UK

IoT-Databox Privacy-by-Design: Building Accountability into the Internet of Things

The Internet of Things (IoT) seeks to embed computation in mundane objects - pill bottles, shelves, weighing scales, etc. - and connect these 'things' to the internet to enable a broad range of new and improved services (e.g. improved healthcare services). The IoT will open up a wealth of personal data - biological data, data about our physical movements around the home, or interaction with objects therein, etc. - distributing it seamlessly across the internet. The seamless distribution of personal data presents real challenges to the adoption of the IoT by users, however.

Practical Data-intensive Secure Computation: a Data Structural Approach

In the past a few year, we have seen a dramatic increase in the scale and financial damage caused by cyber attacks. A survey commissioned by the government's Department for Business, Innovations and Skills (BIS) found that 93% of large businesses and 87% of smaller businesses suffered security breaches during 2013. An estimation from IDC says that companies around the world will spend $364 billion for dealing with data breaches in 2014. Data security is of paramount importance for most organisations.

PACE Privacy-aware Cloud Ecosystems

With increasing take up of externally provisioned and managed services (from government, finance, entertainment), often hosted over Cloud computing infrastructure, there is a realisation that on-line electronic services can involve an interlinked range of providers. Gartner forecasts that cloud computing market will grow at a compound annual growth rate of 32% (2016-2019), with the potential for additional providers to emerge in the market place.

Multi-version Execution Techniques for Increasing the Reliability and Security of Evolving Software

One of the distinguishing characteristics of software systems is that they evolve: new patches are committed to software repositories and new versions are released to users on a continuous basis. Unfortunately, many of these changes bring unexpected failures that break the stability of the system or affect its security, and users face the uncomfortable choice between using an old stable version which misses recent features and bug fixes, and upgrading to a new version which improves the software in certain ways, only to introduce other bugs and security vulnerabilities.

MobSec Malware and Security in the Mobile Age

The goal of MobSec is to improve the security of mobile devices by reducing the risk from installing and using third party applications. 

ICONIC Inference, COmputation and Numerics for Insights into Cities

There are many interesting open questions at the interface between applied mathematics, scientific computing and applied statistics. Mathematics is the language of science, we use it to describe the laws of motion that govern natural and technological systems. We use statistics to make sense of data. We develop and test computer algorithms that make these ideas concrete. By bringing these concepts together in a systematic way we can validate and sharpen our hypothesis about the underlying science, and make predictions about future behaviour.

ACCEPT Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks

The project's overall aim is to develop a framework through which we can analyse the behavioural co-evolution of cybersecurity/cybercrime ecosystems and effectively influence behaviours of a range of actors in the ecosystems in order to reduce human-related risks. To achieve the project’s overall aim, this research will:
 * Be theory-informed: Incorporate theoretical concepts from social, evolutionary and behavioural sciences which provide insights into the co-evolutionary aspect of cybersecurity/cybercrime ecosystems.

OCYSS Online CYber Security decision support System

This interdisciplinary project brings together leading academic experts from the University of Nottingham, UK and Carnegie Mellon University, USA, with a strongly integrated project partner: CESG - the UK's National Technical Authority for Information Assurance.

SEEK Steganalytic vidEo rEsearch frameworK

The Internet of Things (IoT) seeks to embed computation in mundane objects - pill bottles, shelves, weighing scales, etc. - and connect these 'things' to the internet to enable a broad range of new and improved services (e.g. improved healthcare services). The IoT will open up a wealth of personal data - biological data, data about our physical movements around the home, or interaction with objects therein, etc. - distributing it seamlessly across the internet. The seamless distribution of personal data presents real challenges to the adoption of the IoT by users, however.

EMPHASIS

Ransomware is a particular type of malware, and a new crime of extortion committed online. Malicious software gets installed through a phishing email or a drive-by download on a website. When it runs, it performs an action such as the encryption of the user's files, and asks a ransom for this action to be undone. The victim is coerced into paying through psychological manipulations which sometimes masquerade as advice.

Pages

News

SMESEC project Open Call for SMEs and SME associations
SMESEC has released an open call for SMEs and SME associations in order to validate SMESEC framework and at the same time improve their systems’ security.
 
SMESEC is inviting SMEs to participate in the validation of the SMESEC framework. By participating you not only have influence on the evaluation of the SMESEC framework, but also improve your own company security and get up to €20.000 of funds!

Future Events

CYBERUK 2019
24/04/2019 to 25/04/2019
Image:

CYBERUK is the UK government’s flagship cyber security event. Hosted by the National Cyber Security Centre (NCSC), it features world-class speakers, solutions and opportunities for interaction between the public and private sectors. You will be briefed on the evolving cyber threat and how we must respond as individuals and as a community to keep Britain safe in cyberspace.

CYBERUK 2019
24/04/2019 to 25/04/2019
Image:

Where: Scottish Event Campus (SEC), Glasgow
When: 24-25 April 2019
 
CYBERUK is the UK government’s flagship cyber security event. Hosted by the National Cyber Security Centre (NCSC), it features world-class speakers, solutions and opportunities for interaction between the public and private sectors. You will be briefed on the evolving cyber threat and how we must respond as individuals and as a community to keep Britain safe in cyberspace.