Mr Jayaseelan Vejayon received his first degree in BCompSc (Hons) from University of Science, Malaysia and his masters degree in MCompSc (Information Security) from University of Technology, Malaysia. He has an overall of fifteen years of work experience; two years in lecturing IT courses, six years in heading the IT Division of AIMST University and two years as an IT Consultant at Blair Education Services Sdn. Bhd., Perak. He had also served as the Research Officer and Head, Network Support & Service Team at the National Advanced IPv6 Centre, University of Science, Malaysia for about six months before joining as the Global IT Security Engineer at an MNC, Jabil Circuits Sdn. Bhd., Penang until the end of 2010. From Y2011 to Y2014, he served as the Assistant Director, Information & Communications Technology Division at Quest International University Perak. At present, he is the Registrar cum Deputy CEO and Director, ICT Division at Praxis International College, Ipoh, Perak. Mr Jayaseelan Vejayon has conducted various lectures and trainings in the fields of information security, web development and networking.
Subscribe to:
Posts (Atom)
Popular Posts
-
Symmetric key cryptography systems use the same key for both to encrypt the plaintext and to decrypt the ciphertext. Symmetric key systems...
-
Cryptography is defined as the art and science of secret writing. The word itself comes from Greek where the words kruptos (κρυπτοσ) and ...
-
Policy is basically a written document that lays out the exact requirements or rules that must be met by the employees. It generally...
-
What are Blind, Semi-blind and Non-blind Watermarking Systems? Digital watermarking systems can be grouped in three schemes - they are Bli...
-
Checking Image Quality Using MATLAB PSNR program PSNR or peak-to-noise ratio is used to evaluate the quality of the watermarked image aft...
-
TVA: Threat-Vulnerability-Asset TVA worksheet lists the asset in priority order along one axis and the threats it is exposed to by prio...
-
The Security System Development Life Cycle (SecSDLC) is a variant of SDLC which can be used in developing an Information Security Policy. ...
-
Find below the Matlab codes to embed a watermark image into a cover(host) image: clear all; close all; clc; [filename1,pathname]=uigetfi...
-
The Interesting Story of Lena.jpg The image above is one that has been widely used in the image compression studies, even today. ...
-
A ciphertext has the possibility of being broken by using statistical analysis that could provide some information on the frequency of char...