Identity Security in Cyberspace
The Identity Security in Cyberspace project is focused on understanding the range of security and privacy risks to an individual’s identity based on what is generally shared online. We investigate the types of information currently shared, and the variety of attacks that might be launched using such information to comprise the individual or their enterprise. Our aim is then to develop a set of easy to apply strategies and tools by which individuals (and companies who the individuals work for) can reflect on their exposure and ultimately, keep themselves safe online.
Selected Publications
-
Trustworthy and Effective Communication of Cybersecurity Risks: A Review
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 1st Workshop on Socio−Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Trustworthy and Effective Communication of Cybersecurity Risks: A Review | BibTeX data for Trustworthy and Effective Communication of Cybersecurity Risks: A Review | Download (pdf) of Trustworthy and Effective Communication of Cybersecurity Risks: A Review | DOI (10.1109/STAST.2011.6059257)
-
Predicting Graphical Passwords
Matthieu Devlin‚ Jason R. C. Nurse‚ Duncan Hodges‚ Michael Goldsmith and Sadie Creese
In Theo Tryfonas and Ioannis Askoxylakis, editors, International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 17th International Conference on Human−Computer Interaction (HCI). Pages 23–35. Springer. 2015.
Details about Predicting Graphical Passwords | BibTeX data for Predicting Graphical Passwords | Download (pdf) of Predicting Graphical Passwords | DOI (10.1007/978-3-319-20376-8_3)
-
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Details about Investigating the leakage of sensitive personal and organisational information in email headers | BibTeX data for Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers