Author Archives: admin

First Computing, Digital Forensics & Cybersecurity Film Event

IMG_1266.JPGComputing, Digital Forensics & Cybersecurity held our first film screening last Wednesday.  Zero Days was a great way to start, and the film, pizza and drinks were enjoyed by all in attendance.  We have got another event coming up on Wednesday 15th March 2017 starting at 15:00.  Students can vote for what they want the next film to be (see Blackboard!) and current front runners include The Social Network and Citizenfour.  I’m voting for Citizenfour (I’ve seen The Social Network).  I’m hoping no-one (ever!) votes for Skyfall which portrays Q as the worst cybersecurity expert ever when he plugs in a compromised machine to the MI6 network.  Don’t even get me started on how realistic Swordfish is and always remember they only made one Matrix film!

We look forward to seeing our students at the next event!

IoT BLE Security Vulnerability

Results of a study undertaken by an SRA supported by School RKE funds.

“Things” as referred to in The Internet of “Things”, are everyday objects that have been adapted to be hosts for low energy sensors. These sensors provide the data thus enabling  these “Things” (Devices) to communicate with a network of some kind, in order to either share data or be managed, using a range of Bluetooth and Wireless technologies.

Low energy sensors can be embedded into many devices such as light switches, door locks, power sockets and actuators, which in turn are used to control or monitor more complex things such as central heating systems and home security systems.

Continue reading

Happy New Year 2017

The Computing, Digital Forensics and Cybersecurity team would like to wish a Happy New Year to our students and a welcome back to term after a festive season break.

fireworks-3594_960_720.jpg

Whether you are in your first or third year of study, the beginning of a New Year is an excellent opportunity to think about things you would do differently.

Continue reading

Job hunting tips

Once more, another cluster of students will be fleeing into the job market, searching for jobs in the field of Computing and Digital Forensics. Skills they have acquired and knowledge they have gained, will once again, fall under question… here come the interviews. Shivering in their boots, thoughts raised over what questions will be asked, are they worthy enough for such job descriptions and do they know everything and enough to pull through? Continue reading

Training EU law enforcement officers

paul-and-georginaDr Paul Stephens, Director of Computing, Digital Forensics & Cybersecurity and Georgina Humphries, University Instructor in Computing spent last week in Ireland presenting a course with colleagues from University College Dublin and Norwegian Police University College to Law Enforcement Officers from across the European Union.  The course sought to teach investigators how to retrieve digital evidence and gather intelligence using the Python programming language.  Funding for the initiative was received from the European Commission and was held under the auspices of the European Cybercrime Training and Education Group (ECTEG) whose activity is coordinated by Europol.

Predicting the density of dark energy

By Mike Hewitt

Recently the School of Law Criminal Justice and Computing funded me to take part in this year’s International Conference on Particle Physics and Cosmology hosted by the University of Warsaw and to present a paper about predicting the density of dark energy – a mysterious property of space which is making the expansion of the universe accelerate. This was a wonderful opportunity to meet researchers from around the world and hear first-hand about the latest developments in our understanding of the structure and evolution of the universe.

Cosmo 2015, Poland

Delegates at the Cosmo 15 Conference in Poland

Find out more on the Cosmo-15 website.

EKC Computing students visit CCCU

On Wednesday 14th October 2015, students studying on the HNC in Computing & Systems Development programme based at East Kent College Broadstairs enjoyed a day at the CCCU Canterbury Campus at the invitation of the academic Computing team.  The day began with a warm welcome and an introduction to Computing degrees at CCCU by Senior Lecturer, Mr Reza Mousoli, which provided the students with possible progression routes for their continued studies once they had completed their HNC programme.

East Kent College Computing students visit CCCU

East Kent College Computing students visit CCCU

Continue reading

Open Source: just a development tool, or something more?

What is open-source? You may, or may not have heard of it. If you work in IT chances are that you have definitely heard of it. Most people would probably associate the term with software and software development. Going a bit further, some might associate it with certain software projects, such as the Linux[1] kernel[2] [3], the Apache Webserver[4] [5], or web browsers such as Firefox[6] [7] and Chromium[8] [9] (the open-source version of Google’s Chrome browser)[10]. These projects are all considered open-source licensed. Continue reading

Why I’m wishing you ‘All the best’

Director of Computing, Digital Forensics and Cybersecurity Paul Stephens muses on the best way to sign off an email…

I don’t actually sign my emails. Call it laziness or ultra-efficiency but it’s easier and takes fewer keystrokes to automatically sign off.  If I’m forced to, for example, when I create a meeting and my email client doesn’t automatically add a signature I might grudgingly add a ‘P.’.  Instead I have a couple of signatures set up Continue reading

Government to invest £1m to help protect SMEs from cyber attacks

The UK government has unveiled a new £1m scheme to help small and medium-sized enterprises (SMEs) protect themselves from cyber attacks.

The initiative is part of a range of measures designed to increase the resilience of UK businesses to cyber attacks, and will provide SMEs with vouchers up to £5,000 which they can use to access specialist services from the UK cybersecurity industry, and so adopt the government’s Cyber Essentials Scheme. Continue reading