Essential Guide

2014 Royal Holloway infosecurity thesis series

In this guide, find all the 2014 thesis submissions from graduates of the master of science course run by the Royal Holloway, University of London, Information Security Group

Introduction

Royal Holloway, University of London, Information Security Group 2014’s articles discuss topics from a variety of information security disciplines, digital forensics, cloud encryption and internet routing.

Previous years’ articles have focused on topics such as secure contactless payments, the risks of multi-tenancy cloud computing, and cloud security certifications.

TechTarget’s Computer Weekly is pleased to present the following articles from the best and brightest of this year's RHUL master of science graduates.

 

1Challenges-

The future of digital forensics

E-Handbook

The future of digital forensics

This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. Table of contents • The three avenues of attack • Building an anti-forensic computer system • Defeating forced key disclosure Continue Reading

2Detection-

Detecting the use of TrueCrypt

E-Handbook

Detecting the use of TrueCrypt

This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. Table of contents • Windows Registry evidence • TrueCrypt boot-loader • TrueCrypt hidden volume Continue Reading

3Cloud-

Encryption in the cloud

E-Handbook

Encryption in the cloud

This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud Table of contents • Cloud formation • Cloud risk assessment • Role of cloud encryption Continue Reading

4Internet Routing-

Secure internet routing

E-Handbook

Secure internet routing

This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security Continue Reading

5Study-

Terrorist use of the internet

6SMEs-

Information Security for SMEs

E-Handbook

Information Security for SMEs

A special category of organisation that requires protection of business information is small and medium enterprises (SMEs) Continue Reading

7Ticketing Systems-

Elliptic curve cryptography in transport ticketing

E-Handbook

Elliptic curve cryptography in transport ticketing

This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times. Continue Reading

8Smartphone security-

Application data security risks on Android devices

E-Handbook

Application data security risks on Android devices

This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk. Continue Reading

9Security risks-

Security issues in Vanets

E-Handbook

Security issues in Vanets

This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems. Continue Reading

10Need for diversity-

Memory corruption attacks

E-Handbook

Memory corruption attacks

Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures. Continue Reading

11Online fraud-

Sharing knowledge to tackle online banking fraud

E-Handbook

Sharing knowledge to tackle online banking fraud

This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud. Continue Reading

12Insider threat-

Tactics to combat insider threat

E-Handbook

Tactics to combat insider threat

This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach. Continue Reading

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close