Tagged / cyber security seminar

Join us for today’s cyber security seminar…

 

‘Pattern- and Security-Requirements-Engineering-based Establishment of Security Standards’

Tuesday, 19th August

Coyne Lecture Theatre, Talbot Campus

4pm -5pm.

Security standards such as Common Criteria or ISO 27001 are ambiguous on purpose, because these standards shall be usable for a large set of different scenarios. The establishment of a security standard requires removing all ambiguities, eliciting concrete security requirements and selecting appropriate security measures.

Dr Kristian Beckers is a security requirements engineering researcher at the University of Duisburg-Essen. He investigates how security requirements engineering methods can be used to support the development and documentation of security standards. In this seminar Dr Beckers will introduce you to the methods and systems which have been created to fit a specific security scenario. In particular, you will find out about the Information Security Management System (ISMS) which was built in compliance with the ISO 27001 standard.

If you would like to join us for this seminar, please book your place via EventBrite.

We will look forward to seeing you!

How security requirements engineering methods can be used to support the development and documentation of security standards…

 

You are invited to join us for the next Cyber Security seminar:

‘Pattern- and Security-Requirements-Engineering-based Establishment of Security Standards’

Tuesday, 19th August

Coyne Lecture Theatre, Talbot Campus

4pm -5pm.


Security standards such as Common Criteria or ISO 27001 are ambiguous on purpose, because these standards shall be usable for a large set of different scenarios. The establishment of a security standard requires removing all ambiguities, eliciting concrete security requirements and selecting appropriate security measures.

Dr Kristian Beckers is a security requirements engineering researcher at the University of Duisburg-Essen. He investigates how security requirements engineering methods can be used to support the development and documentation of security standards. In this seminar, Dr Beckers will introduce you to the methods and systems which have been created to fit a specific security scenario. In particular, you will find out about the Information Security Management System (ISMS) which was built in compliance with the ISO 27001 standard.

If you would like to join us for this seminar, please book your place via EventBrite.

We will look forward to seeing you!

 

Understanding Crowdsourcing and CCTV surveillance

 

Staff, students and members of the public are invited to join us for the next Cyber Security Seminar…

‘Understanding Crowdsourcing and CCTV surveillance’

Tuesday, 27th May

Coyne Lecture Theatre 

4pm – 5pm

 

Closed Circuit Television (CCTV) has many different uses but is often considered an archetypal surveillance technology. These infrastructures generate large amounts of data; so much so that the technique of crowdsourcing has recently been applied to the problem of searching for abnormalities in live surveillance video; the premise being that many inexpert watchers are cheaper but as efficient as a small number of experienced security experts. However, the merits of crowdsourcing watchers of surveillance video are largely unknown.

In this talk Dr. Paul Dunphy will describe exemplar infrastructures of this type, and two user studies that assess the performance of the watchers of CCTV video online. The results prompt a discussion regarding the effectiveness of using crowdsourcing in such contexts, and the role such infrastructures can play in society.

Speaker Bio: Paul is a postdoctoral researcher in the Culture Lab at Newcastle University. He is interested in multi-disciplinary approaches to understand and design security and privacy technologies.

 If you would like to join us for this presentation, please book your place via Eventbrite.