41 results

Undermining our data: implications for trust in the population census

Presentation / Conference
Killick, L., Duff, A. S., Deakin, M. & Hall, H. (2017, June)
Undermining our data: implications for trust in the population census. Paper presented at Information: interactions and impact (i3), Robert Gordon University, Aberdeen, Scotland, UK
This paper draws on empirical work conducted as part of a multi-method research study funded by the Arts and Humanities Research Council (AHRC). It is concerned with public p...

Secure and Scalable Identity Management for the Aviation Industry

Presentation / Conference
Kintis, P., Kountouras, A., Pitropakis, N., Dagon, D., Antonakakis, M., Markou, C., & Buchner, P. (2017, May)
Secure and Scalable Identity Management for the Aviation Industry
No abstract available.

Introduction to Security Onion

Presentation / Conference
Heenan, R., & Moradpoor, N. (2016, May)
Introduction to Security Onion. Paper presented at Post Graduate Cyber Security (PGCS) symposium, Edinburgh
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many typ...

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

Cyber security challenges for cloud based services.

Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Vulnerability analysis.

Presentation / Conference
Buchanan, W. J. (2015, May)
Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...

Identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J. (2015, April)
Identifying areas of vulnerability. Presented at Scot-secure 2015, Dynamic Earth, Edinburgh
Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.

New forensic investigation and training methods in a virtual environment (cloud) (D-FET project).

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, April)
New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...

It's all hackable.

Presentation / Conference
Buchanan, W. J. (2015, February)
It's all hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn