students aim to peer into the mind of the cyber thief
Last Updated : GMT 06:49:16
Arab Today, arab today
Arab Today, arab today
Last Updated : GMT 06:49:16
Arab Today, arab today

Students aim to peer into the mind of the cyber thief

Arab Today, arab today

Arab Today, arab today Students aim to peer into the mind of the cyber thief

London - Arabstoday

For such a specialised area of knowledge, one with which only a handful of people within an organisation are likely to be familiar, information security or, as it increasingly known, cyber security, has huge importance. Nobody spares the subject a second thought – until something goes embarrassingly wrong. In 2011, Sony share prices fell by 4 per cent after the company admitted that the personal details, including credit card information, of more than 25 million PlayStation users might have been stolen by cyber-hackers. Similar scandals have befallen many other organisations, with red faces in boardrooms and, often, a hefty bill to pay cleaning up the mess. There has never been a better time to add a masters degree in information security to your CV and, at Royal Holloway College, part of London University, demand for such courses, once seen as very esoteric, has never been higher. The reputational damage suffered by companies perceived as lax in their approach to data protection has led to a re-assessment in priorities. In 1992, when London launched its MSc in Information Security, it was the first university in the world to offer a postgraduate course in the subject. In the 20 years since, others have followed its lead, but London remains a world-respected centre of excellence, its qualifications highly sought. Some students study on campus, but an increasing number are distance-learners, doing a full-time job, anywhere from Melbourne to Toronto, while enrolling for the masters course through London University’s international programmes. There are nearly 50 doing the £12,250 course at any one time, taking between two and four years to complete studies. Some of the overseas students come to London to attend a summer school, but the course does not otherwise involve face-to-face teaching. Instead students are inducted into the university’s virtual learning environment, taking part in tutor-supported online seminars and discussions. There is a lot of offline reading and course work to plough through – the course is modular and students take it at their own pace – but if it is long lonely slog at times, students are not working entirely in the dark. A “virtual student cafe” enables them to interact and network with other students, share insights and support each other during the distance-learning process. “I wouldn’t like to generalise about a typical student on the masters course,” says Prof Keith Martin, who heads the Information Security Group at Royal Holloway. “Mainly they are in their thirties or forties, with some hands-on work experience behind them, but they come from every continent and work in sectors ranging from finance and telecommunications to the public sector. Some are high-fliers, targeting board level positions and wanting to buttress their CVs with a new qualification. Others are IT specialists, looking to work as consultants.” What they share is an appreciation that, in the high-risk and increasingly complex world of information security, where small slip-ups can have large consequences, there is a premium on fully qualified professionals who have mastered their brief. “Information security threats tend to fall into two distinct categories,” Prof Martin says. “There is the threat from cyber-hackers deliberately attacking an organisation from outside. Organised crime is becoming increasingly sophisticated in its methods. And, just as importantly, there is the threat from within, failure to keep vital information secure, often through carelessness rather than deliberate malpractice.” Government departments are often the worst offenders in this respect. There have been a string of high-profile information security lapses in Whitehall, including the loss of a database containing the details of 25 million child benefit claimants and the loss of an unencrypted Ministry of Defence laptop, containing 620,000 personal records, including bank accounts. “It has become increasingly common for staff to take vital information out of the office, perhaps on a memory-stick, a laptop or their mobile phone,” Prof Martin says. “The challenge for organisations is how to control their own assets and set in place systems that reduce the risk of leaks.” At the heart of information security controls is cryptography, a subject on which Prof Martin, author of Everyday Cryptography, is an acknowledged expert. “It is a highly specialised field in some respects, but at the end of the day, machines are operated by human beings. Whatever widgets are used, all organisations need to have properly qualified employees who know how to turn security protection systems on and off.” Cryptographic mechanisms, and how they are used in the protection of computers and their networks, play an integral part in the masters course, which is geared to be commercially relevant. The programme ranges over the entire breadth of the subject, from the day-to-day management of security to the particular threat posed by computer crime. There are modules covering network security, database security, secure electronic commerce, the use and misuse of smart cards, and digital forensics – the collection and storing of the evidence needed to take cyber-hackers to court. Students are not just learning more about computer systems: they are trying to think their way into the minds of people trying to penetrate and subvert those systems. A dry-seeming subject also encompasses some of the elements of a fast-moving thriller, a game of cat-and-mouse between holders of confidential information and criminals desperate to get hold of it. The breadth of the course is underscored by the range of topics that students choose for their dissertation, a compulsory element in the programme. Recent topics include security awareness and behaviour, “fuzzy logic”, deep network security such as BGP-4, the motivation and behaviour of attackers, security architectures, and poor coding and vulnerabilities. The course would not appeal to all students: many will continue to prefer the greater breadth of a traditional MBA. But if it is a niche academic field, its relevance to the working world cannot be disputed. “If you were creating an ideal board from scratch, you would certainly have a chief information security officer on it,” Prof Martin says. “The importance of information security has not always been appreciated in the past but, in a fast-changing world, more and more organisations are getting wise to it.”

arabstoday
arabstoday

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

students aim to peer into the mind of the cyber thief students aim to peer into the mind of the cyber thief

 



Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

students aim to peer into the mind of the cyber thief students aim to peer into the mind of the cyber thief

 



GMT 23:45 2017 Tuesday ,17 October

Kerry calls for Syrian, Arab ground troops against IS

GMT 03:38 2017 Wednesday ,22 March

Somalia's new president names 26-minister cabinet

GMT 19:39 2017 Wednesday ,18 October

Gatland eyes New Zealand rugby jobs after Wales

GMT 12:08 2017 Saturday ,16 September

Dutch 360-degree beachfront painting gets public facelift

GMT 05:16 2016 Wednesday ,15 June

Scientists use underwater robots

GMT 02:41 2017 Sunday ,16 April

Pentagon confirms DPRK missile launch fails

GMT 18:00 2011 Thursday ,12 May

Attack on Celtic manager sparks inquiry

GMT 10:40 2017 Saturday ,30 September

Trump says to decide Fed chair in 2, 3 weeks

GMT 01:10 2017 Monday ,10 July

Islamic social media to be launched by year end

GMT 13:17 2016 Monday ,08 February

Russia shuts down 2 more banks

GMT 07:19 2017 Sunday ,31 December

Nepal bans solo climbers from Everest

GMT 10:48 2014 Saturday ,22 March

Parata launches new digital education portal

GMT 17:47 2017 Tuesday ,18 April

Saudi Shoura member in favor of women driving

GMT 19:07 2011 Tuesday ,19 April

Electric cars: night-time charging better
Arab Today, arab today
 
 Arab Today Facebook,arab today facebook  Arab Today Twitter,arab today twitter Arab Today Rss,arab today rss  Arab Today Youtube,arab today youtube  Arab Today Youtube,arab today youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©

arabstoday arabstoday arabstoday arabstoday
arabstoday arabstoday arabstoday
arabstoday
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
arabstoday, Arabstoday, Arabstoday