Royal Holloway, University of London, Information Security Group 2014’s articles discuss topics from a variety of information security disciplines, digital forensics, cloud encryption and internet routing.
Previous years’ articles have focused on topics such as secure contactless payments, the risks of multi-tenancy cloud computing, and cloud security certifications.
TechTarget’s Computer Weekly is pleased to present the following articles from the best and brightest of this year's RHUL master of science graduates.
The future of digital forensics
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. Table of contents • The three avenues of attack • Building an anti-forensic computer system • Defeating forced key disclosure Continue Reading
Detecting the use of TrueCrypt
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. Table of contents • Windows Registry evidence • TrueCrypt boot-loader • TrueCrypt hidden volume Continue Reading
Encryption in the cloud
Secure internet routing
Terrorist use of the internet
Information Security for SMEs
Elliptic curve cryptography in transport ticketing
This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times. Continue Reading
Application data security risks on Android devices
This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk. Continue Reading