Skip main navigation

Wrapping up

And finally….. If you’ve enjoyed this course, you can find out more about Newcastle University, our School of Computing and cyber security related courses. Good luck and stay safe online! …

Glossary and references

You might like to bookmark this page, so that you can easily find it, should you come across a term you are unsure about as you work through the course. …

Exploring security: the Access Control Live Lab

In this video Charles describes the role of the Access Control Live Lab, a space within Newcastle University where students can explore the security/usability trade-off in a really tangible way. …

Exploring security: biometric authentication

In this video Charles interviews Arthur Demanuele, and they discuss new ways of understanding contactless security. Arthur introduces us to the concept of biometrics, explains what behavioural biometrics are and …

Security privacy tradeoff

As discussed before, there is a clear trade-off between security and usability when it comes to the security of future home. For instance, if you wanted to use a smart-lock …

Zero-day vulnerabilities and bounty programs

Standard advice for maintaining your own protection against cyber-attacks is to ensure all your devices are running the most recent releases of software. This applies to your antivirus programs and …

STRIDE

Security is often defined as a negative property: a system is perfectly secure whenever there is no possible way to attack it. In order to assess the security of a …

Crime

In the future home, we have some great examples of devices and technologies that can make our lives easier. However, can a smart home be attacked in the same way …

Staying in control

How can we specify who can enter our house? Or borrow our car? An access control policy is a document describing which accesses are authorised or denied within a system. …

Case study 3: Co-wheels

We are increasingly seeing examples of what some people describe as a collaborative or sharing economy, where end-users easily share their own resources with others, in exchange for reciprocated access …

Case study 2: the door

Several companies, such as Danalock or Lockitron, have recently started to offer smart-locks, which can go on top of traditional locks and enable them to be opened or closed remotely, …

Case study 1: the ordering stick

Amazon introduced in 2015 the Amazon Dash Button, which is a small physical object connected to the home WiFi. Pressing this button will automatically order a particular product on Amazon, …

Devices in the future home

Our lives are changing as more and more of the devices around our homes and lives connect and interact. In this video Dr Charles Morisset presents some examples.

Staying safe with online payments

We are much more likely to fall victim to online payment fraud than having our pocket picked, having our cards cloned at an ATM or being caught in a phishing …

Expert advice on protecting your money

Here are some top tips from our payments week experts, based on what they do to keep their own money safe from the fraudsters. Spread your risk across multiple bank …