Professor of Practice
Department of Computer Science and Engineering
Spring 2025 Teaching
- CSCE 703/CYBR 603/MARA 655: Cybersecurity Risk
- Prerequisite: Grad classification or my permission
- CSCE 477/CYBR 403: Cybersecurity Risk
- Prerequisite: Grade of C or better in CYBR 201/CSCE 201, CSCE 201/CYBR 201, or CSCE 221; junior or senior classification.
- CSCE 482: Senior Capstone Design
- CSCE 120: Program Design and Concepts (Sections TBD)
- Prerequisite: Grade of C or better in ENGR 102, CSCE 110, CSCE 111, CSCE 206, or PHYS 150.
Fall 2024 Teaching
- ENGR-689-303: Applied Blockchain for Engineers
- Prerequisite: G7/G8 Classification or Undergrads via Instructor Approval
- Syllabus and details
- For registration, CRN# 59797
-
CSCE 120: Program Design and Concepts (Sections 508, 509, 510, 511, 512, 513, 514 & 515)
- Prerequisite: Grade of C or better in ENGR 102, CSCE 110, CSCE 111, CSCE 206, or PHYS 150.
Current Research
- Cyber Warfare
- Small Business Security
- Cyber Liability Insurance
- Blockchains Security
- Zero Trust Architecture
Publications
- Kumar, S., Niranjan, M., Nagar, G., Tripathi K. and Peddoju S., 2025. Humanizing Cyber War: Proposal for a Geneva Convention Equivalent for Cyber Warfare. 20th International Conference on Cyber Warfare and Security (ICCWS), 28-29 March, Williamsburg, Virginia, USA. (abstract accepted).
- Kumar, S. , Brown, G. , Ragavan S. , Cerrato, M. and Nagar, G. 2025. NATO Self-Defense – Is Article 5 the Right Framework for Responding to Sub-kinetic Cyber Aggression? 17th International Conference on Cyber Conflict (CyCon 2025) 27-30 May,Tallinn, Estonia (abstract accepted).
- Kumar S.,Menezes, A., Giri, S. and Kotikela, S. 2024. What The Phish! Effects of AI on Phishing Attacks and Defence. 4th International Conference on AI Research (ICAIR), 05-06 Dec, Lisbon, Portugal.
- Kumar, S., and Tripathi K. , 2024. Cyber-Chemical Terrorism: The Convergence of Cyber Warfare and Chemical Threats. Journal of Information Warfare. (abstract accepted).
- Kumar, S. , Kocian, L. and Loo, L. 2024. Blockchain Applications for Cyber Liability Insurance. International Journal on Cybernetics & Informatics (IJCI) Vol.13, No.5, October 2024 pp.119-139.
- Kumar, S. and Nagar, G. 2024. Threat Modeling for Cyber Warfare against Less Cyber-dependent Adversaries. 23rd European Conference on Cyber Warfare and Security (ECCWS), 27-28 June, Jyväskylä, Finland.
- Nagar, G. and Kumar S. 2024. Cyber Security Kill Chain – Tactics and Strategies (Book) Packt Publishers, Birmingham, UK.
- Sanchez, H. and Kumar, S. 2011. Twitter Bullying Detection. ser. NSDI, 12(2011), p.15.
- Kumar, S. 2021. Securing Business Implementations of Blockchain. Secure World West Coast 202, San Jose, California
- Kumar, S. and Kurmi, A. 2019. Best Practices for Identity and Access Management for Public Clouds. ISC2 Security Conference New Orleans USA
Research in Progress
- Kumar, S., Nagar, G. and Honcharenko, S. 2024. Best Practices for Cybersecurity of Small Businesses During Kinetic or Cyber aggression, Journal of Information Warfare (in progress).
- Arunthavanathan, R., Khan, F., Sajid, Z., Amin, T., Kota, R. and Kumar, S. 2024. Are the processing facilities safe and secured against cyber threats? Reliability Engineering & System Safety (submitted, decision in process)
- Kumar, S. , Klappenecker, A. Brown, G. and Saravanan, S. 2025. Quantum Apocalypse: Fortifying Critical Infrastructure in the Age of Cyber Warfare. 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany (in progress)
- Kumar, S., Yim, M., Agarwal, A., and Garg, A., 2025. Cyber Threats to Nuclear Safety: Game Theory Strategies for Enhanced Deterrence. 24th European Conference on Cyber Warfare and Security (ECCWS), 26-27 June, Kaiserslautern, Germany (in progress)
- Veetil, V., Kaniyamattam K. and Kumar, S. 2024. Enhancing Blockchain Enabled Resilience in the U.S. Beef Supply Chain (in progress).
- Kumar, S., Shangari M. and Peddoju S., 2025., Regulatory and Economic Challenges of AI Integration in Cyber Insurance. (in progress).
- Kumar, S. , Brown, G. , and Ragavan S. 2024. Legal Framework for Space Mining: A Strategic Blueprint for Texas and U.S. Leadership. (in progress).
Leadership and Service
- Academic and Professional
- 2024-current, Member of U.S. National Committee Technical Advisory Group (USNC-TAG) for the IEC/ISO Joint Tech Committee on Quantum Technologies
- 2024 – current, Advisor, Technology Incubation and Entrepreneurship Development Society (TIDES), Indian Institute of Technology, Roorkee
2024 – current, Member, FBI Infragard
- 2023-24, Mentor and Leadership Coach, US National Cyber Team
- 2024-25, Visiting Professor of Cybersecurity, Indian Institute of Technology, Roorkee
- 2020-2024, Member, External Advisory Board, Department of CSE, Texas A&M University
- Community
- 2024-current, Member, Rotary Club of College Station
- 2022-current, Member of the Board of Directors, ACT for Metal Health, San Jose
- 2022-24, Mentor, Women in Cybersecurity (WiCys)WiCyS
===== Following is shared on as-is basis for Security Awareness, Not my work ======
Cybersecurity Resources
- Krebs on Security:
- Website: Krebs on Security
- Description: A leading blog on cybersecurity news and investigations by journalist Brian Krebs
- SANS Internet Storm Center (ISC):
- Website: SANS ISC
- Description: Provides daily threat updates, incident reports, and analysis from the SANS Institute
- Dark Reading:
- Website: Dark Reading
- Description: A comprehensive resource for IT security professionals featuring news, analysis, and insights on various cybersecurity topics
- Cybersecurity & Infrastructure Security Agency (CISA):
- Website: CISA
- Description: The U.S. government’s official resource for cybersecurity, offering alerts, guidelines, and tools to help organizations protect their critical infrastructure and information systems.
- The Hacker News:
- Website: The Hacker News
- Description: A popular cybersecurity news platform providing the latest updates on cyber threats, vulnerabilities, and technology trends
Cybersecurity Books
- “The Art of Deception: Controlling the Human Element of Security” by Kevin D. Mitnick
- Description: Written by one of the most famous hackers turned security consultant, this book explores social engineering and the psychological aspects of hacking, offering valuable insights into human vulnerabilities and how to protect against them.
- “Cybersecurity and Cyberwar: What Everyone Needs to Know” by P.W. Singer and Allan Friedman
- Description: This book provides a comprehensive overview of cybersecurity and cyberwarfare, making complex technical concepts accessible to a broad audience. It covers the history, current state, and future implications of cyber threats.
- “Hacking: The Art of Exploitation” by Jon Erickson
- Description: A practical guide to hacking techniques, this book dives into the technical aspects of security vulnerabilities and exploitation. It includes hands-on exercises and code examples to help readers understand the mechanics of hacking.
- “Metasploit: The Penetration Tester’s Guide” by David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
- Description: This book is a definitive guide to the Metasploit Framework, one of the most popular tools for penetration testing. It provides step-by-step instructions for using Metasploit to identify and exploit security vulnerabilities.
- “The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win” by Gene Kim, Kevin Behr, and George Spafford
- Description: While not exclusively focused on cybersecurity, this novel provides valuable insights into IT operations and security practices. It uses a fictional narrative to illustrate the challenges and best practices in managing IT projects, including cybersecurity considerations.
Cybersecurity Free Trainings
(I have no affiliation to any of these, this is just a compilation)
- Website: Cybrary
-
- Cybrary offers a wide range of free cybersecurity courses, covering various topics from basic security fundamentals to advanced concepts.
- Coursera
- Website: Coursera Cybersecurity Courses
- Coursera provides free access to several cybersecurity courses from top universities and institutions.
- Open Security Training
- Website: Open Security Training
- Open Security Training offers free courses on a variety of cybersecurity topics, including introductory and advanced classes