This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Cambridge"

From OWASP
Jump to: navigation, search
(Local News)
(Local News)
Line 5: Line 5:
 
==='''Local News'''===
 
==='''Local News'''===
  
'''OWASP Cambridge Chapter Secure Coding Tournament and Seminar Event'''  
+
== '''Joint BCS DevSecOps/Cybercrime Forensics SGs and OWASP Cambridge “Social Media & Faux News Forensics” Mini Conference''' ==
  
Tuesday 12th September 2017 17:00 – 21:00, Coslett Building COS404/405 & COS124, Anglia Ruskin University, Cambridge.
+
=== Wednesday 11<sup>th</sup> October 2017 13:00 – 18:30, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge. ===
 +
Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, British Computer Society (BCS) DevSecOps & Cybercrime Forensics Special Internet Group’s and OWASP (Open Web Application Security Project) Cambridge Chapter
  
Hosted by the Cyber Security & Networking Research Group (Department of Computing & Technology), Anglia Ruskin University & OWASP (Open Web Application Security Project) Cambridge Chapter
+
As the digital world we knew continues to endlessly evolve, we must continue to adapt how we conduct cyber investigations. Evidence sources continue to grow rapidly.  If we fail to keep up, the collection and validation of evidence during a cyber investigation will become a much more fraught task. For those investigators with a thorough understanding of how to leverage improvements in technology combined with the growing wealth of information available online,  the evidence extracted during a digital forensic investigation ultimately created a more solid case.
  
Secure Code Warrior kindly sponsoring tournament and T-Shirt/Hoodies as Prizes.
+
Cyber investigations involving social media and social networks are becoming the norm. With new applications, links, techniques, and roadblocks discovered daily, social networks are rapidly progressing. Common platforms like Facebook, Twitter, and LinkedIn are becoming a smaller part of an ever growing and changing landscape. There are also many other evolving and changing social networks like Google Plus, Quora, Instagram, Groupon, Pinterest, and LoveIt and that’s not even counting the thousands of blogs and special interest forums that exist
  
OWASP Cambridge sponsoring the Beer, OWASP Swag and Other Prizes
+
With so much relevant evidence available on social media. there are also many new issues which are different from what investigators have traditionally dealt with in traditional digital forensics. In the past digital forensics investigators understood the terms and conditions for extracting digital evidence from a piece of hardware in the possession of the investigator, such as a computer hard drive or the flash memory on a smartphone.  The evidence obtained could easily be corroborated by a third party  if someone challenged how investigators had carried their work, a third party could easily corroborate the findings by reviewing the same hard drive which the investigator kept in an evidence store however this is certainly not the case with social media...
  
Pizza kindly sponsored by Anglia Ruskin and Others TBD
+
An alarming phenomenon of this rise in social media use is the growth of “faux or fake news” issue.  While this concept has many synonyms - disinformation campaigns, cyber propaganda,  cognitive  hacking, and  information  warfare - it’s  just one  facet  of  a much larger  problem:  the manipulation of public opinion to affect the real world.  Due to global digital connectivity and platforms making it possible to share and spread information, traditional challenges such as physical borders and time/distance constraints no longer exist.
  
'''OWASP Cambridge – Secure Coding Tournament'''
+
Even Mark Zuckerberg (CEO, Facebook) posted on his blog on Facebook on 21st September <nowiki>https://www.facebook.com/zuck/posts/10104052907253171?comment_id=356886588097117</nowiki> about the large scale alleged fake news stories being published during last year’s US presidential election and the importance of  this issue to protecting the security of the democratic process ....
  
Compete against your peers to become the ‘Secure Code Warrior.
+
Fake news is the promotion and propagation of news  articles  via social  media. These articles  are promoted  in  such  a  way that  they  appear to  be  spread by other users, as opposed to being paid-for advertising. The news stories distributed are designed to influence or manipulate users’ opinions on a certain topic towards certain objectives.  For example, by manipulating the balance of how a particular topic is reported (whether that concerns politics, foreign affairs or something  more commercial),  the views  on  that  topic can  be  changed. This can be done either with inaccurate facts or with accurate ones twisted to favour a particular view or side.
  
'''''OWASP Cambridge Secure Coding Champion 2017.'''''
+
'''Background'''  
  
'''Secure Coding tournament – what is it all about?'''
+
BCS DevSecOps Group fosters the awareness of tools and technologies regarding the acceleration and automation of code development to deployment, known as DevOps.  It is both a work culture and complex, rapidly evolving toolchains both difficult to introduce and use effectively. It covers cultural, technical, management and security aspects.
  
Join this live interactive tournament which is sure to be a fun, challenging learning experience for all.  Whether you are eager to prove your web application AppSec knowledge of the OWASP Top 10 and more…. and watch as you climb to the top of the leaderboard or simply want to learn more about how to code more securely – everyone is welcome and there will be prizes / SWAG for the winner(s). 
+
The British Computer Society (BCS) Cybercrime Forensics Special Interest Group (SIG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, lawyers, law enforcement officers, academics and those interested in the use of Cybercrime Forensics and the need to address cybercrime for the benefit of those groups and of the wider public.
  
Participants are presented with any of three kinds of vulnerable code challenges - identify the problem, locate the insecure code, and fix the vulnerability. Gamification helps
to make the exercise a fun, engaging and interactive experience. Participants can select from various software languages to complete the tournament, including:
+
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.
  
Java EE, Java Spring, C# MVC, C# WebForms, Ruby on Rails, Python Django & Node.Js.  
+
The '''Cyber Security and Networking''' ('''CSN''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP & the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment. These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.
  
'''Who should take part?'''
+
=== '''Speaker Abstracts & Biographies''' ===
  
Any developer with an interest in secure coding!
+
'''Dr Char Sample – Data Infidelity and Fake News: Software Security’s Soft Underbelly?'''
  
In past tournaments, developers from varying levels of experience, skill levels and various job roles have competed, but all have a common interest in security and the future of security.
+
'''Biography - Dr Char Sample'''
  
The aim of this event is to connect the OWASP Cambridge Chapter in a more open and engaging setting. Security experts will be on-hand to chat and help people during the event.
+
Dr Char Sample is cyber security researcher and fellow at ICF International, in Maryland, U.S. Her prior work includes as security solutions engineer with CERT, Carnegie-Mellon; and International Fellow at Warwick University.
  
Guaranteed to be a fun and insightful evening!
+
Dr Sample is an academically and professionally experienced cyber security professional with over 19 years of experience in network security and software engineering. Her internet security experiences include threat intelligence research, cloud computing, security metrics, expertise with firewalls, IDS, IPS, Anomaly Detection, DNS, DNSSEC, Mail, routing, authentication, encryption, secure network architectures, cloud computing (IaaS, PaaS) and Unix internals.   Dr Sample is internationally recognized as the leading expert in quantitative cultural cyber threat intelligence. Her publications include both academic and industry conferences and journals.
  
'''Why should I take part?'''
+
'''Abstract'''
  
Becoming the first ever OWASP Cambridge Secure Code Champion should be enough to whet the appetite. However, there will also be prizes, pizza and beer on hand. It is a great opportunity to test your skill levels and have fun on the Secure Code Warrior platform, connect with like-minded folks interested in secure coding and get industry insight from Peter Lawrey’s keynote speech – all free of charge.
+
Bad data can create more than just 'fake news.' Expert Dr Char Sample explains how cognitive hacking and weaponized information can undermine enterprise security.
  
'''Why is Secure Coding a big deal?'''
+
One of the major security stories from the 2016 US Presidential election was not the breach of voter databases, the suspected hacking of the voting machines or even the vote counting. The biggest security story was the use of weaponized information in support of cognitive hacking, defined in a 2002 Dartmouth College research paper as a cyberattack designed to change human users' perceptions and corresponding behaviors.
  
If you look at some of the most significant breaches over the last four years, Capgemini, Amazon, Yahoo and more locally the NHS, the common attack vector was vulnerable code. The striking reality is that these were not zero day vulnerabilities with no immediate remediation’s, these attacks targeted known vulnerabilities with known remediation.
+
Disregarding the political dimensions of  elections, the real reason for this interest is that security software is vulnerable to the same problem. That is, the data entered into security products, whether by a human or a machine, is trusted to be a faithful representation of reality.
  
As companies move to more agile development, more and more code releases occur daily, if not, on an hourly basis. It is paramount that developers writing the code become the first line of defense. But, for this to happen, developers must build their secure coding skillset. Once a developer builds those skills, they will start to write less vulnerabilities and reduce the possible attack surface of their organisation. From an agility and cost point of view, if less vulnerabilities are included from the start of the SDLC, the organization can save money and precious time – truly enabling agile performance.
+
'''Dennis Ivory and Dr Diane Gan - Your Personal Information Stolen In Under 2 Minutes'''
  
'''Prizes:'''
+
'''Biography – Dennis Ivory'''  
  
1<sup>st</sup> Prize Raspberry Pi Kit, Hoodie & OWASP Swag (TBD)
+
Dennis Ivory recently graduated with a first class degree in BSc Computer Security and Digital Forensics from the University of Greenwich. He is currently employed as a post-graduate researcher within the Department of Computing and Information Systems, where he is undertaking research with the Cyber-SAFE security research team into security issues in the Internet of Everything.
  
2<sup>nd</sup> Prize Hoodie/T Shirt & OWASP Swag
+
'''Abstract'''
  
Plus Other T-Shirts
+
One of the single biggest threats to personal security is a targeted social engineering attack. Attackers are becoming more sophisticated at tricking people into giving away their personal details by using these types of attacks gained from information harvested from social media (Twitter, Facebook, etc.). More people than ever have an online presence, with 2.34bn people (37% of the world population) now using some form of social media [Statista. 2017]. Many of these users are either new to these platforms or are unaware of the seriousness of adding a lot of personal information about themselves on, for example, their Facebook page. This research set out to determine how people perceive their own online privacy and how this relates to what is actually available to anyone searching about them online who had no connection with them via their social media sites.
  
Student 1<sup>st</sup> Prize
+
A survey was conducted to identify how individuals perceived their own online security and to determine what they had knowingly published online. There were 252 volunteer responders. The vast majority of these volunteers were students at the University of Greenwich but only 43% were studying computing degrees. The split of female (58%) to male (42%) participants was reasonably balanced and the largest age range was 18 to 23, as expected in a university population. The second phase of this work was to investigate what information could actually be found online about each of these participants. Searches were conducted on each person using Facebook, Twitter and the Google search engine. The fastest search found the subject’s full name, picture and the places that they had visited in the last few days in 14 seconds. The vast majority of these investigations (166) took less than 2 minutes to gain access to a significant amount of the subject’s personal information, including details which they did not think could be found online. This presentation presents the results of this experiment.
  
Free Entry to Cambridge Wireless’s “Inclusive Innovation Conference” 19<sup>th</sup> September at the Bradfield Centre, Cambridge Science Park (worth £75)
+
'''Stuart Clarke – Nuix - Relationship Centric Data Analysis using Social Media and Other Forensic Sources'''
  
<nowiki>http://www.cambridgewireless.co.uk/InclusiveInnovation/</nowiki>
+
'''Biography – Stuart Clarke'''
  
Many other Prizes!!
+
Stuart is an internationally respected information security expert who is responsible for the overall security and intelligence strategy and delivery at Nuix. During his time at the company, Stuart has advised the United Nations’ peak cybersecurity body ITU and provided cybersecurity training for over 60 computer emergency response teams. He led the development of Nuix Investigation & Response, an innovative investigative tool used to delve into the causes and scope of data breaches. He also currently leads the development of Nuix Insight Analytics & Intelligence, a powerful security intelligence platform.
  
'''Please ensure you bring your laptop (not a tablet) to take part.'''
+
Stuart has a deep understanding of the Nuix technology and capabilities. Prior to joining Nuix, he used Nuix offerings extensively in breach response. He brings that understanding together with a vision for the cybersecurity needs of Nuix’s current and prospective clients. He holds a Bachelor of Science degree with honors in Computer Forensics and a Master’s Degree in Business Administration. He has developed and delivered training for a Master of Science program in Computer Security and Forensics, has contributed to a book covering evidence preservation as well as published several industry-recognized white papers.
  
'''Presentation'''
+
'''Abstract'''
  
'''Guest Speaker: Peter Lawrey – CEO at Higher Frequency Trading Ltd & Chronicle Software'''
+
The traditional item centric and linear approach to digital evidence is effective, however is straining under the ever-increasing volume and variety of data that individuals generate. Social media and mobile data is now overtaking traditional computer based sources of evidence and it is becoming key for forensic investigators to correlate disparate pieces of information that reveal a bigger picture.
  
'''Biography: Peter Lawrey'''
+
This session will explore how relationship centric analysis can accelerate investigations and provide a deeper level of visibility and understanding of various investigative scenarios. We will see how analysts can use advanced technologies to find hidden connections from something as simple as an account handle or alias and turn what’s outwardly disparate into a clear picture. 
  
 Peter Lawrey likes to inspire developers to improve the craftmanship of their solutions, engineer their systems for simplicity and performance, and enjoy their work more by being creative and innovative.
+
'''Dominic Connor – The Register Columnist - Fake News in the Press'''
  
He has a popular blog “Vanilla Java” which gets 120K page views per months, is 3rd on StackOverflow.com for [Java] and 2nd for [concurrency], and is lead developer of the OpenHFT project which includes support for off heap memory, thread pinning and low latency persistence and IPC (as low as 100 nano-seconds)
+
'''Biography -  Dominic Connor'''
  
'''Abstract – “Secure Coding Challenges ” TBC'''
+
Dominic is a regular contributor to The Register, vice Chairman of the Conservative Science & Technology Forum and President of the Real Time Club.
  
'''Background'''
+
At some point he has done nearly every job in IT including reviewing Microsoft operating system code, directing the secure wide area network for HM Treasury, writing questionable Excel macros for major banks, teaching C++ and Python, building PCs, selling technology, AI, printing Teflon circuit boards, compiler development and expert witness in cases of rogue code in financial markets.
  
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organisation focused on improving the security of application software. Their mission is to make application security visible, so that people and organisations can make informed decisions about true application security risks.
+
=== '''Provisional Agenda''' ===
 +
13:00 – 14:00 Registration & Refreshments (LAB006)
  
The '''Cyber Security and Networking (CSN)''' research group has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organizations such as OWASP, BCS, ISC2, IISP & the UK Cyber Security Forum amongst others. The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber-attacks and educate its users for a more secure cyberspace and operational business environment.  These will be achieved through the investigation of threats posed to information systems, understanding the impact of attacks and creation of cyber-based warning systems which include gathering threat intelligence, automate threat detection, alert users and neutralize attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.
+
14:00 – 14:05 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security & Networking Research Group, Anglia Ruskin University
  
The Department of Computing & Technology at Anglia Ruskin University is enhancing its curricula and capabilities in information security following its successful BSc(Hons) Information Security and Forensic Computing pathway. Establishing a joint professional networking group with OWASP concentrating on aspects of computing and application security is a key part of this enhancement. A key aim the department is working towards is developing a MSc Information Security specialising in Application Security and as part of this activity looking to develop and a local Information Security Student Society.
+
14:05 – 14:55 Dr Char Sample - Data Infidelity and Fake News: Software Security’s Soft Underbelly?
  
'''Agenda'''
+
14:55 – 15:45 Dr Diane Gan & Dennis Ivory – Your Personal Information Exposed in under 2 Minutes
  
17:00 17:45: Pizza/Beer & Networking in COS 404/405
+
15:45 16:15 Refreshments, Networking & Industry Demo’s
  
17:45 18:00: Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University
+
16:15 - 17:00 Dominic Connor Fake News in the Press
  
18:00 – 18.45: Talk from Peter Lawrey CEO of Higher Frequency Trading Ltd & Chronicle Software
+
17:00 – 17:45 Stuart Clarke – Nuix - Relationship Centric Data Analysis using Social Media and Other Forensic Sources
  
18:45 – 19.00: Registration/on-boarding of participants to the SCW platform.
+
17:45 – Round up 
  
19:00 – 21.00* Tournament
+
=== '''Registration & Arrival''' ===
 +
Please register online using the following URL:
  
•15 minutes at end to wrap up and hand out prizes
+
https://www.eventbrite.com/e/bcs-devsecopscybercrime-forensics-owasp-cambridge-social-media-faux-news-forensics-conference-tickets-37915130175
  
'''Registration'''
+
The meeting will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).
 
 
To register for this free event, please register online [https://www.eventbrite.com/e/owasp-cambridge-chapter-securing-coding-tournament-and-seminar-event-tickets-37160302465 here]
 
 
 
The networking and refreshments will be held in Coslett Building (Room COS404/405 on the 4<sup>th</sup> Floor) whilst the following talk and tournament will be held in the Coslett Building Large Lecture theatre, Room COS124
 
  
 
Please enter through the Helmore Building and ask at reception.
 
Please enter through the Helmore Building and ask at reception.
  
There will be a reception desk on the ground floor of Coslett Building
+
Anglia Ruskin University
 
 
Anglia Ruskin University,
 
  
 
Cambridge Campus
 
Cambridge Campus
Line 123: Line 120:
 
CB1 1PT
 
CB1 1PT
  
Get further information on travelling to the university [http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/ca&#x20;mbridge_campus/find_cambridge.html here] .
+
Please note that there is no parking on campus.
Get further information on travelling to the university.
 
 
To find the Cambridge East Road Campus please see the following [http://www.anglia.ac.uk/~/media/Files/campus-and-city-maps/cambridge-city-centre-map.pdf?la=en map]
 
  
The Coslett building is at the rear of the campus, also accessible from the Mill Road entrance ([http://www.anglia.ac.uk/~/media/Files/campus-and-city-maps/cambridge-campus-map-jul2017.pdf?la=en see campus map]).
+
<nowiki>http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/ca</nowiki> mbridge_campus/find_cambridge.html
  
 
----
 
----
Line 134: Line 129:
 
|Cambridge_OWASP  Event 20170927 - Secure Coding Challenge
 
|Cambridge_OWASP  Event 20170927 - Secure Coding Challenge
 
|11/09/2017
 
|11/09/2017
|-
 
|Cambridge_OWASP Event 20171010 - Web Application  Firewalls
 
|03/10/2017
 
 
|-
 
|-
 
|Cambridge_OWASP/BCS Cybercrime Forensics & Social Media  Forensics Day Event  
 
|Cambridge_OWASP/BCS Cybercrime Forensics & Social Media  Forensics Day Event  
Line 174: Line 166:
 
! width="350" | Name / Title
 
! width="350" | Name / Title
 
! width="300" | Link
 
! width="300" | Link
 +
|-
 +
|12 September 2017
 +
|John Fitzgerald - Secure Code Warrior
 +
|
 
|-
 
|-
 
| 4 April 2017
 
| 4 April 2017

Revision as of 19:12, 7 October 2017

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Local News

Joint BCS DevSecOps/Cybercrime Forensics SGs and OWASP Cambridge “Social Media & Faux News Forensics” Mini Conference

Wednesday 11th October 2017 13:00 – 18:30, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge.

Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, British Computer Society (BCS) DevSecOps & Cybercrime Forensics Special Internet Group’s and OWASP (Open Web Application Security Project) Cambridge Chapter

As the digital world we knew continues to endlessly evolve, we must continue to adapt how we conduct cyber investigations. Evidence sources continue to grow rapidly.  If we fail to keep up, the collection and validation of evidence during a cyber investigation will become a much more fraught task. For those investigators with a thorough understanding of how to leverage improvements in technology combined with the growing wealth of information available online,  the evidence extracted during a digital forensic investigation ultimately created a more solid case.

Cyber investigations involving social media and social networks are becoming the norm. With new applications, links, techniques, and roadblocks discovered daily, social networks are rapidly progressing. Common platforms like Facebook, Twitter, and LinkedIn are becoming a smaller part of an ever growing and changing landscape. There are also many other evolving and changing social networks like Google Plus, Quora, Instagram, Groupon, Pinterest, and LoveIt and that’s not even counting the thousands of blogs and special interest forums that exist

With so much relevant evidence available on social media. there are also many new issues which are different from what investigators have traditionally dealt with in traditional digital forensics. In the past digital forensics investigators understood the terms and conditions for extracting digital evidence from a piece of hardware in the possession of the investigator, such as a computer hard drive or the flash memory on a smartphone.  The evidence obtained could easily be corroborated by a third party  if someone challenged how investigators had carried their work, a third party could easily corroborate the findings by reviewing the same hard drive which the investigator kept in an evidence store however this is certainly not the case with social media...

An alarming phenomenon of this rise in social media use is the growth of “faux or fake news” issue.  While this concept has many synonyms - disinformation campaigns, cyber propaganda,  cognitive  hacking, and  information  warfare - it’s  just one  facet  of  a much larger  problem:  the manipulation of public opinion to affect the real world.  Due to global digital connectivity and platforms making it possible to share and spread information, traditional challenges such as physical borders and time/distance constraints no longer exist.

Even Mark Zuckerberg (CEO, Facebook) posted on his blog on Facebook on 21st September https://www.facebook.com/zuck/posts/10104052907253171?comment_id=356886588097117 about the large scale alleged fake news stories being published during last year’s US presidential election and the importance of  this issue to protecting the security of the democratic process ....

Fake news is the promotion and propagation of news  articles  via social  media. These articles  are promoted  in  such  a  way that  they  appear to  be  spread by other users, as opposed to being paid-for advertising. The news stories distributed are designed to influence or manipulate users’ opinions on a certain topic towards certain objectives.  For example, by manipulating the balance of how a particular topic is reported (whether that concerns politics, foreign affairs or something  more commercial),  the views  on  that  topic can  be  changed. This can be done either with inaccurate facts or with accurate ones twisted to favour a particular view or side.

Background

BCS DevSecOps Group fosters the awareness of tools and technologies regarding the acceleration and automation of code development to deployment, known as DevOps.  It is both a work culture and complex, rapidly evolving toolchains both difficult to introduce and use effectively. It covers cultural, technical, management and security aspects.

The British Computer Society (BCS) Cybercrime Forensics Special Interest Group (SIG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, lawyers, law enforcement officers, academics and those interested in the use of Cybercrime Forensics and the need to address cybercrime for the benefit of those groups and of the wider public.

OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.

The Cyber Security and Networking (CSN) Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP & the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment. These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.

Speaker Abstracts & Biographies

Dr Char Sample – Data Infidelity and Fake News: Software Security’s Soft Underbelly?

Biography - Dr Char Sample

Dr Char Sample is cyber security researcher and fellow at ICF International, in Maryland, U.S. Her prior work includes as security solutions engineer with CERT, Carnegie-Mellon; and International Fellow at Warwick University.

Dr Sample is an academically and professionally experienced cyber security professional with over 19 years of experience in network security and software engineering. Her internet security experiences include threat intelligence research, cloud computing, security metrics, expertise with firewalls, IDS, IPS, Anomaly Detection, DNS, DNSSEC, Mail, routing, authentication, encryption, secure network architectures, cloud computing (IaaS, PaaS) and Unix internals.   Dr Sample is internationally recognized as the leading expert in quantitative cultural cyber threat intelligence. Her publications include both academic and industry conferences and journals.

Abstract

Bad data can create more than just 'fake news.' Expert Dr Char Sample explains how cognitive hacking and weaponized information can undermine enterprise security.

One of the major security stories from the 2016 US Presidential election was not the breach of voter databases, the suspected hacking of the voting machines or even the vote counting. The biggest security story was the use of weaponized information in support of cognitive hacking, defined in a 2002 Dartmouth College research paper as a cyberattack designed to change human users' perceptions and corresponding behaviors.

Disregarding the political dimensions of  elections, the real reason for this interest is that security software is vulnerable to the same problem. That is, the data entered into security products, whether by a human or a machine, is trusted to be a faithful representation of reality.

Dennis Ivory and Dr Diane Gan - Your Personal Information Stolen In Under 2 Minutes

Biography – Dennis Ivory

Dennis Ivory recently graduated with a first class degree in BSc Computer Security and Digital Forensics from the University of Greenwich. He is currently employed as a post-graduate researcher within the Department of Computing and Information Systems, where he is undertaking research with the Cyber-SAFE security research team into security issues in the Internet of Everything.

Abstract

One of the single biggest threats to personal security is a targeted social engineering attack. Attackers are becoming more sophisticated at tricking people into giving away their personal details by using these types of attacks gained from information harvested from social media (Twitter, Facebook, etc.). More people than ever have an online presence, with 2.34bn people (37% of the world population) now using some form of social media [Statista. 2017]. Many of these users are either new to these platforms or are unaware of the seriousness of adding a lot of personal information about themselves on, for example, their Facebook page. This research set out to determine how people perceive their own online privacy and how this relates to what is actually available to anyone searching about them online who had no connection with them via their social media sites.

A survey was conducted to identify how individuals perceived their own online security and to determine what they had knowingly published online. There were 252 volunteer responders. The vast majority of these volunteers were students at the University of Greenwich but only 43% were studying computing degrees. The split of female (58%) to male (42%) participants was reasonably balanced and the largest age range was 18 to 23, as expected in a university population. The second phase of this work was to investigate what information could actually be found online about each of these participants. Searches were conducted on each person using Facebook, Twitter and the Google search engine. The fastest search found the subject’s full name, picture and the places that they had visited in the last few days in 14 seconds. The vast majority of these investigations (166) took less than 2 minutes to gain access to a significant amount of the subject’s personal information, including details which they did not think could be found online. This presentation presents the results of this experiment.

Stuart Clarke – Nuix - Relationship Centric Data Analysis using Social Media and Other Forensic Sources

Biography – Stuart Clarke

Stuart is an internationally respected information security expert who is responsible for the overall security and intelligence strategy and delivery at Nuix. During his time at the company, Stuart has advised the United Nations’ peak cybersecurity body ITU and provided cybersecurity training for over 60 computer emergency response teams. He led the development of Nuix Investigation & Response, an innovative investigative tool used to delve into the causes and scope of data breaches. He also currently leads the development of Nuix Insight Analytics & Intelligence, a powerful security intelligence platform.

Stuart has a deep understanding of the Nuix technology and capabilities. Prior to joining Nuix, he used Nuix offerings extensively in breach response. He brings that understanding together with a vision for the cybersecurity needs of Nuix’s current and prospective clients. He holds a Bachelor of Science degree with honors in Computer Forensics and a Master’s Degree in Business Administration. He has developed and delivered training for a Master of Science program in Computer Security and Forensics, has contributed to a book covering evidence preservation as well as published several industry-recognized white papers.

Abstract

The traditional item centric and linear approach to digital evidence is effective, however is straining under the ever-increasing volume and variety of data that individuals generate. Social media and mobile data is now overtaking traditional computer based sources of evidence and it is becoming key for forensic investigators to correlate disparate pieces of information that reveal a bigger picture.

This session will explore how relationship centric analysis can accelerate investigations and provide a deeper level of visibility and understanding of various investigative scenarios. We will see how analysts can use advanced technologies to find hidden connections from something as simple as an account handle or alias and turn what’s outwardly disparate into a clear picture. 

Dominic Connor – The Register Columnist - Fake News in the Press

Biography -  Dominic Connor

Dominic is a regular contributor to The Register, vice Chairman of the Conservative Science & Technology Forum and President of the Real Time Club.

At some point he has done nearly every job in IT including reviewing Microsoft operating system code, directing the secure wide area network for HM Treasury, writing questionable Excel macros for major banks, teaching C++ and Python, building PCs, selling technology, AI, printing Teflon circuit boards, compiler development and expert witness in cases of rogue code in financial markets.

Provisional Agenda

13:00 – 14:00 Registration & Refreshments (LAB006)

14:00 – 14:05 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security & Networking Research Group, Anglia Ruskin University

14:05 – 14:55 Dr Char Sample - Data Infidelity and Fake News: Software Security’s Soft Underbelly?

14:55 – 15:45 Dr Diane Gan & Dennis Ivory – Your Personal Information Exposed in under 2 Minutes

15:45 – 16:15 Refreshments, Networking & Industry Demo’s

16:15 - 17:00 Dominic Connor – Fake News in the Press

17:00 – 17:45 Stuart Clarke – Nuix - Relationship Centric Data Analysis using Social Media and Other Forensic Sources

17:45 – Round up 

Registration & Arrival

Please register online using the following URL:

https://www.eventbrite.com/e/bcs-devsecopscybercrime-forensics-owasp-cambridge-social-media-faux-news-forensics-conference-tickets-37915130175

The meeting will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).

Please enter through the Helmore Building and ask at reception.

Anglia Ruskin University

Cambridge Campus

East Road

Cambridge

CB1 1PT

Please note that there is no parking on campus.
Get further information on travelling to the university.

http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/ca mbridge_campus/find_cambridge.html


Planned dates for upcoming events

Cambridge_OWASP Event 20170927 - Secure Coding Challenge 11/09/2017
Cambridge_OWASP/BCS Cybercrime Forensics & Social Media Forensics Day Event 11/10/2017
Cambridge_OWASP & BCS East Anglia Event - GDPR Evening 07/11/2017
Cambridge_OWASP & UK Cyber Security Forum GDPR Event 20171115 15/11/2017
Cambridge_OWASP Event 20171205 05/12/2017
Cambridge_OWASP & BCS Cybercrime Forensics/IoT Forensics Security Day 20180110/11 10/01/2018 or 11/01/2018
Cambridge_OWASP & UK Cyber Security Forum Cyber Machine Learning Day 20180118/19 18/01/2018,
Cambridge_OWASP Event 13/02/2018
Cambridge_OWASP Event 13/03/2018
Cambridge_OWASP Event 10/04/2018
Cambridge_OWASP Event 08/05/2018
Date Name / Title Link
12 September 2017 John Fitzgerald - Secure Code Warrior
4 April 2017 Leum Dunn - Redacted presentation
7 March 2017 Andrew Thompson - Checkmarx presentation
7 March 2017 John Haine IoT Security Foundation (Chair) presentation
25 Jan 2017 Nick Alston CBE / PIER Chair presentation
25 Jan 2017 Mark Pearce/ 7Safe/PA Consulting presentation
25 Jan 2017 Martin Cassey / Nascenta presentation
25 Jan 2017 Paul Rowley FBCS / Havebury Housing Association presentation
25 Jan 2017 Laurence Kaleman / Legal Director, Olswang presentation
25 Jan 2017 Tony Drewitt / Head of Consultancy - IT Governance presentation
19 Jan 2017 Tony Drewitt / Head of Consultancy - IT Governance presentation
19 Jan 2017 Peter Yapp / NCSC Deputy Director - Incident Response presentation
19 Jan 2017 Martin Cassey / Nascenta presentation
10 Nov 2016 Graham Rymer / University of Cambridge
10 Nov 2016 Mark Wickenden
12 05 2016 Phil Cobley / Modern Policing & the Fight Against Cyber Crime presentation
12 05 2016 Jules Pagna Disso / Building a resilient ICS presentation
08 03 2016 Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence
10 11 2015 Steve Lord / Trying (and failing) to secure the Internet of Things
John Mersh / Software and System Security: a life vest in the IoT ocean
10 Oct 2015 Sumit "sid" Siddharth / Some neat, new and ridiculous hacks from our vault
10 Feb 2015 Steven van der Baan / Web Application Security Testing with Burp Suite
2 December 2014 Colin Watson / OWASP Cornucopia
21 October 2014 Eireann Leverett presentation
1st April 2014 Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
Yiannis Chrysanthou (KPMG) / Modern Password Cracking
Damien King (KPMG) / Filename Enumeration with TildeTool
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations presentation
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation