Posts

C3L - Meet the team!

 Introduction to the people behind this blog! This blog is where members of C3L post about current projects, spread a bit of information, and write about their personal interests in order to create a wider outreach.  The blog has three main authors contributing: Scott (the director of the company), Alex (researcher and co-developer), and Grace (Research assistant for the company.) The purpose of this post is to officially introduce each of us as individuals in order to give a small insight into who we are and what we're like at C3L as people.  Firstly introducing, Scott:  I'm Scott, I started the company to take advantage of an opportunity to work in standards way back in 1995 and have managed to keep my hand in since. My background is in engineering and I've been doing it since leaving school and university. I'd like to think I'm good at it, taking a holistic systems view to things and looking into why they aren't secure and then trying to find ways to fix thin

An Introduction to Preservation of Digital Media

  Introduction   Digital Preservation is the active management and maintenance of digital objects (the files, or groups of files, that contain information in digital form) so they can be accessed and used by future users. It involves planning, resource allocation, and application of preservation methods and technologies, and it combines policies, strategies and actions to ensure access to reformatted and born-digital content, regardless of the challenges of media failure and technological change. The goal of digital preservation is the accurate rendering of authenticated content over time to ensure its authenticity, accessibility and usability. Scope Preserving and archiving digital media covers a wide and varied areas from emails relating to the works of government and businesses, the videos uploaded onto platforms such as Youtube or TikTok, to digital copies of older physical based information such as historic documents or records.  It is possible to distinguish among three distinct

Video Game Accessibility and Usability do we need a Standard from ETSI?

  Introduction We at C3L have started the process of creating a new Joint   SC/TC USER-HF Work Item (WI) on Video Games Accessibility and Usability Design. This post will aim to explain why ETSI should become  involved  in video games and hopefully if encourage others to support this work. The proposed scope of the work would  describe the problems arising from inconsistency of usability and accessibility design practices in video game controls and to identify the role of standards-based solutions to maximise each. It would  identify and illustrate the challenges relating to implementing usability and accessibility measures in video games.   Also, the WI  will describe the application of usability and accessibility measures and their relative impact in the user. The  Proposed format would be a Technical Report (TR) in the form of a “problem statement” that will set out the landscape in detail in order to justify why the EU should add this to the ICT rolling plan and to consider adding

History of the UK Semi-Conductor Industry and can we learn from it?

  Introduction This blog post aims to give an overview of the history of semi-conductors and computer industry in the UK. So no all topics and areas will be covered. It will have a focus on the parts I find most interesting. So if you are looking for a detailed history this is not the place. It will use the overview to give ideas of what we could do to better prepare ourselves for the future and current challenges we are facing. Knowing the history of something be it a place, industry, business, country etc., matters b ecause it   gives us insight into why our culture and  society  does certain things, and how the past has shaped it into what we know now. Also, h istory is a continuous documentation of our past. It’s a timeline rife with events, with one thing always leading to the next. By examining chains of events, and how one small occurrence can spark countless, invaluable incidents or one devastatingly large one, we begin to understand the nature of change. Our  history  reveals

Open Source Intelligence Applied to Cybersecurity

  Introduction   The application of Open Source Intelligence (OSINT) to cybersecurity is not something most businesses will use everyday it is an area worth understanding and having knowledge of. Since it  is a vital resource to stay on top of events and threats which may threaten a business. The vast majority of businesses will not collect OSINT themselves but rely on specialist reporting. This post will aim to give an overview of it.  OSINT can be defined as an intelligence that is produced from publicly available information and is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement. In the cybersecurity field, OSINT is used widely to discover vulnerabilities in IT systems and is commonly named Technical Foot-printing. Foot-printing is the first task conducted by hackers – both black and white hat hackers – before attacking computer systems. Gathering technical information about the ta

C3L supporting Poole Hospital Charity event - March for Men 2021

 The employees of C3L are taking part in March for Men 2021 and would appreciate your support.  Poole Hospital are calling on men - sons, fathers, brothers, uncles, grandfathers as well as their loved ones, to come together to walk, jog or run either 1km, 5km or 10km to help raise important funds to support men from across Dorset receiving treatment for prostate cancer at Poole Hospital. March for Men is a virtual event, meaning you can undertake your walk or run at a location of your choice anytime during March. No matter your age, ability or gender you can be a part of this amazing event. Poole Hospital Charity are excited to be joining March for Men for the first time and taking part to raise vital funds for men's health in Dorset. With your support, they can make a difference to men receiving life saving cancer treatment at Poole Hospital. If you would like to donate this event there are links provided: https://www.justgiving.com/campaign/marchformen https://www.justgiving.c

Cognitive Psychology and Cybersecurity

 Introduction  This post will aim to give an overview of the application of cognitive psychology to cybersecurity and how it can be used to enhance human factors within the field of cybersecurity.    Cognitive psychology is defined as the branch of psychology devoted to studying mental processes. There are many different types of mental processes and how people use them in their unique ways to draw conclusions and make decisions. Thus, cognitive psychology encompasses a very broad range of subjects. These include but not limited too; r easoning; j udgment; a ttention and decision making. Which are the areas social engineering attacks aim to undermine to manipulate.  An important thing to remember about cognitive psychology is that it isn't just about the thoughts that an individual have but also about how those thoughts impact their behaviour. Cognitions, or thought processes, are what happens to someone between perceiving something with their senses and behaviour in response.   Th

Cybersecurity and Usability

  Introduction   The topic of cybersecurity and usability is a topic I have covered before though with a focus on IoT. This post will aim to take a broader view along with covering additional ideas and concepts. It is subject that cannot be learned once and then filed away since with every new design there is a risk of forgetting the design principles for usability plus often there is a chance when usability is considered from the start it may be weakened by feature creep and changing requirements. Therefore it is always worth reminding yourself and refreshing the principles behind usability in cybersecurity.  Design  Getting the balance between cybersecurity and usability is critical because at the either extreme w e can make systems secure enough to never be attacked but this would also mean no one could ever access or use them  conversely systems that are really easy to use might have little or no security though it is still possible to design a system with no security and be diffic