Posts

C3L - Meet the team!

 Introduction to the people behind this blog! This blog is where members of C3L post about current projects, spread a bit of information, and write about their personal interests in order to create a wider outreach.  The blog has three main authors contributing: Scott (the director of the company), Alex (researcher and co-developer), and Grace (Research assistant for the company.) The purpose of this post is to officially introduce each of us as individuals in order to give a small insight into who we are and what we're like at C3L as people.  Firstly introducing, Scott:  I'm Scott, I started the company to take advantage of an opportunity to work in standards way back in 1995 and have managed to keep my hand in since. My background is in engineering and I've been doing it since leaving school and university. I'd like to think I'm good at it, taking a holistic systems view to things and looking into why they aren't secure and then trying to find ways to fix thin

Exploring the themes and ideas around the Cultural Splinternet

  Introduction   As a reminder, the “splinternet,” can be defined as where cyberspace is controlled and regulated by different countries. This includes regulations and national firewalls. As well there are the barriers across cultures with media and language being two defining features. These naturally exist in the physical world (nation-state) because of how we naturally divide ourselves up and congregate in similar and like-minded groups. Internet reflects that and in some cases to a greater harmful degree. My view is you can divide the splinternet into three types:  National/Geopolitical  (i.e. West vs East) Regulatory (i.e. GDPR) Cultural (i.e. language) The goal of this post is first explore some of the language gap within the cultural splinternet with examples and whether it is something worth tackling. Secondly, how the  impact of regulatory / national splinternets affect the cultural splinternet. The examples I have chosen may be a  bit biased but they are things I find persona

An Introduction to Preservation of Digital Media

  Introduction   Digital Preservation is the active management and maintenance of digital objects (the files, or groups of files, that contain information in digital form) so they can be accessed and used by future users. It involves planning, resource allocation, and application of preservation methods and technologies, and it combines policies, strategies and actions to ensure access to reformatted and born-digital content, regardless of the challenges of media failure and technological change. The goal of digital preservation is the accurate rendering of authenticated content over time to ensure its authenticity, accessibility and usability. Scope Preserving and archiving digital media covers a wide and varied areas from emails relating to the works of government and businesses, the videos uploaded onto platforms such as Youtube or TikTok, to digital copies of older physical based information such as historic documents or records.  It is possible to distinguish among three distinct

Video Game Accessibility and Usability do we need a Standard from ETSI?

  Introduction We at C3L have started the process of creating a new Joint   SC/TC USER-HF Work Item (WI) on Video Games Accessibility and Usability Design. This post will aim to explain why ETSI should become  involved  in video games and hopefully if encourage others to support this work. The proposed scope of the work would  describe the problems arising from inconsistency of usability and accessibility design practices in video game controls and to identify the role of standards-based solutions to maximise each. It would  identify and illustrate the challenges relating to implementing usability and accessibility measures in video games.   Also, the WI  will describe the application of usability and accessibility measures and their relative impact in the user. The  Proposed format would be a Technical Report (TR) in the form of a “problem statement” that will set out the landscape in detail in order to justify why the EU should add this to the ICT rolling plan and to consider adding

History of the UK Semi-Conductor Industry and can we learn from it?

  Introduction This blog post aims to give an overview of the history of semi-conductors and computer industry in the UK. So no all topics and areas will be covered. It will have a focus on the parts I find most interesting. So if you are looking for a detailed history this is not the place. It will use the overview to give ideas of what we could do to better prepare ourselves for the future and current challenges we are facing. Knowing the history of something be it a place, industry, business, country etc., matters b ecause it   gives us insight into why our culture and  society  does certain things, and how the past has shaped it into what we know now. Also, h istory is a continuous documentation of our past. It’s a timeline rife with events, with one thing always leading to the next. By examining chains of events, and how one small occurrence can spark countless, invaluable incidents or one devastatingly large one, we begin to understand the nature of change. Our  history  reveals

Open Source Intelligence Applied to Cybersecurity

  Introduction   The application of Open Source Intelligence (OSINT) to cybersecurity is not something most businesses will use everyday it is an area worth understanding and having knowledge of. Since it  is a vital resource to stay on top of events and threats which may threaten a business. The vast majority of businesses will not collect OSINT themselves but rely on specialist reporting. This post will aim to give an overview of it.  OSINT can be defined as an intelligence that is produced from publicly available information and is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement. In the cybersecurity field, OSINT is used widely to discover vulnerabilities in IT systems and is commonly named Technical Foot-printing. Foot-printing is the first task conducted by hackers – both black and white hat hackers – before attacking computer systems. Gathering technical information about the ta

C3L supporting Poole Hospital Charity event - March for Men 2021

 The employees of C3L are taking part in March for Men 2021 and would appreciate your support.  Poole Hospital are calling on men - sons, fathers, brothers, uncles, grandfathers as well as their loved ones, to come together to walk, jog or run either 1km, 5km or 10km to help raise important funds to support men from across Dorset receiving treatment for prostate cancer at Poole Hospital. March for Men is a virtual event, meaning you can undertake your walk or run at a location of your choice anytime during March. No matter your age, ability or gender you can be a part of this amazing event. Poole Hospital Charity are excited to be joining March for Men for the first time and taking part to raise vital funds for men's health in Dorset. With your support, they can make a difference to men receiving life saving cancer treatment at Poole Hospital. If you would like to donate this event there are links provided: https://www.justgiving.com/campaign/marchformen https://www.justgiving.c

Cognitive Psychology and Cybersecurity

 Introduction  This post will aim to give an overview of the application of cognitive psychology to cybersecurity and how it can be used to enhance human factors within the field of cybersecurity.    Cognitive psychology is defined as the branch of psychology devoted to studying mental processes. There are many different types of mental processes and how people use them in their unique ways to draw conclusions and make decisions. Thus, cognitive psychology encompasses a very broad range of subjects. These include but not limited too; r easoning; j udgment; a ttention and decision making. Which are the areas social engineering attacks aim to undermine to manipulate.  An important thing to remember about cognitive psychology is that it isn't just about the thoughts that an individual have but also about how those thoughts impact their behaviour. Cognitions, or thought processes, are what happens to someone between perceiving something with their senses and behaviour in response.   Th