Skip to main content

Research Repository

Advanced Search

All Outputs (392)

Ashley Madison breach reveals the rise of the moralist hacker (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Ashley Madison breach reveals the rise of the moralist hacker

There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided for millions of their customer’s details. All sorts of information that isn... Read More about Ashley Madison breach reveals the rise of the moralist hacker.

Cyber security challenges for cloud based services. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh

Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Teaching penetration and malware analysis in a cloud-based environment. (2015)
Presentation / Conference Contribution
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June). Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education

This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network Forensics (BEng (Hons) level and focused on Penetration testing and Malwar... Read More about Teaching penetration and malware analysis in a cloud-based environment..

Apple and Starbucks could have avoided being hacked if they'd taken this simple step (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup systems that could have allowed hackers to break into customers' accounts by rep... Read More about Apple and Starbucks could have avoided being hacked if they'd taken this simple step.

Vulnerability analysis. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection

The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the biggest names to fall victim in the last 12 months. The result is that massive a... Read More about Vulnerability analysis..

Identifying areas of vulnerability. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, April). Identifying areas of vulnerability. Presented at Scot-secure 2015

Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.

Promoting passion in an innovation and enterprise culture. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, April). Promoting passion in an innovation and enterprise culture. Presented at Exploring 21st Century Organisational Culture: inclusivity, agility and innovation

This presentation will show how organisations can encourage a culture of innovation and enterprise, including showcasing examples of good practice and how management styles can be created to encourage innovation. This will include the usage of intern... Read More about Promoting passion in an innovation and enterprise culture..

New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). (2015)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap

DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the development of a virtual (cloud-based) cybercrime training environment to i... Read More about New forensic investigation and training methods in a virtual environment (cloud) (D-FET project)..

Creating efficiency by managing innovation. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, March). Creating efficiency by managing innovation. Paper presented at Efficiency Through Technology: Public Sector 2.0

Creating efficiency by managing innovation • Driving innovation within the public sector • Creating an organisational structure that rewards efficiency • Identify the issues stifling innovation public organisations through audience live voting.

Fast contraband detection in large capacity disk drives (2015)
Presentation / Conference Contribution
Penrose, P., Buchanan, W. J., & Macfarlane, R. (2015, March). Fast contraband detection in large capacity disk drives. Presented at DFRWS 2015 Europe, Dublin, Republic of Ireland

In recent years the capacity of digital storage devices has been increasing at a rate that has left digital forensic services struggling to cope. There is an acknowledgement that current forensic tools have failed to keep up. The workload is such tha... Read More about Fast contraband detection in large capacity disk drives.

Lenovo’s security debacle reveals blurred boundary between adware and malware (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Lenovo’s security debacle reveals blurred boundary between adware and malware

A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced with shrinking margins vendors have treated this as an alternative income str... Read More about Lenovo’s security debacle reveals blurred boundary between adware and malware.

It's all hackable. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, February). It's all hackable. Paper presented at SBRC Insider Threat Conference 2015

Cyber security in practice: identifying areas of vulnerability. (2015)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2015, February). Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015

Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

If Obama is talking about securing the net, it should be on everyone else’s lips too. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If Obama is talking about securing the net, it should be on everyone else’s lips too

We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Barack Obama tackling the issue in his State of the Union address. You may agre... Read More about If Obama is talking about securing the net, it should be on everyone else’s lips too..

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internet

Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This might make a grand statement but it is impossible to implement and extremely... Read More about If you seek to ‘switch off’ encryption, you may as well switch off the whole internet..

Review of e-Frailty evaluation frameworks. (2015)
Presentation / Conference Contribution
Smales, A., Buchanan, W. J., & Thuemmler, C. (2015, January). Review of e-Frailty evaluation frameworks. Paper presented at HIS 2015

This paper outlines some of the key methods used to evaluate frailty and provide important metrics for the implementation of an e-Frailty framework. Frailty is an emergent property of the aging process, as measured using quantification of accumulatio... Read More about Review of e-Frailty evaluation frameworks..

Advanced persistent threat and Insiders. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat

With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the recent Sony hack, Bill explores the pitfalls of their defences and how they... Read More about Advanced persistent threat and Insiders..

An Analysis of N5 and Higher Computing. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). An Analysis of N5 and Higher Computing. Paper presented at Computing at School

This presentation outlined an analysis of N5 and Higher Computing in Scotland.