SlideShare a Scribd company logo
PROF. KEITH MARTIN INTERVIEW
MVI_9415
0.00 – Hi, could we please have your name.
0.06 – I’m Professor Keith Martin and I’m a professor of information security at Royal
Holloway university of London.
0.15 – What is the information security group and its main aims?
0.18 – The information security group is a department here at Royal Holloway so we are
about 18 researchers, we teach, research and generally engage in the industry of cyber
security or information security.
MVI_9416
0.00 – What are the most common threats that we face as the public and how can we
combat that?
0.08 – Well I think in terms of threats that we all face you have really good two things to
worry about. One is the information that you may have on your devices that you don’t want
other people to see or you don’t want other people to misrepresent. The second threat you
have got is information used to identify yourself when you do things online on your devices
because if someone gets hold of these they can present themselves as you.
0.34 – What tips would you give to somebody who wants to keep their account secure
and all their information secure?
0.40 – So in terms of keeping your information secure in case of these threats there are many
things you can do, but I would say there are three things you should focus on. So one would
be keeping security information secret, so if your basically using pins, passwords or
passphrases or you have tokens that you use to access online services. You must remember
that they are you so on anything you do, anyone that gets hold of these things can present
themselves as you so I think the first thing you do is to keep these safe and don’t share them
with anyone. The second thing I would say is to be very very cautious about any information
you put out there into cyberspace such as Whatsapp and social media sites because you
almost have to assume that anything you say or any information you put into these could at
some point in the future get out out there and be discovered so you have to be very very
cautious about what information you are putting on there about yourself. I think the third
thing is making sure the technologies that you use are as safe as they can reasonably be so we
often say keep a clean machine, so in terms of a phone or a laptop or a computer. Make sure
you are following all the best practices, you’re installing all the right security software and
your keeping software up to date, uploading patches and you’re basically following all the
guidelines so you’re not letting your machines deteriorate because the thing is when
machines deteriorate or you run old versions then information can leak so I would say it is
securing your security information and being cautious about what you put online and keeping
a clean machine.
2.15 – Have you had any experience with these examples of information being stolen at
the university or any personal experience?
2.24 – So in terms of have we here at Royal Holloway had problems of this type I think the
answer is that every organization is suffering problems and I don’t think Royal Holloway has
any more problems than any one else but what is very clear to us from the people we speak to
and if you follow the news stories you should see as well that are all organizations are prone
to problems at the moment and all individuals as well so as individuals we have to be very
careful. I think if you ask your friends or speak to colleagues you will discover someone very
quickly who has had some difficulties of this type so I think it is very prevalent.
MVI_9417
0.00 – Can we all stay one step ahead of criminals?
0.05 – Yeah in some sense there is a sort of game going on all the time, which is to do with
threats that we face in cyberspace and the defences we try and put in place and it is certainly
true that the defences evolve as the attack factors change I mean as they do for any kind of
threat we face in society. You see the way society responds where there is a bad accident like
9/11 or the Paris terrorist attacks, things always change. I don’t think you can ever get on top
of that game at all because I think crime will always be around in any society. We are human
beings and cyberspace is just a new place where people can conduct crimes, there may be a
few different things you can do in cyberspace but it’s still a vector over which people can
conduct crimes. I think the biggest problem you have got is that it’s not security of
technologies, technologies to a certain extent you can keep on strengthening but these
technologies are used by human beings and most of these crimes exploit the fact that it is
human beings that are using these machines, they are using phones, they are using computers
so most incidents and most criminal attacks will try and exploit that gap that exists between
the devices and humans. So for example they will go after passwords or pins or they will
trick people into passing over information or we see a lot of the time they may trick people
into doing things like giving away information when they shouldn’t. I think you’re never
going to stop that activity, wherever there are human beings there will always be crime and
unfortunately that’s the world we live in. We make it, we are it.
MVI_9418
0.00 – With the threat of account hacking and personal information being stolen should
we still trust and use banks, social media websites and online shops? And why so?
0.14 – Okay so it’s a very interesting question that surrounds which services online that we
should use in the presence of threats and attacks and I think we have to make a big decision
to whether we actually want the value and the advantages of using these services or we
don’t. We see organization after organization falling prone to things, most recently here in
the UK we saw a big incident involving the supplier of talk talk for example. Should we trust
a particular bank, should we trust a particular phone company and I think it’s just very much
us that have to decide these questions for ourselves based on all the information we use. I
mean why should you put your money in a particular bank, should you use a particular phone
service provider. You might well use stories you have heard about them to decide whether
they have good online security, you might use stories you hear about their chairman or their
shareholders or other aspects of their business. The one thing we can’t do is we can’t be
100% safe dealing with organizations like that, we have to make a decision and it’s a
personal decision of what organizations we trust and which ones we don’t. Because it’s a
very important part that when you do use a bank or you use a phone company you are trusting
them to an extent with the information you are providing and the data you are providing and
it’s ultimately your call, you base it on their reputation and how much you want their services
at the prices they are offering you. So yes I think we should be trusting banks, we should be
trusting mobile phone companies but it’s up to us as individuals which ones we decide to do
business with.

More Related Content

What's hot

Internet Safety
Internet SafetyInternet Safety
Internet Safety
jacob_denver
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
letsbeginbydoing
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
MsCCostello
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Mariam Sb
 
Unit 14 - LO2
Unit 14 - LO2Unit 14 - LO2
Unit 14 - LO2
AshleyPeterBowers
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
Rajesh Ahuja
 
Internet safety
Internet safety Internet safety
Internet safety
bhavya mohindru
 
Internet safety
Internet safetyInternet safety
Internet safety
erinmarkus
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safety
AChuppTeaches
 
Family online-safety-contract
Family online-safety-contractFamily online-safety-contract
Family online-safety-contract
Raúl Olmedo Burgos
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
yasha15
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
guest80ad5c
 

What's hot (19)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Unit 14 - LO2
Unit 14 - LO2Unit 14 - LO2
Unit 14 - LO2
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safety
 
Family online-safety-contract
Family online-safety-contractFamily online-safety-contract
Family online-safety-contract
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 

Viewers also liked

Advert Plan
Advert PlanAdvert Plan
Advert Plan
salesian2016a2
 
Double Page Spread Research 2
Double Page Spread Research 2Double Page Spread Research 2
Double Page Spread Research 2
salesian2016a2
 
Double Page Spread Plan
Double Page Spread PlanDouble Page Spread Plan
Double Page Spread Plan
salesian2016a2
 
Alternative Advert Plan
Alternative Advert PlanAlternative Advert Plan
Alternative Advert Plan
salesian2016a2
 
Double Page Spread Research
Double Page Spread ResearchDouble Page Spread Research
Double Page Spread Research
salesian2016a2
 
Pitch
Pitch Pitch
Evidence
EvidenceEvidence
FOP Nutrition Rating Systems and Symbols_2013
FOP Nutrition Rating Systems and Symbols_2013FOP Nutrition Rating Systems and Symbols_2013
FOP Nutrition Rating Systems and Symbols_2013
Asian Food Regulation Information Service
 
Virtual Plug Script NEW
Virtual Plug Script NEWVirtual Plug Script NEW
Virtual Plug Script NEW
salesian2016a2
 
Channel 4 Branding Test
Channel 4 Branding TestChannel 4 Branding Test
Channel 4 Branding Test
salesian2016a2
 
Calendar for Filming
Calendar for FilmingCalendar for Filming
Calendar for Filming
salesian2016a2
 
Media studies audience feedback questionnaire
Media studies audience feedback questionnaireMedia studies audience feedback questionnaire
Media studies audience feedback questionnaire
heb98
 
Question 4 e finish
Question 4 e finishQuestion 4 e finish
Question 4 e finish
jarrett2
 
Project
ProjectProject
Question 3 - Media Evaluation
Question 3 - Media Evaluation Question 3 - Media Evaluation
Question 3 - Media Evaluation
salesian2016a2
 
Question 4 (1)
Question 4 (1)Question 4 (1)
Question 4 (1)
benfox98
 
Excel 4
Excel 4Excel 4
Excel 4
luguuz
 
Presentation123
Presentation123Presentation123
Presentation123
EmilyGovinden
 
Mag analysis
Mag analysisMag analysis
Mag analysis
salesian2015a2
 
Soap comparative analysis
Soap comparative analysisSoap comparative analysis
Soap comparative analysis
salesian2015a2
 

Viewers also liked (20)

Advert Plan
Advert PlanAdvert Plan
Advert Plan
 
Double Page Spread Research 2
Double Page Spread Research 2Double Page Spread Research 2
Double Page Spread Research 2
 
Double Page Spread Plan
Double Page Spread PlanDouble Page Spread Plan
Double Page Spread Plan
 
Alternative Advert Plan
Alternative Advert PlanAlternative Advert Plan
Alternative Advert Plan
 
Double Page Spread Research
Double Page Spread ResearchDouble Page Spread Research
Double Page Spread Research
 
Pitch
Pitch Pitch
Pitch
 
Evidence
EvidenceEvidence
Evidence
 
FOP Nutrition Rating Systems and Symbols_2013
FOP Nutrition Rating Systems and Symbols_2013FOP Nutrition Rating Systems and Symbols_2013
FOP Nutrition Rating Systems and Symbols_2013
 
Virtual Plug Script NEW
Virtual Plug Script NEWVirtual Plug Script NEW
Virtual Plug Script NEW
 
Channel 4 Branding Test
Channel 4 Branding TestChannel 4 Branding Test
Channel 4 Branding Test
 
Calendar for Filming
Calendar for FilmingCalendar for Filming
Calendar for Filming
 
Media studies audience feedback questionnaire
Media studies audience feedback questionnaireMedia studies audience feedback questionnaire
Media studies audience feedback questionnaire
 
Question 4 e finish
Question 4 e finishQuestion 4 e finish
Question 4 e finish
 
Project
ProjectProject
Project
 
Question 3 - Media Evaluation
Question 3 - Media Evaluation Question 3 - Media Evaluation
Question 3 - Media Evaluation
 
Question 4 (1)
Question 4 (1)Question 4 (1)
Question 4 (1)
 
Excel 4
Excel 4Excel 4
Excel 4
 
Presentation123
Presentation123Presentation123
Presentation123
 
Mag analysis
Mag analysisMag analysis
Mag analysis
 
Soap comparative analysis
Soap comparative analysisSoap comparative analysis
Soap comparative analysis
 

Similar to Prof transcript

Internet safety
Internet safetyInternet safety
Internet safety
jonathancallcott-efc
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
What Is A Good Opening Sentence For Persuasive
What Is A Good Opening Sentence For PersuasiveWhat Is A Good Opening Sentence For Persuasive
What Is A Good Opening Sentence For Persuasive
Vickie Western
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
letsbeginbydoing
 
BAQMaR - Mobile conference
BAQMaR - Mobile conferenceBAQMaR - Mobile conference
BAQMaR - Mobile conference
BAQMaR
 
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
Dana Gardner
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
jameywaughj
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
Project
ProjectProject
Project
adrienewton
 
Reflective Response
Reflective Response Reflective Response
Reflective Response
Ern Marino
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx
marilynnhoare
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
jram2113
 
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveDefcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Heng Guan
 
Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.
Samantha Hall
 

Similar to Prof transcript (20)

Internet safety
Internet safetyInternet safety
Internet safety
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
What Is A Good Opening Sentence For Persuasive
What Is A Good Opening Sentence For PersuasiveWhat Is A Good Opening Sentence For Persuasive
What Is A Good Opening Sentence For Persuasive
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
BAQMaR - Mobile conference
BAQMaR - Mobile conferenceBAQMaR - Mobile conference
BAQMaR - Mobile conference
 
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Project
ProjectProject
Project
 
Reflective Response
Reflective Response Reflective Response
Reflective Response
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveDefcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
 
Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.
 

Recently uploaded

一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
xuqdabu
 
按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理
按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理
按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理
ei8c4cba
 
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
terpt4iu
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
xuqdabu
 
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
yizxn4sx
 
Production.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd ddddddddddddddddddddddddddddddddddProduction.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd dddddddddddddddddddddddddddddddddd
DanielOliver74
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
nudduv
 
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
yizxn4sx
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
uwoso
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
8db3cz8x
 
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginnersSOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SethiLilu
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
2g3om49r
 
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
byfazef
 
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
eydeofo
 
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
uyesp1a
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
xuqdabu
 
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
6oo02s6l
 
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
snfdnzl7
 
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
xuqdabu
 
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
nvoyobt
 

Recently uploaded (20)

一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
 
按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理
按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理
按照学校原版(AU文凭证书)英国阿伯丁大学毕业证快速办理
 
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
 
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
 
Production.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd ddddddddddddddddddddddddddddddddddProduction.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd dddddddddddddddddddddddddddddddddd
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
 
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
 
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginnersSOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
 
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
 
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
 
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
 
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
 
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
 
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
 

Prof transcript

  • 1. PROF. KEITH MARTIN INTERVIEW MVI_9415 0.00 – Hi, could we please have your name. 0.06 – I’m Professor Keith Martin and I’m a professor of information security at Royal Holloway university of London. 0.15 – What is the information security group and its main aims? 0.18 – The information security group is a department here at Royal Holloway so we are about 18 researchers, we teach, research and generally engage in the industry of cyber security or information security. MVI_9416 0.00 – What are the most common threats that we face as the public and how can we combat that? 0.08 – Well I think in terms of threats that we all face you have really good two things to worry about. One is the information that you may have on your devices that you don’t want other people to see or you don’t want other people to misrepresent. The second threat you have got is information used to identify yourself when you do things online on your devices because if someone gets hold of these they can present themselves as you. 0.34 – What tips would you give to somebody who wants to keep their account secure and all their information secure?
  • 2. 0.40 – So in terms of keeping your information secure in case of these threats there are many things you can do, but I would say there are three things you should focus on. So one would be keeping security information secret, so if your basically using pins, passwords or passphrases or you have tokens that you use to access online services. You must remember that they are you so on anything you do, anyone that gets hold of these things can present themselves as you so I think the first thing you do is to keep these safe and don’t share them with anyone. The second thing I would say is to be very very cautious about any information you put out there into cyberspace such as Whatsapp and social media sites because you almost have to assume that anything you say or any information you put into these could at some point in the future get out out there and be discovered so you have to be very very cautious about what information you are putting on there about yourself. I think the third thing is making sure the technologies that you use are as safe as they can reasonably be so we often say keep a clean machine, so in terms of a phone or a laptop or a computer. Make sure you are following all the best practices, you’re installing all the right security software and your keeping software up to date, uploading patches and you’re basically following all the guidelines so you’re not letting your machines deteriorate because the thing is when machines deteriorate or you run old versions then information can leak so I would say it is securing your security information and being cautious about what you put online and keeping a clean machine. 2.15 – Have you had any experience with these examples of information being stolen at the university or any personal experience? 2.24 – So in terms of have we here at Royal Holloway had problems of this type I think the answer is that every organization is suffering problems and I don’t think Royal Holloway has any more problems than any one else but what is very clear to us from the people we speak to and if you follow the news stories you should see as well that are all organizations are prone to problems at the moment and all individuals as well so as individuals we have to be very careful. I think if you ask your friends or speak to colleagues you will discover someone very quickly who has had some difficulties of this type so I think it is very prevalent. MVI_9417 0.00 – Can we all stay one step ahead of criminals? 0.05 – Yeah in some sense there is a sort of game going on all the time, which is to do with threats that we face in cyberspace and the defences we try and put in place and it is certainly true that the defences evolve as the attack factors change I mean as they do for any kind of
  • 3. threat we face in society. You see the way society responds where there is a bad accident like 9/11 or the Paris terrorist attacks, things always change. I don’t think you can ever get on top of that game at all because I think crime will always be around in any society. We are human beings and cyberspace is just a new place where people can conduct crimes, there may be a few different things you can do in cyberspace but it’s still a vector over which people can conduct crimes. I think the biggest problem you have got is that it’s not security of technologies, technologies to a certain extent you can keep on strengthening but these technologies are used by human beings and most of these crimes exploit the fact that it is human beings that are using these machines, they are using phones, they are using computers so most incidents and most criminal attacks will try and exploit that gap that exists between the devices and humans. So for example they will go after passwords or pins or they will trick people into passing over information or we see a lot of the time they may trick people into doing things like giving away information when they shouldn’t. I think you’re never going to stop that activity, wherever there are human beings there will always be crime and unfortunately that’s the world we live in. We make it, we are it. MVI_9418 0.00 – With the threat of account hacking and personal information being stolen should we still trust and use banks, social media websites and online shops? And why so? 0.14 – Okay so it’s a very interesting question that surrounds which services online that we should use in the presence of threats and attacks and I think we have to make a big decision to whether we actually want the value and the advantages of using these services or we don’t. We see organization after organization falling prone to things, most recently here in the UK we saw a big incident involving the supplier of talk talk for example. Should we trust a particular bank, should we trust a particular phone company and I think it’s just very much us that have to decide these questions for ourselves based on all the information we use. I mean why should you put your money in a particular bank, should you use a particular phone service provider. You might well use stories you have heard about them to decide whether they have good online security, you might use stories you hear about their chairman or their shareholders or other aspects of their business. The one thing we can’t do is we can’t be 100% safe dealing with organizations like that, we have to make a decision and it’s a personal decision of what organizations we trust and which ones we don’t. Because it’s a very important part that when you do use a bank or you use a phone company you are trusting them to an extent with the information you are providing and the data you are providing and it’s ultimately your call, you base it on their reputation and how much you want their services at the prices they are offering you. So yes I think we should be trusting banks, we should be trusting mobile phone companies but it’s up to us as individuals which ones we decide to do business with.