Skip to main content

Computer Weekly Awards

Computer Weekly Awards

Each year, a number of students who submitted outstanding project dissertations are invited to write short white papers for the general IT public. These articles are those which best present research in an area of information security of interest to information security managers and professionals. These projects are re-written as short articles for a general audience, and many are published online by Computer Weekly. The articles are listed below, and the full projects are published as technical reports

In this article Sijmen presents the best practices and lessons learnt by eight organisations in the Netherlands that have set up their CTI teams in the last ten years.

In this article Sam reviews how wider use of digital platforms has impacted cybercrime.

In this article Nicholas investigates how frequently certain security mechanisms are used by the top one million websites.

In this article Matthew reviews existing hardening procedures, and proposes a new hardening procedure, for securing IoT devices.

In this article Ionut discusses the performance costs of defending against an attacker who can physically access the memory of an IoT device.

In this article William proposes a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it. The Computer Weekly article can be found here.

In this article Ivan describes the implementation, feasibility, and benefits of cloud-native honeypots in understanding and mitigating attacks. The Computer Weekly article can be found here.

In this article Will analyses the underlying technologies of connected and autonomous vehicles and considers their cyber security vulnerabilities and attacks, and proposes high-level recommendations. The Computer Weekly article can be found here.
 

In this article Jeffrey analyses the log files provided by the Philippines’ Commission on Elections to study what transpired during the 2016 elections. The findings, conclusions, and recommendations have been submitted to the Joint Congressional Oversight Committee on the Conduct of Automated Elections. The Computer Weekly article can be found here.

In this article Francesco explains what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. The Computer Weekly article can be found here.

In this article Hong-Xin describes an efficient and robust convolutional long short-term memory based energy theft detection model. The Computer Weekly article can be found here

In this article Laure explains why the under reporting of cybercrime is an increasing cause for concern. The Computer Weekly article can be found here.

In this article Matt gives a brief overview of multiparty computation (MPC), and highlights the benefits of MPC-based bitcoin custody over traditional approaches. The Computer Weekly article can be found here.

In this article Vipul explains network traffic mirroring, how it is implemented in public clouds, and the security challenges it faces. The Computer Weekly article can be found here.

In this article James Crawford considers the individuals convicted under the Computer Misuse Act and whether they conform to the stereotype of the gifted and highly skilled hackers. The Computer Weekly article can be found here.
  
In this article Gerard Phillips describes a new threat model focusing on the the risks to personal investors in the UK who use UK investment platforms to manage their pensions and savings. This offers new insights allowing anticipation and defence against future attacks. The Computer Weekly article can be found here.
  
In this article Giuseppe Raffa evaluates the effectiveness of some anti-virus programs for Linux desktops using local installations as well as an online malware scanning service. The Computer Weekly article can be found here.
 
 

In this article Nicola Bates discusses whether the civilian autonomous vehicle security frameworks are suitable for military logistics autonomous vehicles, and examines the threats considered from the point of view of an enemy so as to identify critical weaknesses and countermeasures. The Computer Weekly article can be found here.

Organisations may turn to cyber insurance to cover a portion of their enterprise risk. In this article Rob Champion summarises high level findings on a practical model that could be used in lieu of actuarial data. The Computer Weekly article can be found here.

The emergence of connected and autonomous vehicle is an exciting trend. In this article Juliet Flavell discusses some of the requirements, constraints and challenges, and areas of uncertainty in this technology. The Computer Weekly article can be found here.

In this article Jan Kalbantner describes a widespread attack based on a hardware vulnerability, and discusses what paths future research might take to mitigate variants of this attack. The Computer Weekly article can be found here.

In this article Tony Leary dissects the 2017 incident where the ‘WannaCry’ ransomware infected 32 National Health Service trusts in England and discusses the principal causes. The Computer Weekly article can be found here.

Connected devices suffer from malware infection and one of the defences against this is the detection of malware using clustering algorithms. Rebecca Merriman studies the accuracy of such algorithms in this article and discusses factors that might affect the results. The Computer Weekly article can be found here.

In this article Felisha Mouchous proposes a threat modelling and security testing framework to allow organisations to leverage existing data to identify gaps in defences and understand threat actor behaviour. The Computer Weekly article can be found here.

In this article Daniyal Naeem outlines a strategy to identify what security attributes a good USB security management system must have, and compares the new strategy with established methods. The Computer Weekly article can be found here.

 

Explore Royal Holloway