TechWorld 2025: Big Data, Computer Science and Information Technologies

Basant Kumar Profile

Basant Kumar

Basant Kumar

Biography

Basant Kumar is an accomplished academician and cybersecurity expert with over 23 years of experience in teaching, research, and administration. He is currently working as an Assistant Professor and Program Head of Information Security at the Modern College of Business and Science (MCBS) in Oman.

He holds a Post-Doctoral Fellowship from Lincoln University College, Malaysia, and a Ph.D. in Computer Science (Cyber Security) from Banasthali University, India. Additionally, he completed an M.Phil in Computer Science and Master’s in Computer Management (MCM).

His areas of expertise include Cyber Security, Blockchain Technology, Ethical Hacking, Information Security, and AI in Cybersecurity. He has earned several certifications, including: Certified Ethical Hacker (CEH) Computer Hacking Forensic Investigator (CHFI) Blockchain Technology (IIT Kanpur) IBM Certification in AI & Blockchain

Basant Kumar has contributed significantly to academic research, with several publications in Scopus-indexed journals and conferences. He has also served as a Subject Matter Expert (SME) for CompTIA, USA, and is an Ambassador of Oman CERT. Throughout his career, he has mentored students, coordinated academic programs, and organized cybersecurity awareness programs for schools and communities. His dedication to education and technology has earned him multiple awards, including the International Academic Excellence Award (2022) from Western Sydney University, Australia.

In addition to his academic achievements, he actively participates in faculty development programs, workshops, and research collaborations to promote knowledge and innovation in the field of cybersecurity.

Research Interest

Cyber Security, Blockchain Technology, Ethical Hacking, Information Security, Artificial Intelligence in Cybersecurity, Cryptography, and Network Security.

Abstract

Next-Generation Cyber Resilience: Blending Ethical Hacking and Reverse Engineering for Security Enhancement

Recent disclosures of security breaches of some of the world’s most secure networks have caused substantial loss, data theft, and corruption, leaving organizations questioning the adequacy of their existing security controls. This study looks at the important need for a complete cyber resilience plan that combines advanced hacking methods and reverse engineering tools to improve security for organizations facing more complex cyber threats. The developed research suggests for the Hacking Countermeasure Framework (HCF) to complement deficient aspects of hacking anticipation, hiding and deception, and Defense-in-Breadth (DiB) techniques. The process of implementing a secure system is divided into four phases, which includes the analysis of the studied literature around hacking threats and recommendations, identification of the anti-hacking factor and their correlation, a framework to prevent hacking and managerial security issues, and finally, triangulation validation through case studies, expert interviews, workshops, and review by domain experts. The results demonstrate the need for hacking anticipation, concealment, camouflage and DiB against countermeasures, while confirming the determinant role of Defense-in-Depth (DiD). It also creates a direct connection between risk assessment, audit and compliance measures in the context of hacking. The validated HCF provides actionable contributions in cybersecurity research and practice.

Keywords: Cyber resilience; Hacking Countermeasure Framework (HCF); Defense-in-Depth (DiD); Reverse Engineering; Risk Assessment and Compliance