| Current Path : /var/www/html/abhishek/bkp230713/templates/ |
| Current File : /var/www/html/abhishek/bkp230713/templates/lab.html |
<body>
<h1> InfoSec Lab </h1><br>
<div style="position: relative;" id="slideshow2">
<div style="position: absolute; top: 0px; left: 0px; display: block; z-index: 8; opacity: 10; width: 600px; height: 332px;"><a href="#"><img src="B/l1.jpg" alt="icon" border="0" height="332" width="564"></a></div>
<div style="position: absolute; top: 0px; left: 0px; display: block; z-index: 8; opacity: 10; width: 600px; height: 332px;"><a href="#"><img src="B/l.png" alt="icon" border="0" height="332" width="564"></a></div>
<div style="position: absolute; top: 0px; left: 0px; display: block; z-index: 8; opacity: 10; width: 600px; height: 332px;" ><a href="#"><img src="B/h.png" alt="icon" border="0" height="332" width="564"></a></div>
<div style="position: absolute; top: 0px; left: 0px; display: block; z-index: 8; opacity: 10; width: 600px; height: 332px;" ><a href="#"><img src="B/k.png" alt="icon" border="0" height="332" width="564"></a></div>
<div style="position: absolute; top: 0px; left: 0px; display: block; z-index: 8; opacity: 10; width: 600px; height: 332px;" ><a href="#"><img src="B/lk.png" alt="icon" border="0" height="332" width="564"></a></div>
</div>
<!-- end #slideshow -->
<br>
<div class="text">
<p align="justify">IIIT-A is center of excellence in information technology (IT) has been working in field of cyber security for more than seven years ago. The institution has dedicated program in the area of information security which is producing professionals, working at national and international level. Over the years the institution has grown up from scientific development and educational prestige perspective. The institution has contributed various publications in international scientific journals and has established a dedicated information security lab with state of art facilities to conduct cutting edge researches in the field of information security.
The facility of the lab is capable to conduct research in the following domains: </p>
<div align="justify"> Application Security</div>
<div align="justify"> Image Analysis and authentication system</div>
<div align="justify"> Information forensics, surveillance, audit trails</div>
<div align="justify"> Cryptography and Encryption Methodologies</div>
<div align="justify"> Management of Information Security</div>
<div align="justify"> Information flow analysis and steganography</div>
<div align="justify"> Communication security- Wired and Wireless</div>
<div align="justify"> Intrusion detection analysis, Malware analysis and Pattern Recognition.</div>
</div><br><br><br>
</body>