Wednesday 25 February 2015

Junkbots training - 23rd February 2015

Junkbots training for University of Northampton STEM Champions on 23rd February 2015.

Training lead by Scott Turner.


(c) Linda Davis-Sinclair


(c) Linda Davis-Sinclair
For more details of the junkbots project go to: http://junkbots.blogspot.co.uk/

If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Sunday 15 February 2015

Chaos based cryptography for voice encryption in wireless communication


Chaos based cryptography for voice encryption in wireless communication
Sadkhan, S., Al-Sherbaz, A. and Mohammed, R. 
International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE).
 Iraq: IEEE. 
pp. 191-197


Abstract
The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption techniques in wireless communication as well. The review in this paper summarized the traditional and modern techniques of voice/speech encryption and demonstrated the feasibility of adopting chaos based cryptography for in wireless communications.



citation: Sadkhan, S.Al-Sherbaz, A. and Mohammed, R. (2015) Chaos based cryptography for voice encryption in wireless communication. In: International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE). Iraq: IEEE. pp. 191-197


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Wednesday 4 February 2015

British Computer Society (Bedford) Computer Security and Ethical Hacking


Joint Event between the University of Bedfordshire’s BCS Student Chapter and the Bedford branch of the British Computer Society

Date: Wednesday, 25 February 2015

Theme: “Computer Security and Ethical Hacking”

Speaker:  Geraint Williams, Information Risk Consultant and Trainer, IT Governance Ltd., Honorary Visiting Fellow at the University of Bedfordshire.

Time:  6.30-8.00pm

Location:  University of Bedfordshire (Luton Campus), Park Square, Luton LU1 3JU

Details on www.beds.bcs.org.uk

Abstract
There will be a joint British Computer Society (BCS) (Bedford branch) and the University of Bedfordshire’s BCS Student Chapter lecture on Wednesday 25 February 2015.

“Computer Security and Ethical Hacking” is the topic of a talk and demonstration by Geraint Williams, Information Risk Consultant and Trainer, IT Governance Ltd., and Honorary Visiting Fellow at the University of Bedfordshire.

The talk is designed as an introductory session on computer security and ethical hacking and will include a demonstration of how a weakness in an operating system can be exploited to take over the machine - allowing the attacker to gain full control.

The main areas to be covered – what is meant by computer security, phishing analysis, ethical hacking, a practical demonstration of hacking a computer and a brief discussion of wireless security.

The existence of the Internet and the wealth of resources it facilitates is so entwined with our daily lives that our IT systems and the data they hold can no longer live in isolation.  The online society in which we now exist, demands that we stay connected - making cyber crime a lucrative and ever-present threat.

Geraint will provide an overview of the concepts of data security and discuss the common attack strategies; he will demonstrate the tools, social engineering techniques and operating systems vulnerabilities that hackers could use to exploit their victims.

Geraint will conclude with an insight into the careers opportunities available in the area of Security Testing - more commonly known as Ethical Hacking - and options for further study.

Geraint Williams is an Information Risk Consultant and Trainer for IT Governance Ltd. and an Honorary Visiting Fellow at the University of Bedfordshire.  Geraint is a knowledgeable and experienced Information Security consultant with experience including vulnerability testing, digital forensics, secure networking, and wireless security issues.  Geraint has a strong technical knowledge of security and IT infrastructure including high performance computing.  Geraint has a number of certifications in security and digital forensics including CISSP, CISA, CEH and CHFI.

Agenda

6.00pm                        Registration, refreshments and networking
6.30pm                        Introduction
                Computer Security and Ethical Hacking
7.20pm                        Opportunity to question the speaker
7.45pm                        Thanks
                Opportunity to network and talk to the speaker

Everybody is welcome – please bring friends and colleagues.

Register online at:  https://events.bcs.org/book/1416/

Details of past and futures events can be found on www.beds.bcs.org.uk


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Monday 2 February 2015

British Computer Society (Bedford) Women in Computing ? Breaking Myths and Broadening Horizons

BEDS BCS talk on “Women in Computing ? Breaking Myths and Broadening Horizons. Details of the event and registration are below.

University of Bedfordshire – BCS Student Chapter Event

Date: Wednesday, 11 February 2015


Time:  5.00pm-7.00pm

Location:  Room P107, University of Bedfordshire (Luton Campus), Park Square, Luton LU1 3JU


Abstract

The University of Bedfordshire BCS Student Chapter invites you to an inspirational evening on Wednesday 11 February 2015 dedicated to female graduates, students and professionals looking for a career change who are interested in pursuing a career in the world of technology.

Hear first-hand from some of the industry’s technologists how they have excelled in their field and taken steps to address the gender imbalance in the industry. From networking to practical advice the evening will give you an insight into the spectrum of varied and rewarding opportunities open to anyone embarking on a career in IT.

Only 17% of IT professionals in the UK are women.  According to research, while women achieve 57% of Bachelor degrees, just 12% of computer science degrees are awarded to women.  Why is this happening?

Guest speakers include:

     Elizabeth Sheldon, Co-Founder, Chief Executive Officer; Evidence Talks (ETL)

     Katherine Brewster BA (Hons), Graduate Recruitment and Events Consultant, FDM Group

     Madeleine Field, People Development Manager, FDM Group

     Margaret Long FLPI, IT E-Learning Supervisor, Berwin Leighton Paisner LLP
     Dr Ismini Vasileiou, Lecturer in Information Systems, University of Plymouth

     Dr Herbert Daly, Senior Lecturer in Computer Science, University of Bedfordshire

Agenda

5.00pm                        Introduction and welcome
5.15pm                        Elizabeth Sheldon
5.30pm                        Katherine Brewster
5.45pm                        Madeleine Field
6.00pm                        Margaret Long
6.15pm                        Dr Ismini Vasileiou
6.30pm                        Dr Herbert Daly
6.45pm                        Summing-Up
6.50pm                        Opportunity to network and talk to the speakers
            Refreshments

Everyone is welcome, and you are warmly invited to attend.

Register online at:




If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with