Global Information Lookup Global Information

Information Security Group information


Founded in 1990, the Information Security Group (ISG) is an academic department focusing on Information and Cyber Security within the Engineering, Physical Sciences and Mathematics School (EPMS) at Royal Holloway, University of London. It has around 25 established academic posts, 7 visiting Professors or Fellows and over 90 research students.[1] The Founder Director of the ISG was the late Professor Fred Piper, and the current director is Professor Lizzie Coles-Kemp. Previous directors include Professors Peter Komisarczuk, Keith Martin, Keith Mayes, Chris Mitchell and Peter Wild.

Royal Holloway's Founder's Building, where the ISG Smart Card and IoT Security Centre (SCC) was located.

In 1998 the ISG was awarded a Queen's Anniversary Prize in recognition of its work in the field of information security.[2] It has also been awarded the status of Academic Centre of Excellence in Cyber Security Research (ACE-CSR)[3] and hosts a Centre for Doctoral Training in cyber security.[4][5]

In 1992, the ISG introduced an MSc in information security, being the first university in the world to offer a postgraduate course in the subject.[6][7] In 2014 this course received full certification from GCHQ.[8] In 2017 it won the award for the Best Cyber Security Education Programme at SC Awards Europe 2017 [9] and in 2021 it was awarded gold status by the National Cyber Security Centre (NCSC).[10]

Research topics addressed by the ISG include: the design and evaluation of cryptographic algorithms, protocols and key management; provable security; smart cards; RFID; electronic commerce; security management; mobile telecommunications security; authentication and identity management; cyber-physical systems; embedded security; Internet of Things (IoT); and human related aspects of cyber security. The current director of Research is Professor Stephen Wolthusen.

The ISG includes the Smart Card and IoT Security Centre (previously named Smart Card Centre, SCC) that was founded in October 2002 by Royal Holloway, Vodafone and Giesecke & Devrient, for training and research in the field of Smart cards, applications and related technologies: its research topics include RFID, Near Field Communication (NFC), mobile devices, IoT, and general embedded/implementation system security. In 2008, the SCC was commissioned to perform a counter expertise review of the OV-chipkaart by the Dutch Ministry of Transport, Public Works and Water Management.[11] The SCC has received support from a number of industrial partners, such as Orange Labs (UK), the UK Cards Association, Transport for London and ITSO. The current director of the Smart Card and IoT Security Centre is Dr. Konstantinos Markantonakis.

The ISG also includes a Systems Security Research Lab (S2Lab), which was created in 2014, to investigate how to protect systems from software related threats, such as malware[12] and botnets. The research in the lab covers many different Computer Science-related topics, such as operating systems, computer architecture, program analysis, and machine learning.

Current and former associated academics include Whitfield Diffie, Kenny Paterson, David Naccache, Matt Robshaw, Michael Walker, Sean Murphy and Igor Muttik.[13]

Royal Holloway's Information Security Group has been mentioned in popular media, most notably in the New York Times bestseller The Da Vinci Code by Dan Brown.[14]

  1. ^ "Royal Holloway | Staff Directory | Information Security home". royalholloway.ac.uk. Retrieved 7 March 2016.
  2. ^ "Previous Prize-winners". royalanniversarytrust.org.uk. Retrieved 11 March 2016.
  3. ^ "Academic Centres of Excellence in Cyber Security Research". epsrc.ac.uk. Retrieved 11 March 2016.
  4. ^ "CDT in Cyber Security at Royal Holloway". epsrc.ac.uk. Retrieved 11 March 2016.
  5. ^ correspondent, Sean Coughlan BBC News education (9 May 2013). "£7.5m university fund to train cybersecurity experts". BBC News. Retrieved 11 March 2016.
  6. ^ Davidson, Max (23 March 2012). "Information security: students aim to peer into the mind of the cyber thief". Telegraph.co.uk. Retrieved 11 March 2016.
  7. ^ Ciechanowicz, Chez; Martin, Keith M.; Piper, Fred C.; Robshaw, Matthew J. B. (1 January 2003). Irvine, Cynthia; Armstrong, Helen (eds.). Ten Years of Information Security Masters Programmes. IFIP — The International Federation for Information Processing. Springer US. pp. 215–230. doi:10.1007/978-0-387-35694-5_21. ISBN 9781475764918.
  8. ^ "Developing the Cyber Experts of the future - GCHQ certifies Master's Degrees in Cyber Security". gchq.gov.uk (Press release). Retrieved 11 March 2016.
  9. ^ "Royal Holloway wins Best Cyber Security Education Award". royalholloway.ac.uk. 7 June 2017. Retrieved 28 July 2019.
  10. ^ "Three universities gain recognition for their top cyber security education".
  11. ^ Waterstaat, Ministerie van Verkeer en. "20083843 Bijlage 1 OV Chipkaart 'Counter Expertise' Review of the TNO security analysis of the Dutch OV-Chipkaart". rijksoverheid.nl (in Dutch). Retrieved 11 March 2016.
  12. ^ Campbell, MacGregor. "Phone invaders: The rise of mobile malware". New Scientist. Retrieved 11 March 2016.
  13. ^ "Honorary and visiting staff". Information Security Group. Retrieved 20 May 2019.
  14. ^ Macleod, Donald. "Write-up boost for Royal Holloway". The Guardian. Retrieved 9 May 2019.

and 30 Related for: Information Security Group information

Request time (Page generated in 0.8922 seconds.)

Information security

Last Update:

Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information...

Word Count : 22104

Information Security Group

Last Update:

Founded in 1990, the Information Security Group (ISG) is an academic department focusing on Information and Cyber Security within the Engineering, Physical...

Word Count : 781

Information security management

Last Update:

Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the...

Word Count : 1353

Certified information systems security professional

Last Update:

(Certified Information Systems Security Professional) is an independent information security certification granted by the International Information System...

Word Count : 1999

Information security standards

Last Update:

Information security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment...

Word Count : 2592

Computer security

Last Update:

Computer security, cybersecurity, digital security or information technology security (IT security) is the protection of computer systems and networks...

Word Count : 22140

Security Information Service

Last Update:

The Security Information Service (BIS, Czech: Bezpečnostní informační služba) is the primary domestic national intelligence agency of the Czech Republic...

Word Count : 475

Chief information security officer

Last Update:

A chief information security officer (CISO) is a senior-level executive within an organization responsible for establishing and maintaining the enterprise...

Word Count : 1157

Information security awareness

Last Update:

Information security awareness is an evolving part of information security that focuses on raising consciousness regarding potential risks of the rapidly...

Word Count : 1566

Security information and event management

Last Update:

Security information and event management (SIEM) is a field within the field of computer security, where software products and services combine security...

Word Count : 4095

Presidential Security Group

Last Update:

Presidential Security Group, shortened as PSG, is a Philippine close protection agency. It is the primary agency concerned with providing close-in security and...

Word Count : 1116

Classified information

Last Update:

groups of people with the necessary security clearance and need to know. Mishandling of the material can incur criminal penalties. A formal security clearance...

Word Count : 5969

Security

Last Update:

provide security (security company, security police, security forces, security service, security agency, security guard, cyber security systems, security cameras...

Word Count : 1972

Gay Nigger Association of America

Last Update:

the GNAA also founded Goatse Security, a grey hat information security group. Members of Goatse Security released information in June 2010 about email addresses...

Word Count : 2446

Information Systems Security Association

Last Update:

Information Systems Security Association (ISSA) is a not-for-profit, international professional organization of information security professionals and...

Word Count : 623

Security clearance

Last Update:

A security clearance is a status granted to individuals allowing them access to classified information (state or organizational secrets) or to restricted...

Word Count : 5570

Naval Security Group

Last Update:

integrated all of its Information Operations (IO) capabilities under one authority by formally disestablishing Naval Security Group Command (NAVSECGRU)...

Word Count : 257

Information sensitivity

Last Update:

Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed...

Word Count : 2446

Information Security Forum

Last Update:

The Information Security Forum (ISF) is an independent information security body. The ISF delivers a range of content, activities, and tools. The ISF...

Word Count : 802

Security of Information Act

Last Update:

The Security of Information Act (French: Loi sur la protection de l’information, R.S.C. 1985, c. O-5), formerly known as the Official Secrets Act, is...

Word Count : 638

ISC2

Last Update:

Association Special Interest Group for Computer Security (DPMA SIG-CS) Idaho State University (ISU) Information Systems Security Association (ISSA) International...

Word Count : 890

Enterprise information security architecture

Last Update:

Enterprise information security architecture is the practice of designing, constructing and maintaining information security strategies and policies in...

Word Count : 425

Open Information Security Management Maturity Model

Last Update:

Group Information Security Management Maturity Model (O-ISM3) is a maturity model for managing information security. It aims to ensure that security processes...

Word Count : 247

Information security indicators

Last Update:

accepted and comprehensive. Information security indicators have been standardized by the ETSI Industrial Specification Group (ISG) ISI. These indicators...

Word Count : 638

Lucky Thirteen attack

Last Update:

by its developers Nadhem J. AlFardan and Kenny Paterson of the Information Security Group at Royal Holloway, University of London. It is a new variant of...

Word Count : 362

UK cyber security community

Last Update:

still include information-related concerns, with previous predominant terminology including: Automated Data Processing Security or ADP Security (1980s) Computer...

Word Count : 2892

United States Department of Homeland Security

Last Update:

States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior...

Word Count : 7186

Milw0rm

Last Update:

shut down while its security was upgraded. BARC officials said that none of the emails contained confidential information, the group did not destroy data...

Word Count : 1490

OTC Markets Group

Last Update:

almost 12,400 over-the-counter (OTC) securities. The group has its headquarters in New York City. OTC-traded securities are organized into three markets to...

Word Count : 2677

Temporal Key Integrity Protocol

Last Update:

/tiːˈkɪp/) is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance...

Word Count : 1588

PDF Search Engine © AllGlobal.net