2014 Royal Holloway info security thesis series

In this guide find the 2014 thesis submissions from graduates of the master of science course run by the Royal Holloway, University of London, Information Security Group.

Royal Holloway, University of London, Information Security Group 2014’s articles discuss topics from a variety of information security disciplines, digital forensics, cloud encryption and internet routing.

Previous years' articles, including the 2013 and 2012 Royal Holloway Thesis series, have focused on topics such as secure contactless payments, the risks of multi-tenancy cloud computing, and cloud security certifications.

Techtarget’s Computer Weekly is pleased to present the following articles from the best and brightest of this year's RHUL master of science graduates.

Table of contents:

The future of digital forensics

holloway This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.

Table of contents

• The three avenues of attack
• Building an anti-forensic computer system
• Defeating forced key disclosure

Detecting the use of TrueCrypt

holloway This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.

Table of contents

• Windows Registry evidence
• TrueCrypt boot-loader
• TrueCrypt hidden volume

Encryption in the cloud

holloway This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud.

Table of contents

• Cloud formation
• Cloud risk assessment
• Role of cloud encryption

Secure internet routing

holloway This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.

Table of contents

• The challenge of providing secure internet routing
• How does internet routing work?
• How can internet routing be secured?

Terrorist use of the internet

holloway By Matteo Cavallini, MSc (Royal Holloway) and John Austen, ISG, Royal Holloway

The internet is a tool that, after about 30 years, has resulted in a huge change in everyday life, modifying the lifestyle of the public, companies and government.

Information Security for SMEs

holloway By Vadim Gordas, MSc (RHUL) and Geraint Price, ISG, Royal Holloway

A special category of organisation that requires protection of business information is small and medium enterprises (SMEs).

Due to resource restrictions and insufficient maturity of IT knowledge, they face significant difficulties in setting up an effective and efficient information security control environment.

Elliptic curve cryptography in transport ticketing

holloway By Thyla van der Merwe and Keith Mayes

Fast transaction times play a key part in achieving desired levels of throughput in a transport ticketing system, but payment security is always paramount.

The move towards elliptic curve cryptography on payment cards promises to help advanced ticketing systems achieve these aims.