About
Strategic Advisor and thought leader in digital transformation, FinTech, security…
Articles by Majid A.
Activity
-
And just like that, today we began using AI in HR operations at the IMF. Step by step, the goal is simple: make our work more effective and free up…
And just like that, today we began using AI in HR operations at the IMF. Step by step, the goal is simple: make our work more effective and free up…
Liked by Majid A. Malaika - Dr.Eng
-
الاستقلال المالي ليس حكراً على الأثرياء، بل في متناول الموظفين الذين يستثمرون بانضباط وهدف. يقدم كتاب "دليل بوغل للاستثمار" نهجاً مباشراً وواضحاً…
الاستقلال المالي ليس حكراً على الأثرياء، بل في متناول الموظفين الذين يستثمرون بانضباط وهدف. يقدم كتاب "دليل بوغل للاستثمار" نهجاً مباشراً وواضحاً…
Liked by Majid A. Malaika - Dr.Eng
Experience
-
International Monetary Fund
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
-
-
-
Activities and Societies: • Member of the High Assurance Computing and Networking (HACNet) Labs. • Member of the Student Advisory Board at the Department of Computer Science and Engineering at SMU.
Doctor of Engineering in Software Engineering Specializing in Application, Network, and Cloud Security.
-
-
-
-
-
-
Licenses & Certifications
Publications
-
Quantum Computing and the Financial System: Spooky Action at a Distance?
International Monetary Fund
The era of quantum computing is about to begin, with profound implications for the global economy and the financial system. Rapid development of quantum computing brings both benefits and risks. Quantum computers can revolutionize industries and fields that require significant computing power, including modeling financial markets, designing new effective medicines and vaccines, and empowering artificial intelligence, as well as creating a new and secure way of communication (quantum Internet)…
The era of quantum computing is about to begin, with profound implications for the global economy and the financial system. Rapid development of quantum computing brings both benefits and risks. Quantum computers can revolutionize industries and fields that require significant computing power, including modeling financial markets, designing new effective medicines and vaccines, and empowering artificial intelligence, as well as creating a new and secure way of communication (quantum Internet). But they would also crack many of the current encryption algorithms and threaten financial stability by compromising the security of mobile banking, e-commerce, fintech, digital currencies, and Internet information exchange. While the work on quantum-safe encryption is still in progress, financial institutions should take steps now to prepare for the cryptographic transition, by assessing future and retroactive risks from quantum computers, taking an inventory of their cryptographic algorithms (especially public keys), and building cryptographic agility to improve the overall cybersecurity resilience.
Other authorsSee publication -
A Survey of Research on Retail Central Bank Digital Currency
International Monetary Fund
This paper examines key considerations around central bank digital currency (CBDC) for use by the general public, based on a comprehensive review of recent research, central bank experiments, and ongoing discussions among stakeholders. It looks at the reasons why central banks are exploring retail CBDC issuance, policy and design considerations; legal, governance and regulatory perspectives; plus cybersecurity and other risk considerations. This paper makes a contribution to the CBDC literature…
This paper examines key considerations around central bank digital currency (CBDC) for use by the general public, based on a comprehensive review of recent research, central bank experiments, and ongoing discussions among stakeholders. It looks at the reasons why central banks are exploring retail CBDC issuance, policy and design considerations; legal, governance and regulatory perspectives; plus cybersecurity and other risk considerations. This paper makes a contribution to the CBDC literature by suggesting a structured framework to organize discussions on whether or not to issue CBDC, with an operational focus and a project management perspective.
Other authorsSee publication -
Botract: Abusing Smart Contracts and Blockchains for Botnet Command and Control
International Journal of Information and Computer Security
Abstract: This paper presents how smart contracts and blockchains can be potentially abused to create seemingly unassailable botnets. This involves publishing command and control (C2) logic in the form of smart contracts to the blockchain and then calling the functions of the smart contract for sending and receiving commands and keeping track of the state of bots. We call this technique Botract derived by merging two words: bot and contract. In addition to describing how hackers can exploit…
Abstract: This paper presents how smart contracts and blockchains can be potentially abused to create seemingly unassailable botnets. This involves publishing command and control (C2) logic in the form of smart contracts to the blockchain and then calling the functions of the smart contract for sending and receiving commands and keeping track of the state of bots. We call this technique Botract derived by merging two words: bot and contract. In addition to describing how hackers can exploit smart contracts for C2, we also explain why is it difficult to disarm Botract given the distributed nature of the blockchain and the persistent nature of smart contracts deployed on top of them. Next, we describe the architecture for deploying blockchain-based botnets and implement a proof-of-concept using isolated testnet environments. Our goal is to prove the feasibility of our approach, hoping to create awareness among the community on the importance of auditing smart contracts on the blockchain and defending against these botnets before they become widespread.
Keywords: smart contract; blockchain; security; botnets; Ethereum.Other authorsSee publication -
N-Version Architectural Framework for Application Security Automation (NVASA)
CrossTalk Department of Defense (DoD), The Journal of Defense Software Engineering
In this paper, we expose application security issues by presenting the usage of N-Version programming methodology to produce a new architectural framework to automate and enhance application security. Web applications and cloud computing are dominating the digital world; therefore, our goal is to build resilient systems that can detect and prevent both known and zero-day application attacks. Automated process flow not only reduces security efforts during the Software Development Life Cycle…
In this paper, we expose application security issues by presenting the usage of N-Version programming methodology to produce a new architectural framework to automate and enhance application security. Web applications and cloud computing are dominating the digital world; therefore, our goal is to build resilient systems that can detect and prevent both known and zero-day application attacks. Automated process flow not only reduces security efforts during the Software Development Life Cycle (SDLC), but also enhances the overall application security. In addition, we propose compartmentalizing the application into separate components and applying the N-Version methodology to the critical ones to reduce the additional overhead introduced by the N-Version methodology.
http://www.crosstalkonline.org/storage/issue-archives/2014/201409/201409-0-Issue.pdfOther authorsSee publication -
Application Security Automation for Cloud Computing
2nd International ICST Conference on Cloud Computing (CloudComp 2010)
As organizations evaluate the benefits of migrating services to cloud based computing environments, there are multiple economic factors including avoidance of capital expenditure for infrastructure, service level agreements, and pay as you go subscriptions. In addition to the cost benefits, management aspects such as reliability, continuity, and scalability among others are touted. However, trust and security concerns are among the biggest issues facing cloud computing acceptance; in addition…
As organizations evaluate the benefits of migrating services to cloud based computing environments, there are multiple economic factors including avoidance of capital expenditure for infrastructure, service level agreements, and pay as you go subscriptions. In addition to the cost benefits, management aspects such as reliability, continuity, and scalability among others are touted. However, trust and security concerns are among the biggest issues facing cloud computing acceptance; in addition, cloud architecture creates anxiety in regards to customer versus provider security responsibilities. This paper details the usage of N-Version programming methodology to produce a new architectural framework (N-Version Architecture Framework for Application Security Automation [NVASA]) to enhance and automate security; therefore, building resilient applications/services on the cloud that can detect and nullify both known and unknown application attacks. An experimental implementation was constructed that successfully validated the NVASA architecture.
Other authors
Courses
-
A Security Professional's Guide to Artificial Intelligence By ISC2
-
-
Crowdsourced Security By ISC2
-
-
DevSecOps Inegrating Security into DevOps By ISC2
-
-
GDPR for Security Professionals: a Framework for Success By ISC2
-
-
Utilizing Big Data By ISC2
-
-
When Ethics Meets Artificial Intelligence By ISC2
-
Languages
-
Arabic
-
-
English
-
Organizations
-
Open Web Application Security Project (OWASP)
-
- Present -
Institute of Electrical and Electronics Engineers (IEEE)
-
Recommendations received
5 people have recommended Majid A.
Join now to viewMore activity by Majid A.
-
أبرز النقاط التي ذكرها سعادة الرئيس التنفيذي لـ #الهيئة_العامة_للمنافسة الدكتور فهد بن إبراهيم الشثري في كلمته بمؤتمر الأمم المتحدة للمنافسة…
أبرز النقاط التي ذكرها سعادة الرئيس التنفيذي لـ #الهيئة_العامة_للمنافسة الدكتور فهد بن إبراهيم الشثري في كلمته بمؤتمر الأمم المتحدة للمنافسة…
Liked by Majid A. Malaika - Dr.Eng
-
Cisco has released a study showing AI is transforming enterprise networks in Saudi Arabia. The study highlights that 94% of respondents plan to…
Cisco has released a study showing AI is transforming enterprise networks in Saudi Arabia. The study highlights that 94% of respondents plan to…
Liked by Majid A. Malaika - Dr.Eng
-
Work-Life Balance is a MYTH!!! The important questions are: - “What is the life you want?” - “What are you willing to give up for it?” You…
Work-Life Balance is a MYTH!!! The important questions are: - “What is the life you want?” - “What are you willing to give up for it?” You…
Liked by Majid A. Malaika - Dr.Eng
-
يوم أمس كان آخر يوم عمل لي في رحلتي مع شركة آل سعيدان للعقارات، التي بدأت في يناير 2021. خلال هذه السنوات، حظيت بفرصة العمل مع زملاء موهوبين، وتحملت…
يوم أمس كان آخر يوم عمل لي في رحلتي مع شركة آل سعيدان للعقارات، التي بدأت في يناير 2021. خلال هذه السنوات، حظيت بفرصة العمل مع زملاء موهوبين، وتحملت…
Liked by Majid A. Malaika - Dr.Eng
-
Paris Fashion Week Haute Couture — always a pleasure to be here.
Paris Fashion Week Haute Couture — always a pleasure to be here.
Liked by Majid A. Malaika - Dr.Eng
-
Your grapevine can work FOR you or AGAINST you. Read my article featured in The Wall Street Journal to learn more: https://lnkd.in/gXcedCCh. In my…
Your grapevine can work FOR you or AGAINST you. Read my article featured in The Wall Street Journal to learn more: https://lnkd.in/gXcedCCh. In my…
Liked by Majid A. Malaika - Dr.Eng
-
Just finished a rewarding week teaching negotiations to the commercial teams at Shopware in Germany. Over three intensive days, we covered material…
Just finished a rewarding week teaching negotiations to the commercial teams at Shopware in Germany. Over three intensive days, we covered material…
Liked by Majid A. Malaika - Dr.Eng
-
It was a pleasure attending the Saudi Fashion Awards; so proud of my community! وزارة الثقافة Ministry of Culture / Fashion MOC
It was a pleasure attending the Saudi Fashion Awards; so proud of my community! وزارة الثقافة Ministry of Culture / Fashion MOC
Liked by Majid A. Malaika - Dr.Eng
-
#Collaboration, #peer2peer #learning and #knowledge #exchange on the #future of digital public infrastructure, identity, digital credentials and…
#Collaboration, #peer2peer #learning and #knowledge #exchange on the #future of digital public infrastructure, identity, digital credentials and…
Liked by Majid A. Malaika - Dr.Eng
-
Our Departmental Paper on SSA Digital Payment Innovations is finally out! https://lnkd.in/evKxHXbJ This paper takes stock of developments and…
Our Departmental Paper on SSA Digital Payment Innovations is finally out! https://lnkd.in/evKxHXbJ This paper takes stock of developments and…
Liked by Majid A. Malaika - Dr.Eng
-
Check out the DLT Innovation Challenge launched by the Bank of England with the BIS Innovation Hub London Centre. Applications are open.
Check out the DLT Innovation Challenge launched by the Bank of England with the BIS Innovation Hub London Centre. Applications are open.
Liked by Majid A. Malaika - Dr.Eng
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content