Professional Documents
Culture Documents
https://www.researchgate.net/profile/Rodrigo-Ruiz-25
https://www.linkedin.com/in/natasha-ruiz-ph-d-861501115/
https://orcid.org/0000-0003-1644-3933
https://scholar.google.com.br/citations?user=CrlNQVwAAAAJ&hl=pt-BR&oi=ao
GOALS
Main experiences
WORK EXPERIENCE
As a Chief of Security Office I improve, modern security polices in the research centre. As a Chief of IT I
improve successful new projects like modern IP phone system, best practices and improve customer
satisfaction. Coordinator of public admin ERP for Ministry of Science and Technology. As Cyber Security
Researcher I work at consulting for:
Law Enforecement, Justice and Military cooperation: I participated in the Oracle project of the Federal
Police of Brazil in the development of monitoring systems to protect the public at major events such as the
Rio de Janeiro Olympics. I also participated in an investigation into a lawsuit against fraud in public software
purchases in a city in the state of São Paulo. For Brazilian Army I developed a process to evaluate
antimalware software before public purchase.
On Privacy, my works was presents with four research papers and three versions of a method to restore
InPrivate or incognito navigation over IE, Edge, Firefox, Chrome, Safari, Opera and TOR able to expose all
navigation made over incognito mode.
On Encryption, my work was provided three methods in three research papers to bypass cryptographic
systems to gain access to the encrypted files. Symantec Encryption Desktop, BitDefender Total Encryption
and Truecrypt variants are covered by these methods.
Web Credentials was explored in one research paper and it show how to get the completely fully clear text
of user credentials after the analyst having access to the computer target. The proposed method can get
credentials used in intranets or e-commerce; home banking and email accounts. The Brazilian federal bank
Caixa Econômica Federal improve its home banking because of this research.
On Security Systems my work was presented methods to create a cyber autoimmune disease and
scenarios analysis to use it over military demands. This research demonstrates the use of harmless DNA
fragments extracted from computer viruses from the 80's and their use to induce an autoimmune
cybernetic disease capable of fooling the most famous antiviruses. These systems made for protection, if
induced by this method thus cause a complete destruction of the operating system and a loss of customer
data. The human factor will always be the most important and at the same time the most flawed and
dangerous.
On Cyber Security Education, this research provides in two research papers, a critical survey of cyber
security education that explores UK Undergraduate Computer Science curricula and show that
cybersecurity as an optional content at the end of the course. Also, this research proposes a method to
classify how relevant is cyber security in this environment. The method presents a new insight into
cybersecurity education. IRCS Index of Relevance in Cybersecurity (IRCS) intends to classify the computer
science courses offered in UK Universities based on the relevance of cybersecurity formal presented in
their curricula.
Business or Sector Public administration and defence; compulsory social security
Website www.cti.gov.br
Responsible to design the ERP database and business rules for major of software, I always coordinate the
software deployment and client satisfaction. More than 100 clients with success stories.
Understanding and paying particular attention to the needs and peculiarities of each client, considering the
technological, social and business resources involved in each request, always guarantee the best result and
satisfaction generating customer satisfaction.
SQL specialist, data migrations, query tuning, report creation, data transformation, crystal report design.
In this biggest Software Company of South America I develop in script based language to promote
customizations in ERP software.
In addition to coordinating an ERP deployment team, I was primarily responsible for internal support for
other consultants in reporting on tools such as Crystal Reports and the development of complex SQL
queries anda database tunning. Also responsable to negociate with cilente dedlines and new routines.
Responsible of process analisys and new business process.
It is a company of genealogical services and citizenship services that provide services researching and
documentation of European ancestry to provide processes of citizenship to EU countries. It is a virtual
company.
I'm principal researcher responsable to find the trace of genealogical tree from the client until your
ancestral, 13 to 20 generations ago and prove their sepahrdic condition. I create the process and have
clients in many countries.
In this company I mix formal research method, police investigations methods and my hobby and love for
history to provide new hope for people.
Business or Sector Information and communication Department Genealogy
Website www.mundocidadania.com
Thesis Novel Approaches to Applied Cybersecurity in Privacy, Encryption, Security Systems, Web Credential
2017 – 2018 – Maringá, Brazil
POST GRADUATION IN CYBER CRIME PREVENTION – Cidade Verde College
LANGUAGE SKILLS
Other language(s):
SPANISH C1 C1 B1 B1 B1
ITALIAN A2 A2 A1 A1 A1
GERMAN A1 A1 A1 A1 A1
RUSSIAN A1 A1 A1 A1 A1
Levels: A1 and A2: Basic user; B1 and B2: Independent user; C1 and C2: Proficient user
DIGITAL SKILLS
My Digital Skills
Ms. SQL Server Transact-SQL Cristal Reports clipper Dbase III Dataflex PERL (elementary
proficiency for parsing) Scripting Languages ERWIN MSAccess Anti-virus, Anti-malware Phyton
(basics)
Researchgate
https://scholar.google.com/citations?user=CrlNQVwAAAAJ&hl=pt-BR
https://www.linkedin.com/in/natasha-ruiz-861501115/
PUBLICATIONS
Top publications
https://www.researchgate.net/profile/Rodrigo-Ruiz-25 – 2021
Thesis:Novel Approaches to Applied Cybersecurity in Privacy, Encryption, Security Systems, Web
Credentials, and Education
◦ 2015 Overconfidence: Personal Behaviors Regarding Privacy that Allows the Leakage of Information
in Private Browsing Mode into International Journal of Cyber Security and Digital Forensics DOI: 1
0.17781/P001619
◦ 2016 Lazarus: Data Leakage with PGP and Resurrection of the Revoked User into Journal of Cyber
Security and Mobility DOI: 10.13052/jcsm2245-1439.521
◦ ·2017 The leakage of passwords from home banking sites: A threat to global cyber security? into Jour
nal of Payments Strategy & Systems Volume 11 Number 2 https://
www.henrystewartpublications.com/jpss/v11
◦ 2019 A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity, ICG
S3 2019, London. DOI: 10.1109/ICGS3.2019.8688137
◦ 2020 Cyber Mission Operations: A Literature Review (ITNG2020) https://link.springer.com/chapter/
10.1007/978-3-030-43020-7_5
◦ 2022 - Brazil Method of Anti-malware Evaluation and Cyber Defence Impacts, Journal of Applied
security Research DOI: 10.1080/19361610.2022.2104104
◦ 2010 BinStat Tool for Recognition of Packed Executables ICCYBER (International Cyber Crime
Expert Conference) DOI: 10.5769/J201101003
◦ 2012 conference paper Turning Public the private navigation. Tornando Pública a Navegação "In
Private" (Portuguese) ICCYBER (International Cyber Crime Expert Conference) DOI: 10.5769/
C2012011
◦ 2014 Opening the " Private Browsing " Data - Acquiring Evidence of Browsing Activities The
International Conference on Information Security and Cyber Forensics (InfoSec2014) http://
sdiwc.net/digital-library/opening-the-private-browsing-data--acquiring-evidence-of-browsing-
activities.html
◦ 2014 conferense paper Aplicao do mtodo Brasil de avaliao de anti- malware e as repercusses para a
defesa ciberntica (Portuguese) SIGE – Symposium of Operational Applications in Areas of
Defense DOI: 10.13140/2.1.4877.6960
◦ 2014 Conference paper Security Issue on Cloned TrueCrypt Containers and Backup Headers - The
International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) https:/
/www.researchgate.net/publication/
271498536_Security_Issue_on_Cloned_TrueCrypt_Containers_and_Backup_Headers
◦ 2019 A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity, ICG
S3 2019, London. DOI: 10.1109/ICGS3.2019.8688137
◦ 2020 "A study on Trust Models in Cloud Computing" IEEE AICCSA 2019 DOI: 10.1109/
AICCSA47632.2019.9035279
◦ 2020 Cyber Mission Operations: A Literature Review (ITNG2020) https://link.springer.com/chapter/
10.1007/978-3-030-43020-7_5
◦ 2021 Method and Tool for Generating Table of Relevance in Literature Review (MTTR)-22nd European
Conference on Knowledge Management DOI: 10.34190/EKM.21.199
VOLUNTEERING
Others courses
2011 – Counter Intelligence, Prospect Intelligence; 2012 – Theory of discourse, UNICAMP (University of
Campinas);
2013 – Forensic Research, CTI – Renato Archer; 2019 – Course of Python for Research, HarvardX;
2019 – Entrepreneurship, University of Barcelona
Leadership
Since my childhood I have tended to offer to lead teams, whether in sports teams, or any other activity. I
was coordinator of technical teams in large companies, I owned a software company and led Doctors in
research activities when I was just graduated from college. I also know and like to support natural leaders
that I am happy to contribute to their success.
Hobbies
I love genealogy, human history and any kind of documentaries, I like rock music, to see the olympics and
suspense movies and books. I love to see cartoons with my kid. I love betting diving races with my son. I
love mountains and I've climbed mountains in the Andes and Brazil.
DRIVING LICENCE
Driving Licence: A
Driving Licence: B
I am a happy person, I speak with the same respect and attention to the poorest people in Bolivian villages
or a great businessman. I like to lecture on subjects in my domain and participate in any type of debate,
technical, political or on any topic, I love to learn and share.
RECOMMENDATIONS
co-supervisor of my Ph.D.
Email spancham@gmail.com
co-supervisor of Ph.D.
Email h.kazemian@londonmet.ac.uk
ACADEMIC AND PROFESSIONAL EXPERIENCES, SCHOLARLY INTERESTS AND TEACHING
PHILOSOPHY
Experience in conducting professional training for lay people and technicians, in ERP, SQL and Crystall
Reports. Experience in the implementation of a Campinas unit of the ESR, Higher School of Networks da
RNP, National Research Network. https://esr.rnp.br/