The current status of post-quantum cryptography

Presented by Douglas Stebila as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation In this talk, I’ll give an update on the standardization and migration of cryptographic systems to quantum-resistant algorithms.  I’ll talk about the current status of the NIST Post-Quantum Cryptography standardization project, …

How the Sûreté du Québec investigates cybercrime in 2020

Presented by Marc-André Piché as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation The proliferation of Cybecrime in recent years as driven the Sûreté du Québec to rething how it investigates cybercrime related events. In 2017, a dedicated cybercrime team was created to offer …

Motifs et déterminants du signalement de la fraude en Catalogne

La fraude est un crime extrêmement répandu depuis l’évolution de l’Internet. Les modalités dans lesquels elle prend forme, principalement sous le Web rends sa prévention et sa rétribution extrêmement complexe pour les agences policières. Ces agences d’application de la loi ne semblent pas adaptées et les méthodes traditionnelles mises en place semblent porter plusieurs préjudices …

Electronic surveillance in the couple: The role of self-efficacy and commitment

Unsurprisingly, social networks have dramatically increased in popularity in recent years. The use of sites serving as social network sites (SNS) continues to increase, and most humans would not be able to live without them. For example, the most popular SNS, Facebook, had 69 million active users in 2008. As of 2018, it had 2,600 …

Surveillance électronique dans le couple : le rôle de l’auto-efficacité et de l’engagement

Sans surprise, les réseaux sociaux ont drastiquement grimpés en popularité depuis les dernières années. L’utilisation des plateformes de réseaux d’interaction sociale ne cesse d’augmenter et la majorité des humains ne se verrait pas vivre sans eux. À titre d’exemple, le plus populaire, Facebook, était composé de 69 millions d’utilisateurs actifs en 2008. En date de …

Understanding the approach of Canada towards online disinformation: confronting, blocking, naturalising or ignoring?

Presented by Sofia Geraldes as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Traditional conceptualisations of cyberspace include the physical, the logical and the social layer. Hence, cybersecurity means that the security of the systems and the networks depend on the security of these …

Impact of contextual and personal determinants on online social conformity

Social conformity is a well-studied phenomenon in psychology, especially in sociopsychology, mainly due to its influence on human behaviour. Indeed, conformity is a social phenomenon that causes individuals to change their behaviours, vision, or opinions to agree with the majority (Asch, 1951). These behaviours are mainly explained by the human tendency to be appreciated by …

Impact des déterminants contextuels et personnels sur la conformité sociale en ligne

La conformité sociale est un phénomène bien étudié en psychologie, et surtout en sociopsychologie, principalement  en raison de son effet d’influence sur les comportements humains. En effet, la conformité est un fait social qui amène les individus à changer leurs propres comportements, idéaux ou opinions afin de concorder avec la majorité (Asch, 1951). Ces comportements …

Analyzing Encrypted Traffic – security and privacy issues in Remote Desktop Protocol

Presented by Lucas Lapczyck as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Network traffic encryption is a widely adopted mechanism to prevent eavesdropping on network communications. Since traditional network monitoring approaches such as Deep Packet Inspection cannot be applied on encrypted traffic, there …