![]() ![]() Ī 1977 NIST publication introduced the CIA triad of confidentiality, integrity, and availability as a clear and simple way to describe key security goals. Ware's work straddled the intersection of material, cultural, political, and social concerns. The April 1967 session organized by Willis Ware at the Spring Joint Computer Conference, and the later publication of the Ware Report, were foundational moments in the history of the field of computer security. After the spread of viruses in the 1990s, the 2000s marked the institutionalization of cyber threats and cybersecurity. In the 1970s and 1980s, computer security was mainly limited to academia until the conception of the Internet, where, with increased connectivity, computer viruses and network intrusions began to take off. Cybersecurity and cyber threats have been consistently present for the last 60 years of technological change. Since the Internet's arrival and with the digital transformation initiated in recent years, the notion of cybersecurity has become a familiar subject in both our professional and personal lives. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, elections, and finance. Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Also, due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi. While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.Ĭomputer security, cyber security, digital security or information technology security ( IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. Security information and event management (SIEM).Host-based intrusion detection system (HIDS).Our members are also affiliated with the UoM Centre for Digital Trust and Society.Protection of computer systems from information disclosure, theft or damage We collaborate with other research groups in the Department of Computer Science, including the Formal Methods (FM), Information Management (IMG), Machine Learning and Robotics (MLR) and Advanced Processor Technologies (APT) groups. We have made significant contributions to software and systems verification and security: theory and implementation techniques. Over the last ten years, these tools have consistently won international competitions in software verification and testing, focusing on security. We have developed award-winning software verification and testing tools, including ESBMC (Efficient SMT-based Bounded Model Checker) and JBMC (Java Bounded Model Checker). Other areas of interest include distributed and cyber-physical systems security. Members of our research group have a world-leading reputation in malware and attack technologies, adversarial behaviour, security operations and incident management, cryptography, software, hardware and network security, privacy-enhancing technologies, software quality assurance, and how these are applied to the governance, risk management and compliance in cyber-security. We have strengths in the automation of reasoning to formally build verifiable, trustworthy software systems. Developing privacy protection mechanisms for secure computation (homomorphic encryption and multiparty computation), anonymisation, differential privacy, obfuscation, anonymous credentials and zero-knowledge proofs.Developing the mathematics of software and system computational behaviour through the study and development of system design, verification and validation methods.Developing security algorithms, methods, protocols, and architecture to protect data and information-based resources to ensure trustworthiness and privacy.The systems and software security members have research interests, which include: Our expertise covers a broad span of topics, including digital trust, security, and privacy. We develop state-of-the-art algorithms, methods and protocols to address security and privacy in networked and distributed system environments, and tools to build verifiable, trustworthy software systems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |