International Crime and Intelligence Analysis Conference
26-27 February 2015, Manchester
Call for abstracts
WHAT WORKS MASTERCLASSES
12 November 2014
16 September 2014
Advanced Hotspot Analysis
Summer 2015 - exact dates TBC
Computer scientists Professor Peter Kirstein and Dr Stephen Hailes (Computer Science) are leading an initiative called SEINIT (Security Expert Initiative). Their work is defining new security models and policies that will work across multiple devices and networks.
Dr Hailes explains: “Users need an adaptable security framework. A corporate audio conference that could be left unencrypted within a trusted office environment would need powerful encryption when extended to an untrusted internet café. SEINIT is developing frameworks to meet the user’s varying needs.”
Filling the security skills gap
UCL’s Department of Computer Science has launched a new MSc and Diploma in Information Security, led by some of the world’s most authoritative figures on the subject. The programme will mainly be based at UCL’s Adastral Park postgraduate campus and will answer a skills shortage in the marketplace for IT professionals trained in security. Course modules include computer security, cryptography, digital intellectual property, network security and people and security.
Professor Ingemar Cox, course director and expert in digital rights management, says: “Information security is a critical problem in the future development of networking, telecommunications and related information technology. For government, information security concerns are at the heart of the NHS IT initiative and the Home Office’s proposal for introducing identity cards. For business, information security is needed for secure financial processing, e-commerce, and, in the form of digital rights management, for the successful distribution of music and video content over the internet and telephone networks. For citizens, it manifests itself in concerns over identity theft and privacy. We need to train IT professionals now to meet the future challenges of information security.”
Page last modified on 17 mar 11 10:46