Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
A case study in critical infrastructure interdependency
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
-
Royal Holloway: Attack mapping for the internet of things
Sponsored by: TechTarget ComputerWeekly.comThe introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
Sponsored by: TechTarget ComputerWeekly.comDiscover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
Sponsored by: TechTarget ComputerWeekly.comApple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
Royal Holloway: Secure multiparty computation and its application to digital asset custody
Sponsored by: TechTarget ComputerWeekly.comFor this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
-
Enterprise cloud applications – can we trust them?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
-
Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Towards more robust internetworks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.