Vikram Sethi

Last updated
Image of Vikram sethi, American author and cyber security specialist American author ,vikram sethi.jpg
Image of Vikram sethi, American author and cyber security specialist

Vikram Sethi is an American author and cyber security specialist. [1] He is a professor of information systems and supply chain management [2] and former director of the Institute of Defense Studies and Education [3] at Wright State University. [4] He also served as an advisor to the dean. [5]

Contents

Education

Vikram Sethi received his Bachelor of Electrical Engineering from Thapar Institute of Engineering and Technology, India. He earned his MBA from Wright State University and a PhD from the Joseph M. Katz Graduate School of Business, University of Pittsburgh, Pennsylvania. [6]

Career

Sethi began his teaching career as an assistant professor at Southwest Missouri State University (renamed Missouri State University, Springfield, MO). He later became associate professor and PhD coordinator at the College of Business, University of Texas at Arlington between 1999 and 2003. He joined the Raj Soin College of Business at Wright State University in 2003 as a department chair and professor of information systems and operations management. In 2006, he founded the Institute of Defense Studies and Education at Wright State University and served as its director until 2017. [7] The institute supports the US Department of Defense, [8] commercial industry [9] and others by employing experts from government, the military, academia and the private sector. [8] The institute has R&D capabilities in automatic-identification technologies and sensor space. [8] In October 2011, the institute hired retired US Air Force commander, Major General [10] Gary T. McCoy to serve as senior adviser and help develop its educational programs. [11] In September 2015, the institute was part of a consortium, led by Fairfax, Virginia-based SRA International Inc., that was awarded a U.S. Army contract worth up to $181 million for providing automatic-identification technologies and service to help the military track, locate and monitor parts and equipment. In September 2015, Wright State University’s Institute of Defense Studies and Education was part of a consortium, led by Fairfax, Virginia-based SRA International, that was awarded a U.S. Army contract worth up to $181 million for providing automatic-identification technologies and service to help the military track, locate and monitor parts. [8]

Sethi also served as Director, Data Intensive Supply Chain Research Center of the University, whose focus is on supply chains that are strongly supported by information technology and data, including RFID. [5] Additionally, he manages the university's supply chain program which offers certifications in nine subject areas. [12] Besides, he was on the board of the Dayton RFID Convergence Center, a business incubator dedicated to RFID technology. [5]

Sethi also set up Wright State University’s Center of Professional Education in 2007 and serves as its director. [13] One of his early accomplishments was the development of a Stress Management and Determination Inventory (SMDI), a psychological assessment of stress in information systems professionals that combines 33 stress factors into a single scale. He also came up with the MAP3 System to assist organizations with the task of process simplification and prioritization through the isolation of bottlenecks in business processes. [6]

Sethi has over 20 years of experience in advising many startups in the US in areas like growth strategy, funding, cash allocation, product development, and market positioning. He is a guest speaker at educational institutions around the world. He has traveled to India, UAE, Singapore, Australia, China, Japan, South Korea, and Malaysia as an invited faculty member. He serves on Advisory Boards [14] of several regional organizations such as the Global Water Consortium. [15]

His research interests include the following:

Publications

Sethi has written several books on cybercrime and organizational transformation, and published more than 50 articles [16] in peer-reviewed journals. [6] He continues to call for the establishment of a global cyber regime capable of mitigating the growing risks of cyber war and manage the cyber polity of diverse nations. In his book, Weapons of Mass Psychological Destruction and the People Who Use Them, he discusses the shift from kinetic war to cyber war using numerous case studies. [17] He writes, “cyber war is already upon us,” adding that nothing short of a robust, multinational, cyber regime can change its long-term direction. [18] He has also highlighted the extreme vulnerability of small and medium businesses, especially in the Dayton area, to cyber attacks. [1] More recently, he underscored the growing threat from readymade ransomware available on the dark web [19]

Books

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Dayton, Ohio</span> City in Ohio, United States

Dayton is a city in and the county seat of Montgomery County, Ohio, United States. A small part of the city extends into Greene County. As of the 2020 census, the city proper had a population of 137,644, making it the sixth-most populous city in Ohio. Dayton anchors the state's fourth-largest metropolitan area, the Dayton metropolitan area, which had 814,049 residents. Dayton is located within Ohio's Miami Valley region, 50 miles (80 km) north of Cincinnati and 60 miles (97 km) west of Columbus. It is a principal city of the Dayton–Springfield–Sidney combined statistical area, home to a population of 1,086,512.

<span class="mw-page-title-main">Wright State University</span> Public research university in Fairborn, Ohio, US

Wright State University is a public research university in Fairborn, Ohio. Originally opened in 1964 as a branch campus of Miami University and Ohio State University, it became an independent institution in 1967 and was named in honor of aviation pioneers Orville and Wilbur Wright, who were residents of nearby Dayton. The university offers bachelor's, master's, and doctoral degrees and is classified among "R2: Doctoral Universities – High research activity". Its athletic teams, the Wright State Raiders, compete in Division I of the NCAA as members of the Horizon League. In addition to the main campus, the university also operates a regional campus near Celina, Ohio, called Wright State University–Lake Campus.

<span class="mw-page-title-main">Auto-ID Labs</span> Research group

The Auto-ID Labs network is a research group in the field of networked radio-frequency identification (RFID) and emerging sensing technologies. The labs consist of seven research universities located on four different continents. These institutions were chosen by the former Auto-ID Center to design the architecture for the Internet of Things together with EPCglobal. The federation was established in 1999; the network they have developed is at the heart of a proposal sponsored by EPCglobal and supported by GS1, GS1 US, Wal-Mart, Hewlett-Packard, and others to use RFID and the Electronic Product Code (EPC) in the identification of items in the supply chain for companies. The areas of expertise range from hardware to software to business research related to RFID.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, programming scripts can all be forms of internet terrorism. Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

<span class="mw-page-title-main">Air Force Materiel Command</span> Major command of the United States Air Force responsible for research, development, and acquisitions

The Air Force Materiel Command (AFMC) is a Major Command (MAJCOM) of the United States Air Force (USAF). AFMC was created on July 1, 1992, through the amalgamation of the former Air Force Logistics Command (AFLC) and the former Air Force Systems Command (AFSC).

Supply chain security activities aim to enhance the security of the supply chain or value chain, the transport and logistics systems for the world's cargo and to "facilitate legitimate trade". Their objective is to combine traditional practices of supply-chain management with the security requirements driven by threats such as terrorism, piracy, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance.

A blended threat is a software exploit that involves a combination of attacks against different vulnerabilities. Blended threats can be any software that exploits techniques to attack and propagate threats, for example worms, trojan horses, and computer viruses.

<span class="mw-page-title-main">Imam Hossein University</span> Iranian university

The Imam Hossein Comprehensive University is a public university located in Tehran, Iran.

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.

Strategic Ohio Council for Higher Education (SOCHE), renamed in 2021 from the Southwestern Ohio Council for Higher Education, was formed in 1967. SOCHE is a regional consortium of colleges, universities, and businesses advancing higher education through academic collaboration, corporate and community partnerships, and student success.

A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack (DDoS).

The Open Trusted Technology Provider Standard (O-TTPS) is a standard of The Open Group that has also been approved for publication as an Information Technology standard by the International Organization of Standardization and the International Electrotechnical Commission through ISO/IEC JTC 1 and is now also known as ISO/IEC 20243:2015. The standard consists of a set of guidelines, requirements, and recommendations that align with best practices for global supply chain security and the integrity of commercial off-the-shelf (COTS) information and communication technology (ICT) products. It is currently in version 1.1. A Chinese translation has also been published.

Corporate warfare is a form of information warfare in which attacks on companies by other companies take place. Such warfare may be part of economic warfare and cyberwarfare; but can involve espionage, 'dirty' PR tactics, or physical theft. The intention is largely to destabilise or sink the value of the opposing company for financial gain, or to steal trade secrets from them.

<span class="mw-page-title-main">WannaCry ransomware attack</span> 2017 worldwide ransomware cyberattack

The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated by using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. These patches were imperative to organizations' cyber security but many were not implemented due to ignorance of their importance. Some have claimed a need for 24/7 operation, aversion to risking having formerly working applications breaking because of patch changes, lack of personnel or time to install them, or other reasons.

<span class="mw-page-title-main">Petya (malware family)</span> Family of encrypting ransomware discovered in 2016

Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system.

<span class="mw-page-title-main">2017 Ukraine ransomware attacks</span> Series of powerful cyberattacks using the Petya malware

A series of powerful cyberattacks using the Petya malware began on 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. Similar infections were reported in France, Germany, Italy, Poland, Russia, United Kingdom, the United States and Australia. ESET estimated on 28 June 2017 that 80% of all infections were in Ukraine, with Germany second hardest hit with about 9%. On 28 June 2017, the Ukrainian government stated that the attack was halted. On 30 June 2017, the Associated Press reported experts agreed that Petya was masquerading as ransomware, while it was actually designed to cause maximum damage, with Ukraine being the main target.

<span class="mw-page-title-main">Erick Jones</span> American engineering professor

Dr. Erick Christopher Jones Sr. is dean of the College of Engineering at the University of Nevada, Reno, joining the college in September 2022.

<span class="mw-page-title-main">International Supply Chain Education Alliance</span> Professional organization

The International Supply Chain Education Alliance (ISCEA) is a supply chain professionals certifying body best known for becoming the first organization validating the knowledge of supply chain managers around the world and providing them with the CSCM designation. Founded in 2003 and currently holding over 100,000 members, ISCEA has its World HQ office in Beachwood, OH, USA and regional offices in LATAM, EMEA and APAC. ISCEA's mission is to provide supply chain knowledge to manufacturing and service industry professionals worldwide through Education, Certification and Recognition. ISCEA is the governing body for the Ptak Prize.

The U.S. Ransomware Task Force (RTF), also known as the Joint Ransomware Task Force, is an interagency body that leads the American government's efforts to address the threats of ransomware attacks. It is jointly headed by the Department of Homeland Security’s cyber arm, the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation.

References

  1. 1 2 Larsen, Dave. "Hackers targeting small, mid-sized businesses". dayton-daily-news.
  2. "Vikram Sethi | people.wright.edu | Wright State University". people.wright.edu.
  3. "Wright State unveils new cyber security training programs" . Retrieved 17 March 2023.
  4. "Budget cuts could cut thousands of jobs in Ohio, impact military". dayton-daily-news.
  5. 1 2 3 "Dayton to Foster New RFID Solutions". Diamond.
  6. 1 2 3 "Wright State University - Center of Excellence for Product Reliability and Optimization - Faculty". cecs.wright.edu.
  7. Thomas Gnau, Staff Writer. "WSU site gathers hacking news". daytondailynews.
  8. 1 2 3 4 "WSU in running to receive part of $181M Army contract - Sidney Daily News". www.sidneydailynews.com. 8 September 2015.
  9. Wright State poised for work on $181M Army tech contract Dayton Business Journal (Subscription required)
  10. "MAJOR GENERAL GARY T. MCCOY > U.S. Air Force > Biography Display". www.af.mil.
  11. "Wright State institute hires Air Force retiree as adviser". dayton-daily-news.
  12. "Supply Chain Trends: Wright State University Takes Unique Approach to Supply Chain Education". www.scdigest.com.
  13. "Program for Nigerian officials focuses on leadership skills" . Retrieved 17 March 2023.
  14. "Act Of Random Kindness (ARK) Social Welfare Society: Home". arkworld.org.
  15. "Global Water Consortium". globalwaterconsortium.org.
  16. "Vikram Sethi - Google Scholar Citations". scholar.google.com.
  17. "Cyber force" . Retrieved 17 March 2023.
  18. Sethi, Vikram (April 30, 2020). Cyber Weapons of Mass Psychological Destruction: And the People Who Use Them. Greylander Press. ISBN   978-1734818895.[ non-primary source needed ]
  19. "Why ransomware cyberattacks are on the rise – ABC News". ABC News . 4 June 2021.