Accroître l’efficacité de la prestation des soins
Other
Thuemmler, C. (2017)
Accroître l’efficacité de la prestation des soins
Interview on socio-economic background of digital agenda in health.
http://paperjam.lu/news/accroitre-lefficacite-de-la-prestation-des-soins
How WannaCry caused global panic but failed to turn much of a profit
Other
Buchanan, B. (2017)
How WannaCry caused global panic but failed to turn much of a profit. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740
The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophis...
If two countries waged cyber war on each another, here’s what to expect
Other
Buchanan, B. (2016)
If two countries waged cyber war on each another, here’s what to expect. https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544
Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care ...
Bitcoin mining is about to become a lot less profitable
Other
Buchanan, W. J. (2016)
Bitcoin mining is about to become a lot less profitable
Imagine being told that your wage was going to be cut in half. Well, that’s what’s soon going to happen to those who make money from Bitcoin mining, the process of earning the...
Traffic light hacking shows the Internet of Things must come with better security.
Other
Buchanan, W. J. (2014)
Traffic light hacking shows the Internet of Things must come with better security
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercep...
How the love of one teenager brought Tweetdeck to its knees.
Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...
Shock Index demonstrator
Other
Thuemmler, C. (2014)
Shock Index demonstrator. [https://youtu.be/9C1rJBQyLyg]. https://youtu.be/9C1rJBQyLyg
This is an outcome from the FI-STAR project and a contribution to the FIWARE catalogue.
In cybersecurity, the weakest link is … you
Other
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...
Advanced security and network forensics: obfuscation and data hiding.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR en...
Advanced security and network forensics: web Infrastructures.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.1 Objectives
5.2 Introduction
5.3 Identity 2.0
5.4 SOAP over HTTP
5.5 LDAP
X.500
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...