Now showing items 1-10 of 75
Data confidentiality in mobile ad hoc networks.
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes ...
Critical Theory as an Approach to the Ethics of Information Security
Improved Security Performance for VANET Simulations
(4th IFAC Symposium on Telematics Applications, 2016-12-06)
Upcoming deployments of Vehicular Ad Hoc Networks (VANETs) in Europe are expected to sign and verify packets secured by cryptographic signatures by default. Thus, when VANET simulations are used for development and test ...
A Security Architectural Pattern for Risk Management of Industry Control Systems within Critical National Infrastructure
SCADA and ICS security have been focusing on addressing issues such as vulnerability discovery and intrusion detection within critical national infrastructure. Less attention has been paid to architectural solutions to the ...
Exploiting SCADA vulnerabilities using a Human Interface Device
(The Science and InformationOrganization, 2015)
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic ...
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
Analysis of published public sector information security incidents and breaches to establish the proportions of human error
The information security field experiences a continuous stream of information security incidents and breaches, which are publicised by the media, public bodies and regulators. Despite the need for information security ...