Skip to main content

Research Repository

Advanced Search

All Outputs (27)

Cyber security in practice: identifying areas of vulnerability. (2015)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2015, February). Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015

Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

If Obama is talking about securing the net, it should be on everyone else’s lips too. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If Obama is talking about securing the net, it should be on everyone else’s lips too

We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Barack Obama tackling the issue in his State of the Union address. You may agre... Read More about If Obama is talking about securing the net, it should be on everyone else’s lips too..

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internet

Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This might make a grand statement but it is impossible to implement and extremely... Read More about If you seek to ‘switch off’ encryption, you may as well switch off the whole internet..

Advanced persistent threat and Insiders. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat

With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the recent Sony hack, Bill explores the pitfalls of their defences and how they... Read More about Advanced persistent threat and Insiders..

An Analysis of N5 and Higher Computing. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). An Analysis of N5 and Higher Computing. Paper presented at Computing at School

This presentation outlined an analysis of N5 and Higher Computing in Scotland.

Review of e-Frailty evaluation frameworks. (2015)
Presentation / Conference Contribution
Smales, A., Buchanan, W. J., & Thuemmler, C. (2015, January). Review of e-Frailty evaluation frameworks. Paper presented at HIS 2015

This paper outlines some of the key methods used to evaluate frailty and provide important metrics for the implementation of an e-Frailty framework. Frailty is an emergent property of the aging process, as measured using quantification of accumulatio... Read More about Review of e-Frailty evaluation frameworks..