Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Infosec culture: A former helicopter pilot's perspective
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
-
GDPR: Risk, opportunity and what it means for security professionals
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Proving ownership of IPv6 addresses
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
Deep learning for countering energy theft – a hybrid long-short term memory approach
Sponsored by: TechTarget ComputerWeekly.comEnergy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
-
Virtual currencies and their potential role in cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
The difficulties of defending against web tracking
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
-
Royal Holloway: Cloud-native honeypot deployment
Sponsored by: TechTarget ComputerWeekly.comExploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.