Your browser doesn't support the features required for this presentation, so you are presented with a simplified version.
For the best experience please use the latest Chrome, Safari or Firefox browser.
Security Research
School of Computer Science
PROTECT Research Centre
Security?
Who can access what and how?
Creating mechanisms to enforce this
Security doesn't exist on its own; needs to be applied in a context
Security and forensics
Security: hypothetical
Help enforce the security requirements
Understand if something is secure
Forensics: historical
Who accessed what and how?
Often circumventing security