Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
-
Royal Holloway: Corporate under-reporting of cyber crime
Sponsored by: TechTarget ComputerWeekly.comWithout reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
Sponsored by: TechTarget ComputerWeekly.comCyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
How long does it take to get owned?
Sponsored by: TechTarget ComputerWeekly.comA study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
Sponsored by: TechTarget ComputerWeekly.comIn this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
Sponsored by: TechTarget ComputerWeekly.comCyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
-
Royal Holloway: An enhanced approach for USB security management
Sponsored by: TechTarget ComputerWeekly.comUSB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
A case study in critical infrastructure interdependency
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.