Dr Paul Stephens, Director of Computing, Digital Forensics & Cybersecurity and Georgina Humphries, University Instructor in Computing spent last week in Ireland presenting a course with colleagues from University College Dublin and Norwegian Police University College to Law Enforcement Officers from across the European Union. The course sought to teach investigators how to retrieve digital evidence and gather intelligence using the Python programming language. Funding for the initiative was received from the European Commission and was held under the auspices of the European Cybercrime Training and Education Group (ECTEG) whose activity is coordinated by Europol.
By Mike Hewitt
Recently the School of Law Criminal Justice and Computing funded me to take part in this year’s International Conference on Particle Physics and Cosmology hosted by the University of Warsaw and to present a paper about predicting the density of dark energy – a mysterious property of space which is making the expansion of the universe accelerate. This was a wonderful opportunity to meet researchers from around the world and hear first-hand about the latest developments in our understanding of the structure and evolution of the universe.
On Wednesday 14th October 2015, students studying on the HNC in Computing & Systems Development programme based at East Kent College Broadstairs enjoyed a day at the CCCU Canterbury Campus at the invitation of the academic Computing team. The day began with a warm welcome and an introduction to Computing degrees at CCCU by Senior Lecturer, Mr Reza Mousoli, which provided the students with possible progression routes for their continued studies once they had completed their HNC programme.
The UK government has unveiled a new £1m scheme to help small and medium-sized enterprises (SMEs) protect themselves from cyber attacks.
The initiative is part of a range of measures designed to increase the resilience of UK businesses to cyber attacks, and will provide SMEs with vouchers up to £5,000 which they can use to access specialist services from the UK cybersecurity industry, and so adopt the government’s Cyber Essentials Scheme. Continue reading
2014 was a landmark of occasions for the Internet; the World Wide Web hit the age of 25 with the Internet itself reaching its 45th birthday. This milestone year also saw Dr Abhaya Induruwa, of Canterbury Christ Church University, inducted into the ‘Internet Hall of Fame’ for his pioneering academic contributions and research into networking, but most of all the deployment of the Internet into Sri Lanka. Dr Induruwa’s contributions and success are renowned in Sri Lanka, so much so he is known as the ‘Father of the Internet in Sri Lanka’. Continue reading
The department recently supported me to give a paper on my work on black holes and quantum information theory at the Planck 2015 conference in Ioannina, Greece. This is an annual, high level meeting of particle physicists and it was exciting to be able to present my work at such a prestigious event, at the invitation of the organisers. Black holes are thought to be the ultimate information storage system, with an incredibly high capacity which is proportional to their surface area. Recent work in quantum information theory indicates that they should be surrounded by a ‘firewall’ of radiation but it is not clear where this would come from. My work suggests that such a hot object could form during gravitational collapse due to an effect from string theory, which would be a dramatic vindication of the ideas used in the development of quantum computers.
About the author:
Mike Hewitt is a lecturer in Computing, Digital Forensics and Cybersecurity at Canterbury Christ Church University.
The programme from the event can be downloaded here.
(Mike’s lecture is listed on page 4).
During the summer of 2014, researchers from the Department of Computing at Canterbury Christ Church University conducted a study into the concept of ‘Bring Your Own Device’ (BYOD) in small and medium enterprises in Kent.
The phenomenon of BYOD is a trend which is believed to heighten productivity of employees and the business itself. This concept is currently one of the up and coming large technological trend for businesses and encompasses the implementation of policies which allow employees to associate and use their own device with the company’s IT infrastructure, giving the employees access to business-specific and/or restricted data and services internally and externally. Mobility demands within enterprises are continuously growing, however questions arise as to whether BYOD can help fulfil such requirements or whether it presents security challenges and risks too significant for implementation. Continue reading
This is the blog for the department of Computing, Digital Forensics and Cybersecurity!