Buchanan, W. J. (2015, April). Identifying areas of vulnerability. Presented at Scot-secure 2015, Dynamic Earth, Edinburgh
Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh
As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifyin...
Buchanan, W. J., & Smales, A. (2013, January). e-Health in the Cloud. Presented at Future of e-Health, Hollyrood, Edinburgh
This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty ...
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.8 Application Layer Ana...
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.3 Identity 2.0
5.4 SOAP over HTTP
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
van Deursen Hazelhoff Roelfze, N. (2013). HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis)
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...
Arbelet, A. (2013). Garmin satnav forensic methods and artefacts: an exploratory study. (Thesis)
Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users e...
Kwecka, Z. (2011). Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis)
The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public autho...
Buchanan, W. J. (2009). AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...
Buchanan, W. J. (2009). 3DES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sam...
Lo, O. (2009). Framework for network IDS evaluation. (Thesis)
There are a multitude of threats now faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data stealing and denial of service. As a first...
Symon, C. Enhanced event time-lining for digital forensic systems. (Thesis)
In a digital forensics investigation, log files can be used as a form of evidence by reconstructing timelines of the computer system events recorded in log files. Log files ca...
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis)
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...