Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"
-
Extending Private Infrastructure with Hybrid Cloud Computing
Sponsored by: Skytap, Inc.The hybrid cloud computing model has particular appeal for businesses interested in moving between public and private cloud freely and securely. Join this informative 45 minute webcast sponsored by Skytap to learn how enterprise IT can quickly gain operational benefits from hybrid cloud computing.
-
Royal Holloway: Information security of the 2016 Philippine automated elections
Sponsored by: TechTarget ComputerWeekly.comWe analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
-
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
Sponsored by: TechTarget ComputerWeekly.comIn this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
Sponsored by: TechTarget ComputerWeekly.comAdvances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
-
Demystifying the myths of public cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.