DSDS 18
Permanent URI for this collection
Browse
Browsing DSDS 18 by Subject "'Computer System Security'"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Open Access Ensuring Cyber-Physical Security in the Digital Built Environment(Cranfield University, 2018-11-15 17:05) Boakes, EmmaPoster presented at the 2018 Defence and Security Doctoral Symposium.Cyberspace and physical space are increasingly enmeshed, and the need to secure the digital-built environment and its assets has given rise to the concept of cyber-physical security. Cyber-physical security concerns vulnerabilities in cyber security that can be exploited to target physical security, and vice versa. For example, insecure transmission of architectural designs can give attackers the ability to understand physical weaknesses in a building, and outsourcing of security and facilities management can provide access to an organisation through building management systems.There is a need for organisations to develop processes that will encompass cyber-physical security, but the frequent disparity between the policies, functions and personnel involved in cyber and physical security makes this problematic.This research will use methods from user-centred design to develop cyber-physical security interventions; example, scenario-driven interventions that could be used as part of regular table-top simulations and red team testing. Extensive engagement with key stakeholders will help to understand the problem space in order to develop interventions that are applicable, valid and usable, as well as providing an opportunity to test their impact. Investigations will adopt a mixed-methods approach (interviews, surveys, and focus groups) to understand how cyber and physical security personnel currently cooperate, including their awareness of the appropriate protective measures required from each other, the gaps between their approaches, and the barriers to collaboration.Item Open Access Informational security: Dis(satisfaction)(Cranfield University, 2018-11-15 17:05) Smy, VictoriaPoster presented at the 2018 Defence and Security Doctoral Symposium.Objectives: The research conducted aims to determine whether there are common themes and trends emerging from perceptions of information security (Infosec) practices amongst professionals working in defence and security organisations.Design: A short data capture initiative was implemented in a classroom environment. The initiative served multiple purposes:1.To act as a taster of qualitative research2.To provide a [sanitised and cleansed] database for future research students to try out some qualitative data analysis.3.As an exploratory exploration of Infosec enablers and barriers with a view to understand whether it should form the basis of a new, longitudinal research programmeMethods: This research was granted ethical approval from "Cranfield University"’s Research Ethics Committee. Initial research was conducted in June 2018. Participants were military and civilian students undertaking a Research Methods module as part of their Cyber Masters Program (CDIA and CyOPs). There were 34 students in attendance. The sample were predominately male (90%) and aged between 29 and 52 (mean 39 years old). Participants were briefed as to the anonymous nature of the data and the intended data uses. All participation was voluntary and informed consent was sought before data collection. Participants were given 20 minutes (2 x 10) to capture their thoughts as aligned to the following questions:What are the sources of SATISFACTION with information security within your professional working environment?What are the sources of DISSATISFACTION with information security within your professional working environment?Results: Overall, marginally more sources of dissatisfaction (n = 73) than satisfaction (n = 69) with Infosec were reported. Interestingly, a small subset of participants alluded to there being more sources of dissatisfaction but, due to the classified nature of their work, they did not feel able to record them.The results will be further analysed for common themes, trends and language using NVivo 12 software.Conclusions: TBC