Cyber Security

Computer security, also known as cybersecurity or IT security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.

It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

The field is of growing importance due to the increasing reliance on computer systems and the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi – and the growth of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things.

Cyber Essentials Scheme

We are now into the final week of our Cyber Security series at Company Connecting and next up we have another article by Dr Abiola Abimbola. Dr. Abimbola studied under the author of last week's articles Professor Bill Buchanan and has been in the information security industry for over 15 years....

Something to hide: VPNs and Proxies

This week at Company Connecting we’ve been privileged to published a series of articles by Professor Bill Buchanan on Cyber Security and Cyber Crime. Bill is a Scottish computer scientist who leads the Centre for Distributed Computing and Security at Edinburgh Napier University, as well as The...

Cryptography has a saint and sinner profile just now, with companies like Google pushing forward HTTPs, and governments around the world railing against it. While many countries have been close to forcing companies to add backdoors, few have taken the step of ban its operation. Now, a royal edict from the president of the United Arab Emirates (UAE), His Highness Sheikh Khalifa bin Zayed Al Nahyan (Figure 10), has taken this step the massive step by making it illegal to use a secure tunnel, VPN or secure proxy service. Those who are caught will risk jail and fines between 500,000 and 2,000,000 UAE dirham (US$136,130 and $544,521):

Image of people on an escalator accompanying the cyber security article by Professor William Buchanan of Napier Univristy Something to hide: If you hide, you must be committing a crime

Secure tunnels and VPN connections have had a difficult time recently, as law enforcement has railed against their implement. Also with the increase in data loss, too, typically through an insider or from a remote access trojan (RAT), many companies are looking to ban VPN connections, and also to replace the digital certificate from the remote site with their own certificate (and thus be able to read the contents on a tunnel).

Image accompanying the Cyber Security article Something to hide: VPNs and Proxies by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at Telegram. Today we look at the anonymous browser Tor.

"With the Tor network, the routing is done using computers of volunteers around the world to route the traffic around the Internet, and with every hop the chances to tracing the original source becomes reduced. In fact, it is rather like a pass-the-parcel game"

Image accompanying the article The Three Ts: Remaining Untraceable with Tor by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at tails. Today we look at Telegram the encrypted messaging app with the ability to self destruct chat logs and old messages. Its a cloud based messaging app with a focus on security and speed.

Image accompanying the article The Three Ts: Remaining Untraceable with Telegram by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at vishing. Over the next three days we look at tools utilised by those wishing to remain anonymous i.e. Tails, Telegram and Tor. We start with the operating system ‘Tails’.

Image accompanying the article The Three Ts: Remaining Untraceable with Tails by Professor Bill Buchanan of Napier University

This week we are running a series of articles written by Professor William Buchanan of Napier University. He takes a look at serious crime in the cyber world. This first article introduces 'vishing' the act of using the telephone to scam and cites the case of Glasgow based Feezan Hameed who was recently jailed for 11 years.

Photo of 'burn' phones accompanying the article "Covering Your Tracks – Do you have something to Hide?"

Mitigating the Information Threat

The latest article in Company Connecting’s Cyber Security Month series comes from Dr. Abiola Ambimbola. He studied at Edinburgh Napier University as a student of Professor William Buchanan whose articles "Covering Your Tracks" we featured last week. Dr Ambimbola is Director of Information...

Providing a fixed definition for “information threat” is challenging because there is no acceptable definition. As a result, in this article we focus on the concept of information threat- factors that can negatively affect the confidentially, integrity and availability (CIA) of data and knowledge. In companies, information is transferred between entities, stored internal and externally in the cloud on various platforms, edited constantly and supposedly deleted. 

Picture accompnaying the Cyber Security article by Dr Abiola Abimbola Mitigating Information Threat