How WannaCry caused global panic but failed to turn much of a profit
Other
Buchanan, B. (2017)
How WannaCry caused global panic but failed to turn much of a profit. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740
The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophis...
If two countries waged cyber war on each another, here’s what to expect
Other
Buchanan, B. (2016)
If two countries waged cyber war on each another, here’s what to expect. https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544
Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care ...
How the love of one teenager brought Tweetdeck to its knees.
Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...
Traffic light hacking shows the Internet of Things must come with better security.
Other
Buchanan, W. J. (2014)
Traffic light hacking shows the Internet of Things must come with better security
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercep...
In cybersecurity, the weakest link is … you
Other
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...
Advanced security and network forensics: obfuscation and data hiding.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR en...
Advanced security and network forensics: web Infrastructures.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.1 Objectives
5.2 Introduction
5.3 Identity 2.0
5.4 SOAP over HTTP
5.5 LDAP
X.500
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
Advanced security and network forensics: network forensics.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.1 Objectives
3.2 Introduction
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.6 ARP
3.7 SYN
3.8 Application Layer Ana...
Advanced security and network forensics: Introduction.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives
1.2 Introduction
1.3 Security Taxonomy
1.4 Threats
Hardware misuse
Environmental risks
External misuse
Pests
Active misuse
Passive misuse
Masquerading...