Naresh Kshetri Headshot

Naresh Kshetri

Lecturer

Department of Cybersecurity
Golisano College of Computing and Information Sciences

Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Naresh Kshetri

Lecturer

Department of Cybersecurity
Golisano College of Computing and Information Sciences

Bio

Naresh Kshetri received the MCA (Computer Applications) degree from University of Allahabad in 2014, MS (Cybersecurity) from Webster University in 2017, and the PhD (Computer Science with concentration in Cybersecurity) from the University of Missouri - St. Louis in 2022. Dr. Kshetri has taught several courses in Cybersecurity and Computer Science at both undergraduate and graduate levels. He joined RIT as a full time faculty of Cybersecurity in the Fall 2024. He has over ten years of experience in teaching and research. His interests include cybersecurity, cyber defense, and blockchain technology. For a complete list of Dr. Kshetri's teaching and publications, please visit https://sites.google.com/view/nareshkshetri.


Personal Links
(opens in a new window)
(opens in a new window)

Select Scholarship

* Journal Paper 

[J3] M. M. Rahman, N. Kshetri, S. A. Sayeed, M. M. Rana, “AssessITS: Integrating procedural guidelines and practical evaluation metrics for organizational IT and Cybersecurity risk assessment” Journal of Information Security, Vol. 15, No. 4, 564-588, Oct 2024. DOI: https://doi.org/10.4236/jis.2024.154032 

[J2] J. Hutson, N. Kshetri, G. Banerjee, K. Odenwald, J. Ratican “Architecting the Metaverse: Blockchain and the Financial and Legal Regulatory Challenges of Virtual Real Estate” Journal of Intelligent Learning Systems and Applications, 2023, Volume: 15, No.: 1, Page: 1-23, Scientific Research Publishing, Feb 2023. DOI: https://doi.org/10.4236/jilsa.2023.151001

[J1] N. Kshetri, C. S. Bhushal, P. S. Pandey, Vasudha, “BCT-CS: Blockchain Technology Applications for Cyber Defense and Cybersecurity: A Survey and Solutions” IJACSA, Vol. 13, No.11, pp. 364-370, Dec 2022. DOI: https://dx.doi.org/10.14569/IJACSA.2022.0131140

* Conference Proceedings

[C3] D. Chapagain, N. Kshetri, B. Aryal, “Deepfake Disasters: A Comprehensive Review of Technology, Ethical Concerns, Countermeasures, and Societal Implications” In 2024 IEEE 4th International Conference on Emerging Trends in Networks & Computer Communications (ETNCC) (pp. 139-147). IEEE. https://doi.org/10.1109/ETNCC63262.2024.10767452 

[C2] N. Kshetri, M. M. Rahman, S. A. Sayeed, & I. Sultana (2024). cryptoRAN: A review on cryptojacking and ransomware attacks w.r.t. banking industry-threats, challenges, & problems. In 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT) (pp. 523-528). IEEE. https://doi.org/10.1109/InCACCT61598.2024.10550970 

[C1] N. Kshetri, D. Kumar, J. Hutson, N. Kaur, & O. F. Osama (2024). algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms. In 2024 12th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-8). IEEE. https://doi.org/10.1109/ISDFS60797.2024.10527278 

* Books

[B1] N. Kshetri, P. S. Pandey, M. Ahmed, “Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications” Book series: Future Generation Information Systems, CRC Press, Routledge Taylor and Francis Group, Jan 2025. https://doi.org/10.1201/9781003449515  

Currently Teaching

CSEC-140
3 Credits
This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises.
CSEC-742
3 Credits
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies.