IT Security Research Center

Research Center on Cybersecurity was founded on 2012 to study and produce different tools for securing information infrastructures. This center attempts to introduce, plan and implement different security solutions for cyberspace. This center includes some reference labs for these topics:
• Security evaluation of software and hardware
• Hard disk recovery
• Malware analysis
• Cryptography

Services

  • Plan, evaluate and, analysis of different cryptography algorithms and systems
  • Analysis and security evaluation of smart cards
  • Training courses on information security
  • Official ISMS audit and certification of organizations in Iran

Cryptography and cryptanalysis is one of the most applicational fields of the science. It includes different fields such as synchronous, asynchronous and etc. The department was formed to gather a team of experts in the field to study and implement different applicational projects on this subject. This team was first formed in the Research Center on Data Processing and is one of most experienced teams in information security. This department aims to introduce different methods for securing information and extend using this methods in the country. This team cooperates firmly with the scientific community to be up-to-date in different subjects of the fields.

Because of extensiveness of security subjects along with the challenging nature of it, department of developing secure systems is established to produce and evaluate different tools for securing information infrastructures. This team provides different services on software security and production of different tools for information security. Moreover, this department focuses on cybercrimes, too. This department focuses mainly in this topics:

Software Security, Privacy Protection, Cybercrime Detection

Sets consisting of experts in the design and implementation of a comprehensive security solution provider in the field of security management training Atlaatmjmvh composed of experts in the design and implementation Comprehensive security solutions and provide the necessary training in the field of security management Atlaatmjmvh composed of experts in the design and implementation of comprehensive security solutions provider and training It should be composed of experts in the field of information security management in the design and implementation of comprehensive security solutions and provide the necessary training in the field of information security management 

Product

  • Boolean functions and succession planning and analysis tool boxes
  • Tara Cryptography lab
  • Chest to keep information secure
  • Sentry Safe for Your Computer
  • A password finder tool

News

TEHRAN (FNA)- Microsoft released Build 10565 to Windows Insiders on the Fast Ring. It is chock full of new features, but the most-important may be an improved system for licensing a new install on a Windows 7 or Windows 8 machine taking advantage of its f
TEHRAN (FNA)- Researchers combined genetics with computer science and created a new diagnostic technology based on advanced self-learning computer algorithms which can, with 85 per cent certainty, identify the source of the disease and thus target treatme