Posts

Open Data and Closed Data

Introduction

In our always connected environment, there are considerations that organisations have to make when determining whether certain data should be open or closed access, especially if they have the potential to benefit society as a whole. Decisions that are made can affect how they implement data protection and privacy regulations along with cybersecurity policies. 

Definitions

Open Data: The Open Data Institute (ODI) provides the following definition: “open data is data that anyone can access, use or share.” “Anyone” refers to literally anyone, including commercial users. So Open Data can be accessed, used, remixed and shared again with no restrictions at all. Open Data – Data that meets the following criteria:
Accessible (ideally via the internet) at no more than the cost of reproduction, without limitations based on user identity or intent;In a digital, machine-readable format for interoperation with other data; andFree of restriction on use or redistribution in its licensing c…

Trustworthiness in the Information Age

Introduction

In our Information Age where the vast majority of systems and devices are now able to connect to the internet and communicate with each other the trustworthiness of how we communicate, the devices we use and the networks they run becomes critical. But there is a slight problem it is difficult to prove trustworthiness but also maintain it and to have confidence in we operate in this environment this is a problem worth discussing. 

Definition of  Trustworthiness: At it is most simple is the Quality of being authentic and reliable. In cybersecurity, the Industrial Internet Consortium(IIC) defines trustworthiness as the degree of confidence one has that a system performs as expected.

In our daily lives, trustworthiness inks to the problem of fake news and/or disinformation campaigns which stem from social media and can when comes to services and systems if can be used to harm the reputation of services and companies. This is due to the weaponisation of context in order to sprea…

Personal Interest - 1970s Oil Crisis and Alternative Energy Research

Image
Introduction

With calls for greater and more urgent action to decarbonise our way of life to counter the climate emergency mirrors in some way the mindset that saw research and action that happened when the 1970s oil and energy crisis broke out. Though while most of those actions were not steps to reduce carbon emissions but to end dependency on OPEC they also aligned with the first awareness of climate change brought about by rising CO2 in the atmosphere and the beginnings of the need to be more environmentally conscious. This post will examine some of the projects that were started in the 70s and the effect they have on us today.

Background


Between October 1973 and March 1974 the price of oil quadrupled, thanks to the October/Yom Kipper war between Israel and her neighbours  the rising power of Opec and the boycott organised by a group of Arab states. Suddenly political leaders in the West scrambled to find solutions to what became defined as “the energy crisis”. Citizens agreed to tu…

Balancing requirements of Security, Usability and Functionality within IoT

Image
Introduction This blog post shows the content that was presented at ETSI IoT Week 2019. It is based on the work of ETSI User-Group and how their work links to the world of IoT. It will also be based on previous work that has been carried out by the ETSI Cyber-Group. Part of this post will focus on the areas of security, privacy, GDPR, data protection and single-sign-on technologies. These areas will be presented from the User-Group perspective.
The other part will focus on usability and functionality of IoT devices with how design choices can impact security and vice versa. Along, with how standards have the potential to aid in balancing these three elements. 

Problem Space

The majority of IoT devices coming onto the market are designed to be low-cost and simple to use as possible. But this leads to a compromised design with security and privacy protections often being neglected. Therefore, we need to able to develop guidelines and requirements for IoT devices which have security designe…

ETSI IoT Week 2019 - Overview

Introduction


The ETSI IoT Workshop took place in ETSI premises (Sophia Antipolis, FR), started on 22 October and ended on 25 October. It included an essential update on the major IoT standardisation, such as those ongoing in ETSI, oneM2M, SmartM2M and 3GPP. An essential element of deploying IoT services are the choice and the availability of IoT communication technologies such as those developed by the 3GPP partnership project (NB-IoT, LTE-M). Selecting the right IoT connectivity technologies, that are optimised for multiple IoT solutions and work at scale, is essential to ensuring future-proof and sustainable IoT deployments. Interoperability and interworking remain key factors for the successful development of IoT. This is particularly true when it comes to ensuring security and semantic interoperability. The standards being developed in ETSI, oneM2M and 3GPP, act as the essential “glue" between the various technologies that are present in the complex IoT ecosystem. The workshop co…

Cybersecurity and International Travel

Introduction

While I was checking out train routes from London to Hong Kong/Shanghai and Japan the topic of cybersecurity measures I would or might need also crossed my mind. When thinking it over and looking up advice there are few key things that a traveller should keep in mind when it comes to their own cybersecurity when travelling abroad. When large when travelling through areas in the EU the level of risk is low while to travel outside the EU depending whether they are friendly or non-friendly countries the risk can be much higher. Higher risk countries include obvious ones like Russia and China but also depending on your profession can possibly now include the USA. (Journalists being harassed at US airport as they go through customs and passport control seems to be becoming more common) If you already follow cybersecurity best practises the vast majority of the time you don't need to do much else and further measures you might take will depend on where your travelling to an…

IET 2019 Healthcare Lecture - Notes and Thoughts