Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

GCHQ chief Iain Lobban’s comments show Abertay hacking skills’ value Dr Ian Ferguson

Post Thumbnail

Computer security skills like those taught at Abertay University are on the frontline of a fight against a “real and credible” threat of cyber attack, a leading intelligence figure has said.

Government Communications Headquarters (GCHQ) director Iain Lobban, in a rare public speech, said Britain’s future economic prosperity depended upon developing effective defences against a cyber assault.

Abertay became the first university in the UK to equip students with the skills required to counter such an attack when it launched an ethical hacking course in 2006.

It built on these credentials this year by starting a digital forensics course to provide techniques for analysing crimes after the event by piecing together fragments of digital information.

Course head Dr Ian Ferguson told The Courier the techniques learnt by his students were “crucial” in countering the threat of cyber espionage.

“The skills taught in these courses are exactly what Mr Lobban is talking about. It is about responding to the very real cyber threats that are out there,” he said.

GCHQ is most closely associated with electronic intelligence gathering, but Mr Lobban used his speech to the International Institute for Strategic Studies on Tuesday night to stress it also has a security role.

He revealed that each month there are more than 20,000 “malicious” emails on government networks, while intellectual property theft is taking place on a “massive scale” some relating to national security.

“It’s not a narrow security issue for the spooks but a wide economic issue that demands a holistic response,” he said.’Getting cyber right'”Fundamentally, getting cyber right enables the UK’s continuing prosperity. In order to flourish, a knowledge economy needs to protect the intellectual property at the heart of the creative and high-tech industry sectors.

“It needs to maintain the integrity of its financial and commercial services.”

Mr Lobban did not go into detail about the threat to the UK’s critical national infrastructure, but said it was “real and credible” and required a swifter response to match the speed with which “cyber events” happened.

However, he added that cyberspace also offered many opportunities if Britain could get its defences right and ensure its networks were “intrinsically resilient.”

Dr Ferguson said he concurred with Mr Lobban’s assessment of the situation.

“I don’t disagree with a word of what he said, but in ways I wish it had been said four or five years ago,” he said.

“Obviously he is talking about the defence implications with the government’s comprehensive spending review coming up, but it is much wider than that.Protection”Any organisation with a large computer infrastructure is now looking for this kind of protection.

“It was the banks who first realised the importance of this but we are now finding all types of organisations are recruiting our graduates. I recently heard that even B&Q had hired people working in this field.”

The digital forensics course teaches students how to unravel the complex evidence hiding in phone handsets, computers and databases including messages that users were confident had been deleted.

As well as exploring new technical skills, students study elements of forensics, law and psychology, including how to collect and present evidence for a criminal prosecution and minimise the potential for cyber crime.

Photo used under Creative Commons licence courtesy of Flickr user mattwi1s0n.