Briefing note: GCHQ Internships

Size: px
Start display at page:

Download "Briefing note: GCHQ Internships"

Transcription

1 Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2 to sponsor internships for mathematical PhD students in selected areas applicable to GCHQ work. There are currently opportunities to become an intern in the following areas: 1. Network analysis; 2. Security proofs; 3. PQ cryptography. Interns are typically current or recently graduated PhD students, or early stage researchers in the mathematical sciences who spend 4-6 months working on site on a project of real importance and value to the sponsoring organisation. They are supported by an academic supervisor and the staff of the Smith Institute. Funding is available for the stipend of the Intern and for their supervision. GCHQ reserves the right to restrict what an Intern is allowed to publish from the work undertaken during the project, but work can still contribute to the host University s submission to the REF. Further information on each project and details for applicants are provided below. Applications are welcome by 21 st July Please request an application form for the project you wish to apply for, from judy.reynolds@smithinst.co.uk

2 1. Network analysis Do you have a conceptual framework for handling big data? Are you motivated by the chance to have access to real world data and apply your proposed approach? This project is to develop models for very large, complex heterogeneous networks conveying behaviour of people and systems to develop statistical tests for anomalous behaviour and novel streaming algorithms for analytical detection. The relevant disciplines would be mathematics, computer science and statistics. Interns will work as part of an in-house data science team and with subject matter experts in several specific areas of application. Network data for each application area would typically be hundreds of peta-bytes and may contain only tiny signals of anomalous behaviour. With only one data set and very little idea of the underlying process, the challenge for each application-specific problem is to use a combination of data science and subject matter expertise to model a random system. The overall aim is to identify an approach suited to multiple areas of application: to apply and refine a conceptual framework for handling big data in order to develop application-specific models of network behaviour more efficiently. Successful candidates will have a background in large scale data science and a genuine interest in working with very large-scale real-world data. They should be confident in the use of approaches for the study of behaviour in networks and the identification of anomalous behaviour. Moreover they should be ready to adapt their conceptual approach as the realities of dealing with real world data are encountered. 2

3 2. Security proof Do you have a background in provable security research? Are you motivated by the challenge of bridging the gap between mathematical theory and engineering practice? This project is to take standard security proof models in cryptography and systems security and relate them to CESG evaluation techniques to improve GCHQ evaluation process and understand the practical limitations of security models. Interns will work closely with in-house experts to gain a working knowledge of security risk assessment in practice. In-house approaches in this area may have diverged in recent years from the approaches published from academic research, at least in terms of the use of language. This project attempts to transfer knowledge into GCHQ regarding current academic research on provable security. Overall the aim is to identify areas of agreement and difference by reviewing current practice in product evaluation in comparison with academic research in provable security. Successful candidates will have a thorough understanding of the research landscape in provable security and an interest in exploring the similarities and differences between provable security in theory and practice. They will need to have the ability to reach consensus on an issue, even when already biased to be on one side of the debate. 3

4 3. PQ cryptography Do you have expertise in classical cryptography? Are you motivated by the challenge of developing a framework for the assurance of proposed classical cryptographic methods in a post-quantum world? Interns will work with in-house experts in quantum algorithms and experts in the classical evaluation of cryptographic systems. Given the possibility that quantum based technology may be developed in future that can crack current public key encryption protocols, the development of post-quantum encryption algorithms is an active area of research. In parallel, it is necessary to develop standards for certification of cryptographic systems as robust against both quantum attack and classical attack. The aim of this project will be to evolve the criteria for the evaluation of currently proposed postquantum cryptographic systems to enable assurance in a post-quantum world. Successful candidates will have expertise in classical cryptography, including methods based on lattices and learning with errors and an interest in their evaluation for a post-quantum world. This project is not about research into quantum cryptography, nor is it about the development of new ideas for post-quantum cryptographic systems. 4

5 Further information for applicants Applications should be submitted by 21 st July 2014, and candidates chosen by end October ready for projects to start in March To be considered you must meet the following criteria: a) You must be a British Citizen b) One of your parents must also be a British citizen or have substantial ties with the United Kingdom or if deceased have had such citizenship or ties before their death. c) You must normally have been a resident in the UK for 10 years prior to the date of your application. To ensure suitability you must undergo a thorough security process. As part of this a criminal records check and a drugs test will be conducted. You will be asked to complete a medical and several Developed Vetting (DV) Questionnaires. If you do not meet the DV requirement or fail to disclose security related issues or concerns you will not be considered for the sponsorship. Further details on GCHQ acceptance criteria can be found at 5

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

Executive summary. Today s researchers require skills beyond their core competencies

Executive summary. Today s researchers require skills beyond their core competencies EXECUTIVE SUMMARY 9 Executive summary Today s researchers require skills beyond their core competencies The formation and careers of researchers are important policy issues and training for transferable

More information

MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. MI5 Discretion is vital. You should not discuss your application, other than with your partner or a close

More information

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change.

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change. Cambridge Judge Business School PhD pathway: Marketing Contents Contents... 1 Marketing PhD pathway: Course outline... 2 Coursework... 2 Marketing Strategy and Marketing Modelling sub-fields... 3 Consumer

More information

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change.

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change. Cambridge Judge Business School PhD pathway: Strategic Management (Stream A) Contents Contents... 0 Strategic Management pathway (Stream A): Course outline... 1 Coursework... 1 Research seminars... 1 Foundational

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes

More information

Note: The modules provided and their timing is subject to availability of faculty and may be subject to change.

Note: The modules provided and their timing is subject to availability of faculty and may be subject to change. Cambridge Judge Business School PhD pathway: Organisation Theory & Information Systems (OTIS) Contents Contents... 1 Organisation Theory & Information Systems (OTIS) PhD pathway: Course outline... 2 Coursework...

More information

Huawei Cyber Security Evaluation Centre: Review by the National Security Adviser

Huawei Cyber Security Evaluation Centre: Review by the National Security Adviser Huawei Cyber Security Evaluation Centre: Review by the National Security Adviser December 2013 Executive Summary 1. The Intelligence and Security Committee (ISC) reported in June 2013 on Foreign Investment

More information

Lecturer in the School of Computer Applications

Lecturer in the School of Computer Applications Lecturer in the School of Computer Applications Job Description The School of Computer Applications is responsible for the disciplines of computing and quantitative methods within the University and has

More information

Cybersecurity in a Quantum World: will we be ready?

Cybersecurity in a Quantum World: will we be ready? Cybersecurity in a Quantum World: will we be ready? Michele Mosca University Research Chair 3 April 2015 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental

More information

ESKISP6053.01 Assist security testing, under supervision

ESKISP6053.01 Assist security testing, under supervision Overview This standard covers the competencies required to assist security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011)

Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) A summary of information received from numerous Careers Services regarding codes, code-breaking

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

FORWARD: Standards-and-Guidelines-Process.pdf. 1 http://www.nist.gov/public_affairs/releases/upload/vcat-report-on-nist-cryptographic-

FORWARD: Standards-and-Guidelines-Process.pdf. 1 http://www.nist.gov/public_affairs/releases/upload/vcat-report-on-nist-cryptographic- NIST Cryptographic Standards and Guidelines: A Report to the NIST Visiting Committee on Advanced Technology Regarding Recommendations to Improve NIST s Approach FORWARD: In July 2014, the National Institute

More information

Programme Specification (Undergraduate) Date amended: 28 August 2015

Programme Specification (Undergraduate) Date amended: 28 August 2015 Programme Specification (Undergraduate) Date amended: 28 August 2015 1. Programme Title(s) and UCAS code(s): BSc Mathematics and Actuarial Science (including year in industry option) 2. Awarding body or

More information

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials 5th August 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

University of Bradford. 1 year full time, 2 years part-time

University of Bradford. 1 year full time, 2 years part-time UNIVERSITY OF BRADFORD Faculty of Engineering and Informatics School of Electrical Engineering and Computer Science (EECS) Programme/course title: MSc Cyber Security Awarding and teaching institution:

More information

ASSOCIATE PROJECT MANAGER

ASSOCIATE PROJECT MANAGER ASSOCIATE PROJECT MANAGER Duties and Responsibilities This class of positions encompasses project management and coordination work of varying degrees of difficulty and responsibility. All personnel may

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Lessons learned from creating a change management framework

Lessons learned from creating a change management framework Lessons learned from creating a change management framework Author Melanie Franklin Director Agile Change Management Limited Contents Introduction 3 What is a Change Management Framework? 3 Why is it called

More information

Appointment details Lecturer/Senior Lecturer in Accounting

Appointment details Lecturer/Senior Lecturer in Accounting Appointment details Lecturer/Senior Lecturer in Accounting Closing date -20 th June 2014 Ref: R140147 Contents About Aston University Welcome from the Vice-Chancellor, Professor Dame Julia King Job description

More information

Valid from: 2012 Faculty of Humanities and Social Sciences Oxford and Cherwell Valley College Thames Valley Police

Valid from: 2012 Faculty of Humanities and Social Sciences Oxford and Cherwell Valley College Thames Valley Police APPENDIX H Programme Specification Programme Specification Foundation Degree Policing Valid from: 2012 Faculty of Humanities and Social Sciences Oxford and Cherwell Valley College Thames Valley Police

More information

VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13

VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13 VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. Applications are invited for the position of Senior Expert in Security Tools and Architecture at the European Network

More information

University of Sussex School of Mathematical and Physical Sciences. Mathematics. www.sussex.ac.uk/maths

University of Sussex School of Mathematical and Physical Sciences. Mathematics. www.sussex.ac.uk/maths University of Sussex School of Mathematical and Physical Sciences Mathematics www.sussex.ac.uk/maths Join the Department of Mathematics At Sussex we recognise that mathematics is the foundation of the

More information

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer.

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer. Faculty of Engineering School of Computing Lecturer / Associate Professor in Computer Science We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Research Fellow in the Dynamic Response of Materials. Vacancy reference: 2222

Research Fellow in the Dynamic Response of Materials. Vacancy reference: 2222 Candidate Brief Research Fellow in the Dynamic Response of Materials Vacancy reference: 2222 Inside this pack: 1. Job overview 2. About Cranfield University 3. About Cranfield Defence and Security 4. Job

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

European Security Standards Reference Implementation Initiative (ESSRII)

European Security Standards Reference Implementation Initiative (ESSRII) European Security Standards Reference Implementation Initiative (ESSRII) A Proposal for Action in Europe on International Information Security Standards Brian Gladman, European Technical Director, Trusted

More information

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Assessment Strategy for. Audit Practice, Tax Practice, Management Consulting Practice and Business Accounting Practice.

Assessment Strategy for. Audit Practice, Tax Practice, Management Consulting Practice and Business Accounting Practice. Assessment Strategy for Audit Practice, Tax Practice, Management Consulting Practice and Business Accounting Practice December 2013 Introduction This Assessment Strategy has been designed to apply to qualifications

More information

MSC IN SOFTWARE ENGINEERING

MSC IN SOFTWARE ENGINEERING MSC IN SOFTWARE ENGINEERING AND TELECOMMUNICATIONS POSTGRADUATE STUDIES 2007 "The telecommunications industry offers steady, year-round employment. Computer software engineers and systems software developers

More information

Product Developer Role Description

Product Developer Role Description Product Developer Role Description Contents Description... 3 Specific Role Requirements... 3 Key Responsibilities... 3 Technical Attributes... 4 Personal Attributes... 5 Page 2 Description CPS has successfully

More information

Appointment details Software Engineer: Programming Language Development (KTP Associate)

Appointment details Software Engineer: Programming Language Development (KTP Associate) Appointment details Software Engineer: Programming Language Development (KTP Associate) Closing date 26 October 2014 Ref: R140297 Contents About Aston University Welcome from Professor Bjorn Birgisson,

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

Internship Opportunities Xerox Research Centre India (XRCI), Bangalore Analytics Research Group

Internship Opportunities Xerox Research Centre India (XRCI), Bangalore Analytics Research Group Analytics Research Group The Analytics Research Group in Xerox Research Centre India (XRCI) is seeking bright Undergraduate, Masters and PhD students for research internships to participate in exciting

More information

Change to Program/Graduate Diploma Academic Requirements Proposal Template

Change to Program/Graduate Diploma Academic Requirements Proposal Template 230 York Lanes - 4700 Keele Street 1 Change to Program/Graduate Diploma Academic Requirements Proposal Template 1. Program/Graduate Diploma: Computer Science and Engineering 2. Effective Session of Proposed

More information

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Call type: Invitation for Applications Closing date: 16 December 2011, 16:00 Briefing meeting date 1 : 15 November 2011 Summary

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have

More information

Transitional Strategic Plan Youth Work Ireland 2013 & 2014

Transitional Strategic Plan Youth Work Ireland 2013 & 2014 Transitional Strategic Plan Youth Work Ireland 2013 & 2014 February 2013 PROLOGUE Welcome to Youth Work Ireland s Transitional Strategic Plan 2013 and 2014. As our Board evaluated the outcomes and impacts

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art

The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art GRADUATE PROGRAMS The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art research centers and experiential

More information

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM Objectives Provide an overview of the CBEST program Overview will include answers to the following questions: What types

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance

More information

Contents... 1. Operations & Technology Management PhD pathway: Course outline... 2

Contents... 1. Operations & Technology Management PhD pathway: Course outline... 2 Cambridge Judge Business School PhD pathway: Operations & Technology Management Contents Contents... 1 Operations & Technology Management PhD pathway: Course outline... 2 Coursework... 2 Three core Operations

More information

Programme Specifications

Programme Specifications Programme Specifications MASTER OF PHILOSOPHY IN ECONOMIC AND SOCIAL HISTORY 1 Awarding body University of Cambridge 2 Teaching institution Faculty of History 3 Accreditation details None 4 Name of final

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Programme Specification Date amended: April 8, 2008

Programme Specification Date amended: April 8, 2008 Programme Specification Date amended: April 8, 2008 1. Programme Title(s) and UCAS code(s): Computing with Management (G4N1); Computing with Management with a year in Europe (G4NF); Computing with Management

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea shkim@kaist.ac.kr

More information

Integrated Dual Degree Programme

Integrated Dual Degree Programme Curriculum Model Integrated Dual Degree Programme (B.Tech + MBA) K L UNIVERSITY Green Fields, Vaddeswaram 522 502, Guntur District, A.P., INDIA. Ph: 08645 246948, Fax: 08645 247249 CONTENTS S. No Page

More information

Newton-Mosharafa PhD Programme

Newton-Mosharafa PhD Programme Newton-Mosharafa PhD Programme Call for Applications 1. The UK Department of Business, Innovation and Skills (BIS), the British Council, British Embassy Cairo and Egyptian Ministry of Higher Education

More information

Cyber Security @ DTU. Lars Ramkilde Knudsen

Cyber Security @ DTU. Lars Ramkilde Knudsen Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About

More information

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

Data Analysis Officer - Service Development Team

Data Analysis Officer - Service Development Team Job Title: Data Analysis Officer - Service Development Team Job Grade: Band 4-5 Directorate: Job Reference Number: Adults, Health and Community Wellbeing P01012 The Role Work closely with the Service Development

More information

Research at Henley Business School

Research at Henley Business School The DBA at Henley We attract experienced and motivated individuals to undertake significant research that shapes organisational thinking and provides an increasingly complex business environment. We are

More information

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Information Technology

Information Technology Monash is the only research-intensive, Group of Eight university to have a dedicated IT faculty. What makes at Monash University special? Quality instruction and varied choice: At Monash, students learn

More information

Position Description (PD)

Position Description (PD) UC High Performance Computing Position Description (PD) HPC System and Application Support Specialist - NeSI Fixed Term Position Number: 18962 July 2015 Our Vision We have a vision of people prepared to

More information

SCHOOL OF ENGINEERING. www.warwick.ac.uk/go/engineering RESEARCH DEGREES TAUGHT MASTER S DEGREES CONTACT DETAILS RESEARCH GROUPS

SCHOOL OF ENGINEERING. www.warwick.ac.uk/go/engineering RESEARCH DEGREES TAUGHT MASTER S DEGREES CONTACT DETAILS RESEARCH GROUPS Warwick s is one of the leading engineering schools in the UK. We offer a range of specialist taught Master s courses and research degrees. The School has a strong research profile placing it in the top

More information

Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement

Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement PROGRAMME SPECIFICATION KEY FACTS Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement Award BSc (Hons) School School of Mathematics, Computer

More information

Management School. MRes. Business and Management Research Methods. University of Stirling Management School

Management School. MRes. Business and Management Research Methods. University of Stirling Management School Management School MRes Business and Management Research Methods University of Stirling Management School The MRes Business and Management Research Methods provides both a stand-alone Master of Research

More information

BS Computer Science (2013 2014)

BS Computer Science (2013 2014) BS Computer Science (2013 2014) Program Information Point of Contact Venkat Gudivada (gudivada@marshall.edu) Support for University and College Missions Marshall University is a multi campus public university

More information

CESG Certified Professional

CESG Certified Professional CESG Certified Professional Verify your skills and competence in information assurance Now open to cyber security professionals working in UK industry CONTENTS 1. Introduction 2. IA in Context: Why Professionalism

More information

Where Cyber Security fits at RHUL

Where Cyber Security fits at RHUL Cyber Security Research at Royal Holloway Information Security Group Activities and Research An Overview Prof. Keith Martin Where Cyber Security fits at RHUL Information Security Group (ISG) Established

More information

CALCULUS COURSES AT THE COMPUTER SCIENCE FACULTY, THE UNIVERSITY OF INDONESIA

CALCULUS COURSES AT THE COMPUTER SCIENCE FACULTY, THE UNIVERSITY OF INDONESIA CALCULUS COURSES AT THE COMPUTER SCIENCE FACULTY, THE UNIVERSITY OF INDONESIA Kasiyah MACHMUDIN Department of Mathematics, University of Indonesia Computer Science Faculty, University of Indonesia kasiyah@makara.cso.ui.ac.id

More information

Overview TECHIS60341. Carry out security architecture and operations activities

Overview TECHIS60341. Carry out security architecture and operations activities Overview The protection of information, services and systems relies on a range of technical and procedural activities, often grouped in a framework. The framework will contain technical and logical, physical

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name MSc Project Management, Finance and Risk

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name MSc Project Management, Finance and Risk PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Project Management, Finance and Risk Award MSc School School of Mathematics, Computer Science and Engineering Department or

More information

University of Cambridge: Programme Specifications

University of Cambridge: Programme Specifications University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information contained in this programme specification. At the time of publication, the programme

More information

AIMS Structured Master s Programme in Mathematical Sciences

AIMS Structured Master s Programme in Mathematical Sciences AIMS Structured Master s Programme in Mathematical Sciences AIMS as a learning environment An AIMS center provides a holistic learning environment. The intensity and the high pace of the academic program

More information

I m improving equipment maintenance through data analysis

I m improving equipment maintenance through data analysis GRADUATE SCHOOL 2015-2016 I m improving equipment maintenance through data analysis Graduate program Industrial and Applied Mathematics * This major is formally part of the Computer Science & Engineering

More information

One LAR Course Credits: 3. Page 4

One LAR Course Credits: 3. Page 4 Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,

More information

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within

More information

Programme Specification (Postgraduate) Date amended: March 2014

Programme Specification (Postgraduate) Date amended: March 2014 Programme Specification (Postgraduate) Date amended: March 2014 1. Programme Title(s): M.Sc./Postgraduate Diploma/Postgraduate Certificate in Finance 2. Awarding body or institution: University of Leicester

More information

Social work and social work professions

Social work and social work professions Social work and social work professions Recommendations by Deutscher Verein on the formal recognition of Social Work degrees awarded by foreign institutions These recommendations (DV 36/14) were proposed

More information

MA in Health and Social Care

MA in Health and Social Care Programme Specification and Curriculum Map for MA in Health and Social Care 1. Programme title Health and Social Care 2. Awarding institution Middlesex University 3. Teaching institution Middlesex University

More information

Teaching institution: Institute of Education, University of London

Teaching institution: Institute of Education, University of London PROGRAMME SPECIFICATION MA Geography in Education Awarding body: Institute of Education, University of London Teaching institution: Institute of Education, University of London Name of the final award:

More information

Why Cryptosystems Fail. By Ahmed HajYasien

Why Cryptosystems Fail. By Ahmed HajYasien Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.

More information

SCHOOL OF ELECTRONICS AND COMPUTER SCIENCE

SCHOOL OF ELECTRONICS AND COMPUTER SCIENCE SCHOOL OF ELECTRONICS AND COMPUTER SCIENCE Information systems and software engineering are the key disciplines that ensure effective modelling, definition of requirements and specification, and the efficient

More information

Welcome to the Secure Software Development: Cryptography Scenario.

Welcome to the Secure Software Development: Cryptography Scenario. Welcome to the Secure Software Development: Cryptography Scenario. 1 After this scenario has been completed, you are expected to be able to: Identify and justify the selection of appropriate encryption

More information

The Health Foundation is an independent charity working to improve the quality of healthcare in the UK.

The Health Foundation is an independent charity working to improve the quality of healthcare in the UK. Job description Job title: Reporting to: Salary: Intern in Data Analytics (six months fixed term contract) Data Manager 17,843 per annum (pro rata) Hours per week: 37.5 The Health Foundation The Health

More information

School of Health in Social Science. Counselling and Psychotherapy. PhD/MPhil DEGREES IN COUNSELLING STUDIES INFORMATION BOOKLET, 2009 2010

School of Health in Social Science. Counselling and Psychotherapy. PhD/MPhil DEGREES IN COUNSELLING STUDIES INFORMATION BOOKLET, 2009 2010 School of Health in Social Science Counselling and Psychotherapy PhD/MPhil DEGREES IN COUNSELLING STUDIES INFORMATION BOOKLET, 2009 2010 Introduction The University of Edinburgh is a leading research university

More information

Data Science. BSc Hons

Data Science. BSc Hons Data Science BSc Hons Data scientists are the magicians of the Big Data era. New York Times, 2013 By 2018, the United States alone could face a shortage of 140,000 to 190,000 people with deep analytical

More information

POSTGRADUATE OPEN DAY

POSTGRADUATE OPEN DAY POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)

More information

The Crisis You Didn t See

The Crisis You Didn t See The Crisis You Didn t See A case for real-time security monitoring Maxim Elliott-Massouras Principal Architect Let s get started! Agenda 1.Introductions 2.Why are we here? 3.What are the challenges? 4.How

More information

Competing for the NSF Graduate Research Fellowship

Competing for the NSF Graduate Research Fellowship Competing for the NSF Graduate Research Fellowship Why Apply? $30,000 stipend for 12 months, for 3 years (over 5 year period) Free tuition (institution gets $10,500) Can be taken just about anywhere, including

More information

National Commission for Academic Accreditation & Assessment. National Qualifications Framework for Higher Education in the Kingdom of Saudi Arabia

National Commission for Academic Accreditation & Assessment. National Qualifications Framework for Higher Education in the Kingdom of Saudi Arabia National Commission for Academic Accreditation & Assessment National Qualifications Framework for Higher Education in the Kingdom of Saudi Arabia May, 2009 National Qualifications Framework for Higher

More information

CPP30411 Certificate III Security Operations Recognition of Prior Learning & Current Competency Kit. Evidence Matrix and Collation Report

CPP30411 Certificate III Security Operations Recognition of Prior Learning & Current Competency Kit. Evidence Matrix and Collation Report CPP30411 Certificate III Security Operations Recognition of Prior Learning & Current Competency Kit Evidence Matrix and Collation Report Applicant Name Date of Application Personal &Organisational details

More information

British Council Poland Internship Programme 2010

British Council Poland Internship Programme 2010 British Council Poland Internship Programme 2010 DESCRIPTION OF THE INTERNSHIP PROGRAMME OBJECTIVE To provide students with an opportunity to gain working experience in one of the oldest and largest international

More information

GUIDE TO COMPLETING THE ONLINE APPLICATION FORM FOR GRADUATE STUDY

GUIDE TO COMPLETING THE ONLINE APPLICATION FORM FOR GRADUATE STUDY GUIDE TO COMPLETING THE ONLINE APPLICATION FORM FOR GRADUATE STUDY Version 2 Last Updated: 25 January 2016 2016-17 Contents: Introduction... 3 General information about the online application:... 4 Creating

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information