People often make predictable passwords. They use common methods to create passwords such as common words, substituting characters or using patterns on the keyboard. Blase Ur from the University of Chicago and a team from Carnegie Mellon University developed and evaluated a password security meter that provides a more accurate rating of password strength and …
The IISP (Institute of Information Security Professionals) and our friends the Cyberacademy at Napier College, Edinburgh, Scotland recently (2017/11/23) held an event for those looking to start or continue a career in cybersecurity. The event had a number of great presenters and fortunately for us was streamed to youtube. The full video is over 5 …
Governments around the world are being increasingly trapped between progress to a digital state and the insecurity of cyberspace. Estonia has been a vanguard for development of a digital society in many ways by transitioning many services to digital technologies and also by being subject to assault by cyber weapons. Nick Robinson and Prof Keith …
Nour Dabbour from Carleton University presented a 2 minute rapid-fire of her poster at the SERENE-RISC workshop October, 2017. Rapid fire presentations are limited to 2 minutes and 1 slide. Nour was voted as the winner of the student poster presentations at this event by the SERENE-RISC membership in attendance. Do I know you? …
Criminals documenting themselves doing something illegal seems counterproductive. Creating a video that could prove their guilt seems bizarre. Even though it is illogical, it still happens. Sveinung Sandberg and Thomas Ugelvik looked into this phenomenon. They analyzed 51 Norwegian higher court decisions involving the use of a camera as an integrated part of an offence. …
Presented at the SERENE-RISC Workshop October 2017. Joseph Mudge Co-operators General Insurance Company Collaboration toward a knowledge engineering model for cyber risk assessment Collaboration among cyber risk experts is important for a robust Canadian cybersecurity posture. Although data sharing agreements are an important way that organizations can collaborate toward improving cybersecurity, there are sometimes barriers to …
Presented at the SERENE-RISC Workshop October 2017 Jason Jaskolka Carleton University Many of today’s most critical systems such as those found in the transportation, financial, medical, communications, and national defense domains are becoming more complex and interconnected. Because of this, there is an increasingly critical need for ensuring the security of these systems and the …
Presented at the SERENE-RISC Workshop, October 2017. Scientific Director Benoît Dupont reports on SERENE-RISC activities for the past 4 years of cybersecurity knowledge mobilization in Canada and provides insight on what we have planned for the future. SERENE-RISC has surpassed expectations due to the support of our network members to provide innovative resources and …
Harassment on online social media services or social networking sites is a growing issue and in particular, as there are a large number (1/5th) of Canadian adolescents that suffer victimization it is something that we should be looking at very seriously. Kathleen Van Royen, Karolien Poels and Heidi Vandebosch from Belgium and Philippe Adam from …
Can we do research with data that is leaked or stolen and dumped on the internet? This is an ethical question that is difficult to answer as it quickly gets complicated. Unfortunately, WWJD? is of no help in a lot of situations. Ideas about research ethics developed before the information age can fall short where …