Record. I would like to mention here that I have already watched Edward Snowden’s movie on Netflix a few years back. I also would like to mention here that there is a difference between watching the movie and reading the book. I have some […]

Book of Frank Stajano – “Security for Ubiquitous Computing”

Yesterday, while surfing internet and searching for people who have contributed in the area of Cyber Security, I have come to know about Cambridge University’s Professor Dr. Frank Stajano. His official university home page can be found here. Professor Frank Stajano also runs a youtube channel, where he post knowledgeable material/things. I also come to […]

How to distribute time in a day?

A few days ago, I was reading a post on Linkedin which was about the distribution of a day. To be honest, I really liked it and I would like to share with the viewer of my site. Pratik Thakker shared Ridhi Bansal’s words about distribution of a day. “Distribute your day into 8+8+8 hrs […]

میرا تعارف اردو زبان میں

میرا نام محمد نوید خورشید ہے۔ میرا تعلق پاکستان سے ہے۔ میں نے پاکستان کی بحریہ – بحریہ یونیورسٹی سے بیچلر آف سافٹ ویئر انجینئرنگ کی ڈگری حاصل کی ہے۔ اس کے بعد یونیورسٹی آف ہرٹ فورڈ شائر، برطانیہ سے ڈسٹری بیوٹڈ سسٹمز اور نیٹ ورکس میں پوسٹ گریجویٹ ڈپلومہ؛ اس کے بعد آکسفورڈ یونیورسٹی، […]

Operating System

After joining the National University of Computer and Emerging Sciences – FAST, I have been given the task of instructing three subjects to four different classes. Two of them are operating systems, one of them is computer networks, and one of them is Vulnerability Assessment and Reverse Engineering. So far in the operating system, I […]