Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Royal Holloway: Information security of the 2016 Philippine automated elections
Sponsored by: TechTarget ComputerWeekly.comWe analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
-
Unified Communication: “It should work as easily as a telephone call!”
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
A Security Assessment of Android Full-disk Encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
Bluetooth Low Energy: The IoT battle
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
Sponsored by: TechTarget ComputerWeekly.comAdvances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
Mobile Payments Using Host Card Emulation with NFC
Sponsored by: TechTarget ComputerWeekly.comIn this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.