Where Cyber Security fits at RHUL

Size: px
Start display at page:

Download "Where Cyber Security fits at RHUL"

Transcription

1 Cyber Security Research at Royal Holloway Information Security Group Activities and Research An Overview Prof. Keith Martin Where Cyber Security fits at RHUL

2 Information Security Group (ISG) Established in Full-time Academics with backgrounds in: Computer science Mathematics Electronic engineering Social science 6 Postdoctoral Research Assistants 40 Research Students 3 ISG objectives To conduct world class information security research To provide graduates with a broad understanding of all aspects of information security To be a source of information security expertise of industrial relevance To maintain close links with the information security industry

3 Core Research Areas (our version) Access control Critical infrastructure protection Cryptography Identity management Network security Smartcards and security modules System security Socio-technical issues Minor interests in security issues associated with trusted computing and virtualization, economics of information security, covert channel analysis, malware analysis, risk management Mapping Staff to ACE Research Areas Research Area Cryptography, Key Management and Related Topics Information Risk Management Systems Engineering and Security Analysis Information Assurance Methodologies Operational Assurance Methodologies Research into the Security of Technologies and Products Science of Cyber Security Building Trusted and Trustworthy Systems Staff Blackburn, Cid, Martin, Mitchell, Murphy, Ng, Paterson Coles-Kemp Cavallaro, Crampton, Hancke, Markantonakis, Mayes, Paterson, Tomlinson, Walter Cavallaro, Coles-Kemp, Markantonakis, Mitchell, Pavlovic, Wolthusen Cavallaro, Wolthusen Mitchell, Paterson, Price Cid, Coles-Kemp, Pavlovic Coles-Kemp, Markantonakis, Pavlovic, Tomlinson, Wolthusen Bold entries indicate primary research area

4 Current Research Projects Project Source Investigators Awarded Years International Technology Alliance Cyber Security Cartographies Analysis and Verification of Constrained Workflow Systems Cryptography: Bridging Theory & Practice Application of Security by Obscurity MoD/DoD Cid, Paterson EPSRC Cavallaro, Coles-Kemp, Hancke, Price, Tomlinson EPRSC Crampton, Cohen, Gutin EPSRC Paterson GCHQ Pavlovic Internet of Energy EU FP7/TSB Wolthusen PIs in bold These are the largest of our most recent grants; we have received around 50 awards in the last 6-7 years Lizzie s grant was awarded as part of the first ACE Research Institute call Kenny s grant is an EPSRC Leadership Fellowship International Technology Alliance (ITA) MoD/DoD-funded collaborative research project, universities and companies. IBM as prime contractor. Initial stage ran from 2006 to In current phase (BPP11): 6 projects in 2 Technical Areas: TA5: focus on the security, performance and control of hybrid coalition networks and distributed systems. TA6: focus on exploiting and managing network of data and information sources for effective understanding and decision making across coalition systems. Emphasis on UK-US, academic-industry and cross-ta collaborations. RHUL active in different projects. In initial stage led a project on security for Mobile Ad Hoc Networks. Now lead a task on cryptographic mechanisms for protecting the security of hybrid coalition networks.

5 Cryptography: Bridging Theory and Practice EPSRC-funded Leadership Fellowship, , 1.24M PI + 2 post-docs + 2 PhD students Aims: To better understand how cryptography is used in practice To develop theory that is better aligned with practice To build a community of researchers in this area Research outputs to date include attacks on and provable security analysis of IPsec, SSL/TLS, SSH and EMV protocols ECRYPT is an EU funded initiative that aims to improve the state of the art in practice and theory of cryptology and to develop a joint infrastructure for the evaluation and benchmarking of cryptographic and watermarking schemes. CySeCa The increasing dependency on a cyber infrastructure results in a more complex security estate and blurred security boundaries The rapid rise in the use of personal mobile devices as business computers (BYOD) being an obvious example CySeCa explores how social and technical controls can be mapped and the effect of those maps on cyber security decision making. BYOD = bring-your-own-device

6 Future plans and aspirations for the ACE-CSR scheme

The Research of the Information Security Group

The Research of the Information Security Group The Research of the Information Security Group Jason Crampton Director of Research Information Security Group Royal Holloway, University of London 11th February 2013 1 Introduction Royal Holloway, University

More information

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway

More information

Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011)

Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) A summary of information received from numerous Careers Services regarding codes, code-breaking

More information

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Call type: Invitation for Applications Closing date: 16 December 2011, 16:00 Briefing meeting date 1 : 15 November 2011 Summary

More information

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes

More information

Information Security Group. Review 07/08

Information Security Group. Review 07/08 Information Group Review 07/08 03 Compulsive, addictive, fun CONTENTS 03 Letter from the ISG Director Teaching Information to undergraduates News in Brief Ken Jacobie TEACHING INFORMATION SECURITY TO UNDERGRADUATES

More information

Briefing note: GCHQ Internships

Briefing note: GCHQ Internships Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2

More information

UK s new Research Institute investigates the science of cybersecurity

UK s new Research Institute investigates the science of cybersecurity UK s new Research Institute investigates the science of cybersecurity Government Communications Headquarters (GCHQ) How do we know when we are secure enough? How do we decide how best to spend our precious

More information

New cyber security research lab at the ISG. Dusko Pavlovic. Royal Holloway dusko.pavlovic@rhul.ac.uk

New cyber security research lab at the ISG. Dusko Pavlovic. Royal Holloway dusko.pavlovic@rhul.ac.uk a s e c o New cyber security research lab at the ISG Dusko Pavlovic Royal Holloway dusko.pavlovic@rhul.ac.uk 1 What is ASECOLab? ASECOLab is the Adaptive Security and Economics Laboratory at the Information

More information

How small and medium-sized enterprises can formulate an information security management system

How small and medium-sized enterprises can formulate an information security management system How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and

More information

Information Security Group. Review 13/14

Information Security Group. Review 13/14 Information Security Group Review 13/14 LETTER FROM THE ISG DIRECTOR I am delighted to introduce the annual review newsletter of the Information Security Group at Royal Holloway, University of London.

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

MScand Postgraduate Diploma in Information Security Royal Holloway, University of London

MScand Postgraduate Diploma in Information Security Royal Holloway, University of London MScand Postgraduate Diploma in Information Security Royal Holloway, University of London Programme Director Dr Colin Walter, colin.walter@rhul.ac.uk Worldwide Worldwide Access Access Opportunity International

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London

Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London Damien Sauveron damien.sauveron@xlim.fr http://damien.sauveron.free.fr/ GT SeFSI 3 octobre 2006 Le Campus du Royal

More information

National Security Agency Perspective on Key Management

National Security Agency Perspective on Key Management National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München

More information

Introduction. Professor M. Angela Sasse Director Research Institute in Science of Cyber Security

Introduction. Professor M. Angela Sasse Director Research Institute in Science of Cyber Security λ» ½ ² ² ͽ»²½» ±º Ý ¾» Í»½«Î»» ½ ² ² ͽ»²½» ±º Ý ¾» Í»½«ß²²«Î» ± îðï ß²²«Î» ± îðïí λ» ½ ² ² ͽ»²½» ±º Ý ¾» Í»½«ß²²«Î» ± îðï Annual Report 2014 Introduction As Research Director of the Research Institute

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0

CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0 CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0 CYBERSECURITY Research and innovation for a more secure Britain 82 million of current EPSRC investments in research

More information

Master in Cyber Security

Master in Cyber Security Master in Cyber Security Contents 5 Introduction 6 Master in Cyber Security 7 About GCSEC 8 Information Security Group and Royal Holloway 9 Admission 10 Program Overview 12 Degree classification scheme

More information

Developing our capability in cyber security Academic Centres of Excellence in Cyber Security Research

Developing our capability in cyber security Academic Centres of Excellence in Cyber Security Research Developing our capability in cyber security Academic Centres of Excellence in Cyber Security Research Contents Ministerial Foreword: Rt. Hon. David Willetts MP... 2 Academic Centres of Excellence in Cyber

More information

Cyber Security @ DTU. Lars Ramkilde Knudsen

Cyber Security @ DTU. Lars Ramkilde Knudsen Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

Facilitated Self-Evaluation v1.0

Facilitated Self-Evaluation v1.0 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Developing our capability in cyber security Academic Centres of Excellence in Cyber Security Research

Developing our capability in cyber security Academic Centres of Excellence in Cyber Security Research Developing our capability in cyber security Academic Centres of Excellence in Cyber Security Research Updated July 2015 Contents Ministerial Foreword: Ed Vaizey MP, Minister for Culture & the Digital Economy....

More information

Higher Education Commission Postgraduate Education Inquiry. Response from the Council for the Mathematical Sciences

Higher Education Commission Postgraduate Education Inquiry. Response from the Council for the Mathematical Sciences Higher Education Commission Postgraduate Education Inquiry Response from the Council for the Mathematical Sciences About the Council for the Mathematical Sciences (CMS) The CMS (www.cms.ac.uk) was established

More information

Engineering Secure Complex Software Systems and Services

Engineering Secure Complex Software Systems and Services Engineering Secure Complex Software Systems and Services Preparation of FP7-ICT WP 2009-2010 - Mini-Concertation Meeting Henrique Madeira University of Coimbra Portugal University of Coimbra Question 1

More information

Information Security in the undergraduate curriculum

Information Security in the undergraduate curriculum Information Security in the undergraduate curriculum Chris Mitchell Royal Holloway, University of London www.isg.rhul.ac.uk/~cjm 1 Background I Some years ago, computer hacking was mainly done for fun.

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

Information Security Group. Review 09/10

Information Security Group. Review 09/10 Information Security Group Review 09/10 LETTER FROM THE ISG DIRECTOR I am delighted to introduce the latest review newsletter of the Information Security Group at Royal Holloway, University of London.

More information

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd NICF Cyber Security Operations Specialist Page 1 Cyber Security Operations Essentials 1.

More information

Information Security Group. Review 10/11

Information Security Group. Review 10/11 Information Security Group Review 10/11 LETTER FROM THE ISG DIRECTOR It is a pleasure to introduce this review of activities of the Information Security Group at Royal Holloway over the past year. I am

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

Cyber Security Education, Qualifications and Training

Cyber Security Education, Qualifications and Training Cyber Security Education, Qualifications and Training Prof. Keith M. Martin Information Security Group, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK This paper is a postprint of a paper

More information

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cyber Security in the University of Oxford: Collaborating without Conforming? Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity

More information

EIT ICT Labs MASTER SCHOOL. Specialisations

EIT ICT Labs MASTER SCHOOL. Specialisations EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,

More information

Collaborative Computational Projects: Networking and Core Support

Collaborative Computational Projects: Networking and Core Support Collaborative Computational Projects: Networking and Core Support Call type: Invitation for proposals Closing date: 16:00 07 October 2014 Related themes: Engineering, ICT, Mathematical sciences, Physical

More information

ARCHITECTING HIGH-SECURITY SYSTEMS FOR MULTILATERAL COOPERATION

ARCHITECTING HIGH-SECURITY SYSTEMS FOR MULTILATERAL COOPERATION ARCHITECTING HIGH-SECURITY SYSTEMS FOR MULTILATERAL COOPERATION In cooperation with: Federal Office for Information Security Architecting high-security systems for multilateral cooperation Threats to critical

More information

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Introduction In today s dynamic business environment, corporation s intangible

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

Fighting product clones through digital signatures

Fighting product clones through digital signatures Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover

More information

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Master of Science, Master of Science with a Year in Industry, Postgraduate Diploma, and Postgraduate Certificate

More information

Asia Pacific the Future of Cloud Computing

Asia Pacific the Future of Cloud Computing Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why

More information

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers

More information

Lecturer in the School of Computer Applications

Lecturer in the School of Computer Applications Lecturer in the School of Computer Applications Job Description The School of Computer Applications is responsible for the disciplines of computing and quantitative methods within the University and has

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

Using EMV Cards to Protect E-commerce Transactions

Using EMV Cards to Protect E-commerce Transactions Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,

More information

How To Understand The Value Of A Website In A Blog Post

How To Understand The Value Of A Website In A Blog Post Ron Berman Contact Information 2220 Piedmont Avenue University of California at Berkeley phone: +1-415- 379-0011 email: ron_berman@haas.berkeley.edu web: faculty.haas.berkeley.edu/ron_berman Education

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

Dr. Waleed A. Alrodhan (Biographical Sketch)

Dr. Waleed A. Alrodhan (Biographical Sketch) Dr. Waleed A. Alrodhan (Biographical Sketch) Waleed was born in the Kingdom of Saudi Arabia in 1981. He has received his B.Sc. degree in Computer Sciences from King Saud University (2002), his M.Sc. degree

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE.

Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. Straddling the Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. E R I C J O D O I N B S I D E S O T T A WA 2 0 1

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook

More information

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved CREST EXAMINATIONS This document and any information therein are the property of CREST and without infringement neither the whole nor any extract may be disclosed, loaned, copied or used for manufacturing,

More information

Modeling and verification of security protocols

Modeling and verification of security protocols Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt martin@piware.de Paper and slides available

More information

Attacks against certification service providers and their ramifications

Attacks against certification service providers and their ramifications Federal IT Steering Unit FITSU Federal Intelligence Service FIS Reporting and Analysis Centre for Information Assurance MELANI www.melani.admin.ch Technological consideration Attacks against certification

More information

CHAPTER 1: ALUMNI OFFICE BUDGET & STAFFING

CHAPTER 1: ALUMNI OFFICE BUDGET & STAFFING CHAPTER 1: ALUMNI OFFICE BUDGET & STAFFING Table 1: Is your alumni office responsible for alumni of all schools and s of the college or for a specific? No Response Alumni of all schools and s Entire Sample

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Assurance Framework January 2015 December 2013 Contents Introduction... 3 Change from June 2014 version... 3 Overview... 4 Stage Definitions... 5 Stage 1 Cyber Essentials: verified

More information

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS

More information

Professor John McCanny CBE FRS FREng

Professor John McCanny CBE FRS FREng Foundation for Science and Technology-debate How can UK intellectual property be better protected from cyber theft". Professor John McCanny CBE FRS FREng Research Challenges Everyday we create 2.5 quintillion

More information

Protecting against modern password cracking

Protecting against modern password cracking Protecting against modern password cracking Are passwords still an adequate form of authentication? by Yiannis Chrysanthou, MSc (RHUL, 2012), and Allan Tomlinson (supervisor), ISG, Royal Holloway istockphoto/ronen

More information

Encryption-The Dark Side:

Encryption-The Dark Side: Encryption-The Dark Side: Things to Worry About for 2014 September 30, 2014 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time 1 Welcome Conference Moderator Mathieu Gorge CEO and Founder

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives Cyber Security Skills: a guide for business Getting involved with skills, knowledge and capability initiatives March 2014 Contents Introduction... 3 Index... 4 Initiatives supporting schools... 5 Initiatives

More information

How To Write A Research Proposal For An Erc Grant

How To Write A Research Proposal For An Erc Grant ERC Starting Grant 2014 Research proposal (Part B1 and Part B2) Version 1.0 11 December 2013 Disclaimer This document is aimed at informing potential applicants for Horizon 2020 funding. It serves only

More information

Information Security for Modern Enterprises

Information Security for Modern Enterprises Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.

More information

CSE/EE 461 Lecture 23

CSE/EE 461 Lecture 23 CSE/EE 461 Lecture 23 Network Security David Wetherall djw@cs.washington.edu Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data

More information

German Doctoral Studies in Engineering. - An International Perspecetive

German Doctoral Studies in Engineering. - An International Perspecetive acatech Symposium: Ingenieurpromotion: Stärken und Qualitätssicherung German Doctoral Studies in Engineering - An International Perspecetive Professor Gerry Byrne Berlin, 24 th May 2011 12 acatech Recommendations

More information

Report on FY2001 Evaluation of Public-Key Cryptographic Techniques

Report on FY2001 Evaluation of Public-Key Cryptographic Techniques CRYPTREC April 2001 March 2002 Report on FY2001 Evaluation of Public-Key Cryptographic Techniques April 16, 2002 Tsutomu Matsumoto Chair of Public-Key Cryptography Sub-Committee CRYPTREC Evaluation Committee

More information

IT Security Quo Vadis?

IT Security Quo Vadis? Munich IT Security Research Group IT Security Quo Vadis? Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu http://muse.bayern Prof. Dr.-Ing. Hans-Joachim

More information

1 About This Proposal

1 About This Proposal 1 About This Proposal 1. This proposal describes a six-month pilot data-management project, entitled Sustainable Management of Digital Music Research Data, to run at the Centre for Digital Music (C4DM)

More information

Cyber Essentials. Test Specification

Cyber Essentials. Test Specification Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8

More information

Aptica Software & Mobile Security

Aptica Software & Mobile Security Aptica Software & Mobile Security Cyber Security Showcase, UKTI & Cyber Security KTN Event Brussels, 29 th February 2012 Andrew Brown Managing Director Aptica Limited About Aptica Founded in June 2010

More information

E-Democracy and e-voting

E-Democracy and e-voting E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D Jordi.puiggali@scytl.com Index Introduction e-democracy Security and Transparency in e-voting

More information

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4 Increasing Network Security Introduction Network and data security has been a growing concern in many organizations. With the emergence of wireless networking, security preemptives have been primarily

More information

Information Technology Laboratory (ITL) - Strategic Planning Update - Cita Furlani, Director

Information Technology Laboratory (ITL) - Strategic Planning Update - Cita Furlani, Director Information Technology Laboratory (ITL) - Strategic Planning Update - Cita Furlani, Director 1 Strategy Why? NIST Mission: To promote U.S. innovation and industrial competitiveness by advancing measurement

More information

Application Security: Threats and Architecture

Application Security: Threats and Architecture Application Security: Threats and Architecture Steven M. Bellovin smb@cs.columbia.edu http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1 We re from the Security Area, and We re Here to

More information

On Security Evaluation Testing

On Security Evaluation Testing On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

Director of Strategic Planning and Finance

Director of Strategic Planning and Finance Ashcroft International Business School Job Description Job Title: Grade: Work Base: Hours of Work: Responsible to: Responsible for: Relationships and Contacts: Director of Strategic Planning and Finance

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 7 Announcements Reminder: First Midterm is one week from today. (2/9/2006) In class, closed notes Example exam from last year will be

More information

The Value of Threat Modelling 1

The Value of Threat Modelling 1 The Value of Threat Modelling 1 Authors Tim Williams MSc (Royal Holloway, 2014) Lorenzo Cavallaro, ISG, Royal Holloway Summary Threat Modelling is an umbrella term covering a variety of powerful techniques

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella

Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

SECURED DATA STORAGE IN CLOUD

SECURED DATA STORAGE IN CLOUD International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2

More information

U. S. Department of Justice Information Technology Strategic Plan. Appendix E. Public Key Infrastructure at the Department of Justice.

U. S. Department of Justice Information Technology Strategic Plan. Appendix E. Public Key Infrastructure at the Department of Justice. U. S. Department of Justice Information Technology Strategic Plan Public Key Infrastructure at the Department of Justice White Paper * Introduction As part of its strategic plan, the Department of Justice

More information

Information Leakage in Encrypted Network Traffic

Information Leakage in Encrypted Network Traffic Information Leakage in Encrypted Network Traffic Attacks and Countermeasures Scott Coull RedJack Joint work with: Charles Wright (MIT LL) Lucas Ballard (Google) Fabian Monrose (UNC) Gerald Masson (JHU)

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant

More information