Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 3 July, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Most Inspiring Women in Cyber 2021: Areej Eliyan, IT Administrator at MOEHE Qatar

#WIC2021

by Nicole
November 30, 2021
in Features, Most Inspiring Women in Cyber
Most Inspiring Women in Cyber 2021: Areej Eliyan, IT Administrator at MOEHE Qatar
Share on FacebookShare on Twitter

The IT Security Guru’s Most Inspiring Women in Cyber Awards aims to shed a light on the remarkable women in our industry. The following is a feature on just one of the many phenomenal women put forward for the 2021 awards. Presented in a Q&A format, the nominee’s answers are written in their own words with minor edits made by the editor for readability.

This year, the awards are sponsored by KPMG and Beazley.


Areej Eliyan, IT Administrator at MOEHE Qatar

What does your job role entail?

I am an IT Administrator at the Ministry of Education and Higher Education Qatar (MOEHE), Doha-Qatar. My responsibilities include ensuring the upkeep, configuration, and reliable operation of client computer systems, servers, and data security systems.

How did you get into the cybersecurity industry?

I started my career as a Computer Engineer in MOEHE Qatar. As I was working, I noticed the rise in cyber threats facing organizations, governments, and individuals alike. So, I decided I’d better upskill and seek the combination of both experience and education. I’ve since completed a master’s degree (MSc) in cybersecurity.

What is one of the biggest challenges you have faced as a woman in the tech/cyber industry and how did you overcome it?

My Master’s thesis was one of the biggest challenges I faced during my time working in the industry. It was about creating a network protocol for location privacy and resilience in querying industrial IoT devices.

The most difficult part was when I was trying to code a secure protocol for IoT devices; as it is considered within the restricted devices interim of memory, power, and processing. In other words, I was constricted by the strict limitations of IoT devices.

I overcame this issue after writing a very efficient code that could run on real IoT devices to provide it with real-time location privacy, and secure the communication between it and the base station (BS).

What are your top three greatest accomplishments you have achieved during your career so far?

  • Implementing a secure protocol for IoT devices:

I wrote a network protocol for location privacy and resilience in querying industrial IoT devices.

As we all know, the Internet of Things (IoT) has drawn much consideration nowadays, where it constitutes one of the most innovative developments of third-millennium technologies, that has improved the quality of our surrounding environment. They have also assisted and enhanced many different applications that have played an essential role in our daily lives, including smart homes, smart cities, smart grids, environmental monitoring, and many other applications.

The location privacy in some applications such as battlefield monitoring is more critical than the content of the carried data. Therefore, it is essential to preserve the location privacy of the network sensors in critical and strategic areas, that could be traced by a global eavesdropper. This dilemma is compounded by the extremely resource-restricted IoT devices, that call for effective and scalable solutions.

  • Invented a secure protocol for IoT communications:

Generally, for a Base Station (BS) to monitor an environment, hundreds of sensors should be distributed across the region that needs to be tracked, by which the sensors will use their sensing capability to sense data and send it to the BS. Therefore, the communication between one IoT device and another, as well as the BS should be secure to defend against strong adversaries with break-in capabilities.

  • Participated in the International Hacking Contest, Qatar International Cybersecurity Contest (QICC):

The contest seeks to reinforce and enhance Qatar’s leading role in understanding and strengthening cybersecurity through international and local networking and by drawing on relevant expertise.

By developing breakthrough ideas and encouraging inventive thinking, the event will help close the gap between academic research and industry applications.

What are you doing to support other women, and/or to increase diversity, in the tech/cyber industry?

I used to be the president of the Computing Club at Qatar University where I conducted and invited speakers to help students learn about ethical hacking and other different fields in computing.

Currently, during my work, I always share my story and my cyber knowledge with my female colleagues and encourage them to participate in any upcoming events that have to do with cybersecurity.

What is one piece of advice you would give to girls/women looking to enter the cybersecurity industry?

If you’re a woman looking to break into cybersecurity, start slow, read a lot, explore the different parts of cybersecurity, and don’t be afraid to make mistakes.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Most Inspiring Women in Cyber 2021: Anna Collard, SVP Content Strategy & Evangelist at KnowBe4

Next Post

IoT Security firm Armis now valued at $3.4B

Recent News

A Vulnerability Management Program is Nothing Without Identity Risk Protection

A Vulnerability Management Program is Nothing Without Identity Risk Protection

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

A Research of Threat Actor Activity & Myths Busted by Cato Networks

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

July 1, 2022
Over a Decade in Software Security: What Have We learned?

Over a Decade in Software Security: What Have We learned?

July 1, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information