... Would the use of the concepts of complex socio technical systems and self-organisation aid in... more ... Would the use of the concepts of complex socio technical systems and self-organisation aid in this ... applied to co-ordinate those roles, such as via the delegation of responsibilities and control ... is recognised, and thus can be applied, internationally and in its modelling views that ...
2010 Eighth International Conference on Privacy, Security and Trust, 2010
ABSTRACT Recent years have seen substantial development in computer and network security design. ... more ABSTRACT Recent years have seen substantial development in computer and network security design. This has been manifested as an every increasing range of new protocols, new encryption algorithms, new methods of authentication, smarter firewalls and intrusion detection techniques, new anti-malware products and many more. During the same period of time increasing demands for more trustworthy network infrastructure have seen the development of sophisticated analysis tools necessary to meet the operational requirements of law enforcement agencies. These include tools for e-discovery, commercial intelligence and national security. Thus the industry has seen equally significant developments in computer forensic tools where methods of searching for and detection of, malicious activity for presentation as evidence and provision of trust have become ever more sophisticated. To a considerable degree the science of security and forensics have seen both rapid but separate developments. This paper proposes that there are areas in common between these two important fields of endeavour and sets out techniques and ideas which demonstrate how they can overlap and work together in order to provide improved security and trustworthiness in critical infrastructures. In particular this paper addresses computer security and forensic analysis from a real-time perspective such that security events can be monitored in a live network while sound forensic data collection, storage and processing can be carried out in a manner which supports real-time security and at the same time still meeting the requirements of sound evidence.
2011 17th IEEE International Conference on Networks, 2011
Taxonomies have been widely documented in the literature and a number of classical approaches exi... more Taxonomies have been widely documented in the literature and a number of classical approaches exist. The main problem is that many of these approaches are very general and, for example, apply to all networks and computer systems. The intention of this paper is not to invent a new taxonomy architecture but to create a model which is adaptable to new types of networks and new attack vectors and which can then be applied and be of use in specific situations. When the “classical” taxonomies were developed systems such as cloud computing, 3G malware, VoIP and social engineering vulnerabilities were unheard of. This paper therefore proposes a model which can be readily adapted to be of value in attack classification and vulnerability detection for specific cases such as those illustrated above. Thus the model can be adapted to new types of networks, devices and systems as they evolve as well as being able to incorporate new attack categories and techniques and adapt to new types of protection mechanisms.
ABSTRACT My research passion is the issue of culture. Although the impact of culture on students’... more ABSTRACT My research passion is the issue of culture. Although the impact of culture on students’ learning of science has become increasingly important to science teachers over the past few years, this area was only just beginning to raise widespread interest when I commenced my research in 1995.
... Would the use of the concepts of complex socio technical systems and self-organisation aid in... more ... Would the use of the concepts of complex socio technical systems and self-organisation aid in this ... applied to co-ordinate those roles, such as via the delegation of responsibilities and control ... is recognised, and thus can be applied, internationally and in its modelling views that ...
2010 Eighth International Conference on Privacy, Security and Trust, 2010
ABSTRACT Recent years have seen substantial development in computer and network security design. ... more ABSTRACT Recent years have seen substantial development in computer and network security design. This has been manifested as an every increasing range of new protocols, new encryption algorithms, new methods of authentication, smarter firewalls and intrusion detection techniques, new anti-malware products and many more. During the same period of time increasing demands for more trustworthy network infrastructure have seen the development of sophisticated analysis tools necessary to meet the operational requirements of law enforcement agencies. These include tools for e-discovery, commercial intelligence and national security. Thus the industry has seen equally significant developments in computer forensic tools where methods of searching for and detection of, malicious activity for presentation as evidence and provision of trust have become ever more sophisticated. To a considerable degree the science of security and forensics have seen both rapid but separate developments. This paper proposes that there are areas in common between these two important fields of endeavour and sets out techniques and ideas which demonstrate how they can overlap and work together in order to provide improved security and trustworthiness in critical infrastructures. In particular this paper addresses computer security and forensic analysis from a real-time perspective such that security events can be monitored in a live network while sound forensic data collection, storage and processing can be carried out in a manner which supports real-time security and at the same time still meeting the requirements of sound evidence.
2011 17th IEEE International Conference on Networks, 2011
Taxonomies have been widely documented in the literature and a number of classical approaches exi... more Taxonomies have been widely documented in the literature and a number of classical approaches exist. The main problem is that many of these approaches are very general and, for example, apply to all networks and computer systems. The intention of this paper is not to invent a new taxonomy architecture but to create a model which is adaptable to new types of networks and new attack vectors and which can then be applied and be of use in specific situations. When the “classical” taxonomies were developed systems such as cloud computing, 3G malware, VoIP and social engineering vulnerabilities were unheard of. This paper therefore proposes a model which can be readily adapted to be of value in attack classification and vulnerability detection for specific cases such as those illustrated above. Thus the model can be adapted to new types of networks, devices and systems as they evolve as well as being able to incorporate new attack categories and techniques and adapt to new types of protection mechanisms.
ABSTRACT My research passion is the issue of culture. Although the impact of culture on students’... more ABSTRACT My research passion is the issue of culture. Although the impact of culture on students’ learning of science has become increasingly important to science teachers over the past few years, this area was only just beginning to raise widespread interest when I commenced my research in 1995.
Uploads
Papers by Jill Slay