Vikram Sethi

Last updated
Image of Vikram sethi, American author and cyber security specialist American author ,vikram sethi.jpg
Image of Vikram sethi, American author and cyber security specialist

Vikram Sethi is an American author and cyber security specialist. [1] He is a professor of information systems and supply chain management [2] and former director of the Institute of Defense Studies and Education [3] at Wright State University. [4] He also served as an advisor to the dean. [5]

Contents

Education

Vikram Sethi received his Bachelor of Electrical Engineering from Thapar Institute of Engineering and Technology, India. He earned his MBA from Wright State University and a PhD from the Joseph M. Katz Graduate School of Business, University of Pittsburgh, Pennsylvania. [6]

Career

Sethi began his teaching career as an assistant professor at Southwest Missouri State University (renamed Missouri State University, Springfield, MO). He later became associate professor and PhD coordinator at the College of Business, University of Texas at Arlington between 1999 and 2003. He joined the Raj Soin College of Business at Wright State University in 2003 as a department chair and professor of information systems and operations management. In 2006, he founded the Institute of Defense Studies and Education at Wright State University and served as its director until 2017. [7] The institute supports the US Department of Defense, [8] commercial industry [9] and others by employing experts from government, the military, academia and the private sector. In October 2011, the institute hired retired US Air Force commander, Major General [10] Gary T. McCoy to serve as senior adviser and help develop its educational programs. [11] In September 2015, the institute was part of a consortium, led by Fairfax, Virginia-based SRA International Inc., that was awarded a U.S. Army contract worth up to $181 million for providing automatic identification technologies and service to help the military track, locate and monitor parts and equipment. In September 2015, Wright State University’s Institute of Defense Studies and Education was part of a consortium, led by Fairfax, Virginia-based SRA International, that was awarded a U.S. Army contract worth up to $181 million for providing automatic-identification technologies and service to help the military track, locate and monitor parts.

Sethi also served as Director, Data Intensive Supply Chain Research Center of the University, whose focus is on supply chains that are strongly supported by information technology and data, including RFID. Additionally, he manages the university's supply chain program which offers certifications in nine subject areas. [12] Besides, he was on the board of the Dayton RFID Convergence Center, a business incubator dedicated to RFID technology.

Sethi also set up Wright State University’s Center of Professional Education in 2007 and serves as its director. [13] One of his early accomplishments was the development of a Stress Management and Determination Inventory (SMDI), a psychological assessment of stress in information systems professionals that combines 33 stress factors into a single scale. He also came up with the MAP3 System to assist organizations with the task of process simplification and prioritization through the isolation of bottlenecks in business processes.

Sethi has over 20 years of experience in advising many startups in the US in areas like growth strategy, funding, cash allocation, product development, and market positioning. He is a guest speaker at educational institutions around the world. He has traveled to India, UAE, Singapore, Australia, China, Japan, South Korea, and Malaysia as an invited faculty member. He serves on Advisory Boards [14] of several regional organizations such as the Global Water Consortium. [15]

His research interests include the following:

Publications

Sethi has written several books on cybercrime and organizational transformation, and published more than 50 articles [16] in peer-reviewed journals. He continues to call for the establishment of a global cyber regime capable of mitigating the growing risks of cyber war and manage the cyber polity of diverse nations. In his book, Weapons of Mass Psychological Destruction and the People Who Use Them, he discusses the shift from kinetic war to cyber war using numerous case studies. [17] He writes, “cyber war is already upon us,” adding that nothing short of a robust, multinational, cyber regime can change its long-term direction. [18] He has also highlighted the extreme vulnerability of small and medium businesses, especially in the Dayton area, to cyber attacks. [1] More recently, he underscored the growing threat from readymade ransomware available on the dark web [19] Dr. Sethi believes that with strategic planning, investment in cutting-edge technology, and strong public-private partnerships, modern nation-states can fortify their defenses against ever-evolving cyber threats. [20] He has also drawn attention to how seemingly innocuous devices and older technologies, such as pagers, for instance, can turn into lethal weapons and what this means for the future of supply chain security. [21]

Books

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">Wright State University</span> Public research university in Fairborn, Ohio, US

Wright State University is a public research university in Fairborn, Ohio, United States. Originally opened in 1964 as a branch campus of Miami University and Ohio State University, it became an independent institution in 1967 and was named in honor of aviation pioneers Orville and Wilbur Wright, who were residents of nearby Dayton. The university offers bachelor's, master's, and doctoral degrees and is classified among "R2: Doctoral Universities – High research activity". Its athletic teams, the Wright State Raiders, compete in Division I of the NCAA as members of the Horizon League. In addition to the main campus, the university also operates a regional campus near Celina, Ohio, called Wright State University–Lake Campus.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside the development of information technology, cyberterrorism involves acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism. Some authors opt for a very narrow definition of cyberterrorism, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

<span class="mw-page-title-main">Under Secretary of Defense for Policy</span> United States government position

The United States under secretary of defense for policy (USDP) is a high level civilian official in the United States Department of Defense. The under secretary of defense for policy is the principal staff assistant and adviser to both the secretary of defense and the deputy secretary of defense for all matters concerning the formation of national security and defense policy.

Supply chain security activities aim to enhance the security of the supply chain or value chain, the transport and logistics systems for the world's cargo and to "facilitate legitimate trade". Their objective is to combine traditional practices of supply-chain management with the security requirements driven by threats such as terrorism, piracy, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance.

A blended threat is a software exploit that involves a combination of attacks against different vulnerabilities. Blended threats can be any software that exploits techniques to attack and propagate threats, for example worms, trojan horses, and computer viruses.

<span class="mw-page-title-main">Port security</span> Security of commerce ports

Port security is part of a broader definition concerning maritime security. It refers to the defense, law and treaty enforcement, and Counterterrorism activities that fall within the port and maritime domain. It includes the protection of the seaports themselves and the protection and inspection of the cargo moving through the ports. Security risks related to ports often focus on either the physical security of the port, or security risks within the maritime supply chain.

Yang Xiao is a professor of computer science at the University of Alabama.

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.

The 2011 U.S. Department of Defense Strategy for Operating in Cyberspace is a formal assessment of the challenges and opportunities inherent in increasing reliance on cyberspace for military, intelligence, and business operations. Although the complete document is classified and 40 pages long, this 19 page summary was released in July 2011 and explores the strategic context of cyberspace before describing five “strategic initiatives” to set a strategic approach for DoDʼs cyber mission.

The Open Trusted Technology Provider Standard (O-TTPS) is a standard of The Open Group that has also been approved for publication as an Information Technology standard by the International Organization of Standardization and the International Electrotechnical Commission through ISO/IEC JTC 1 and is now also known as ISO/IEC 20243:2015. The standard consists of a set of guidelines, requirements, and recommendations that align with best practices for global supply chain security and the integrity of commercial off-the-shelf (COTS) information and communication technology (ICT) products. It is currently in version 1.1. A Chinese translation has also been published.

Active defense can refer to a defensive strategy in the military or cybersecurity arena.

<span class="mw-page-title-main">David Venable</span> Cyber security professional (born 1978)

David "Dave" Venable is a former intelligence officer with the United States National Security Agency, and current cyber security professional and businessman. He is an author and speaker on the topics of cyber security, cyberwarfare, and international security; has developed security-related internet protocols; is a US patent holder; and has been named as one of the most influential people in security.

Corporate warfare is a form of information warfare in which attacks on companies by other companies take place. Such warfare may be part of economic warfare and cyberwarfare; but can involve espionage, 'dirty' PR tactics, or physical theft. The intention is largely to destabilise or sink the value of the opposing company for financial gain, or to steal trade secrets from them.

<span class="mw-page-title-main">WannaCry ransomware attack</span> 2017 worldwide ransomware cyberattack

The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It was propagated by using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end of life. These patches were imperative to cyber security, but many organizations did not apply them, citing a need for 24/7 operation, the risk of formerly working applications breaking because of the changes, lack of personnel or time to install them, or other reasons.

<span class="mw-page-title-main">Petya (malware family)</span> Family of encrypting ransomware discovered in 2016

Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system.

<span class="mw-page-title-main">2017 Ukraine ransomware attacks</span> Series of powerful cyberattacks using the Petya malware

A series of powerful cyberattacks using the Petya malware began on 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. Similar infections were reported in France, Germany, Italy, Poland, Russia, United Kingdom, the United States and Australia. ESET estimated on 28 June 2017 that 80% of all infections were in Ukraine, with Germany second hardest hit with about 9%. On 28 June 2017, the Ukrainian government stated that the attack was halted. On 30 June 2017, the Associated Press reported experts agreed that Petya was masquerading as ransomware, while it was actually designed to cause maximum damage, with Ukraine being the main target.

<span class="mw-page-title-main">Terry Oroszi</span> American author (born 1966)

Terry Oroszi is an American author. She is a Professor and Vice Chair at Wright State University.

In Q2 of 2013, Akamai Technologies reported that Indonesia topped China with a portion 38 percent of cyber attacks, an increase from the 21 percent portion in the previous quarter. China was at 33 percent and the US at 6.9 percent. 79 percent of attacks came from the Asia Pacific region. Indonesia dominated the attacking to ports 80 and 443 by about 90 percent.

References

  1. 1 2 Larsen, Dave. "Hackers targeting small, mid-sized businesses". dayton-daily-news.
  2. "Vikram Sethi | people.wright.edu | Wright State University". people.wright.edu.
  3. "Wright State unveils new cyber security training programs" . Retrieved 17 March 2023.
  4. "Budget cuts could cut thousands of jobs in Ohio, impact military". dayton-daily-news.
  5. "Dayton to Foster New RFID Solutions". Diamond.
  6. "Wright State University - Center of Excellence for Product Reliability and Optimization - Faculty". cecs.wright.edu.
  7. Thomas Gnau, Staff Writer. "WSU site gathers hacking news". daytondailynews.
  8. "WSU in running to receive part of $181M Army contract - Sidney Daily News". www.sidneydailynews.com. 8 September 2015.
  9. Wright State poised for work on $181M Army tech contract Dayton Business Journal (Subscription required)
  10. "MAJOR GENERAL GARY T. MCCOY > U.S. Air Force > Biography Display". www.af.mil.
  11. "Wright State institute hires Air Force retiree as adviser". dayton-daily-news.
  12. "Supply Chain Trends: Wright State University Takes Unique Approach to Supply Chain Education". www.scdigest.com.
  13. "Program for Nigerian officials focuses on leadership skills" . Retrieved 17 March 2023.
  14. "Act Of Random Kindness (ARK) Social Welfare Society: Home". arkworld.org.
  15. "Global Water Consortium". globalwaterconsortium.org.
  16. "Vikram Sethi - Google Scholar Citations". scholar.google.com.
  17. "Cyber force" . Retrieved 17 March 2023.
  18. Sethi, Vikram (April 30, 2020). Cyber Weapons of Mass Psychological Destruction: And the People Who Use Them. Greylander Press. ISBN   978-1734818895.[ non-primary source needed ]
  19. "Why ransomware cyberattacks are on the rise – ABC News". ABC News . 4 June 2021.
  20. "UAE: A Global Cybersecurity Leader and Lessons for Other Nations".
  21. "Exploding Pagers Destroy Supply Chain Security".