Advanced security and network forensics: web Infrastructures.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.1 Objectives
5.2 Introduction
5.3 Identity 2.0
5.4 SOAP over HTTP
5.5 LDAP
X.500
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
How the love of one teenager brought Tweetdeck to its knees.
Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...
Advanced security and network forensics: obfuscation and data hiding.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR en...
Advanced security and network forensics: network forensics.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.1 Objectives
3.2 Introduction
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.6 ARP
3.7 SYN
3.8 Application Layer Ana...
Advanced security and network forensics: Introduction.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives
1.2 Introduction
1.3 Security Taxonomy
1.4 Threats
Hardware misuse
Environmental risks
External misuse
Pests
Active misuse
Passive misuse
Masquerading...
If two countries waged cyber war on each another, here’s what to expect
Other
Buchanan, B. (2016)
If two countries waged cyber war on each another, here’s what to expect. https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544
Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care ...
Traffic light hacking shows the Internet of Things must come with better security.
Other
Buchanan, W. J. (2014)
Traffic light hacking shows the Internet of Things must come with better security
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercep...
How WannaCry caused global panic but failed to turn much of a profit
Other
Buchanan, B. (2017)
How WannaCry caused global panic but failed to turn much of a profit. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740
The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophis...
In cybersecurity, the weakest link is … you
Other
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...
Bitcoin mining is about to become a lot less profitable
Other
Buchanan, W. J. (2016)
Bitcoin mining is about to become a lot less profitable
Imagine being told that your wage was going to be cut in half. Well, that’s what’s soon going to happen to those who make money from Bitcoin mining, the process of earning the...