Cyber Security

Be aware of cyber security risks

October each year is Cyber Security Awareness month, though really every month should be cyber security awareness month! Here you can find a selection of CS4FN articles covering different aspects of keeping everyone safe online and protecting your data.

See films through a computer scientist’s eyes and find out about Cyber Security at the Movies, or read a selection of our articles (or download Issue 24 of the CS4FN magazine which is all about cyber security). We’ve also linked to some information about example jobs in this area – the job adverts are closed but the information is preserved so that people can see examples of what cyber security specialists do.

Cyber Security at the Movies

Rogue One: Physical Security

In a galaxy far, far away cyber security matters quite a lot. So much so, in fact, that the whole film Rogue One is about it. The plot is all about the bad guys trying to keep their plans secret, and the good guys trying to steal them.. and there is only a story to tell at all because the Empire used physical security…. (read on)

Rogue One: Authentication

In a galaxy far, far away cyber security matters. So much so, that the whole film Rogue One is about it. Part of the key to keeping the Death Star plans secret is good authentication… (read on)

Guardians of the Galaxy: Fail Secure Software

If you are so power hungry you can’t stand the idea of any opposition; if you want to make a grab for total power, so decide to crush everyone in your way, then you might want to think about the security of your power supply first. Luckily, all would-be dictators who crush everyone who gets in their way as they march towards total domination of the galaxy, tend to be very naive about cyber-security. Take Ronan the Accuser in the original Guardian of the Galaxy …. (read on)



He attacked me with a dictionary!

A jumble of unreadable lettters

Using simple rules like adding capitals, digits and special symbols in a simple way still makes for weak passwords as does using words from fantasy worlds because they can be attacked with a big dictionary…(read on)

The cyber security honeypot

To catch criminals, whether old-fashioned ones or cybercriminals, you need to understand the criminal mind. You need to understand how they think and how they work. Jeremiah Onaolapo, as a PhD student at UCL, created cyber-honeypots and finding out how cybercriminals really operate…(read on)

Cryptography: you are what you know

A path through the forest at dawn in the fog

The trouble with using spy novel style passphrases to prove who you are is you still have to trust the other person. If they might have nefarious intentions, you want to prove who you are without giving anything else away. You certainly don’t want them to be able to take the information you give and use it to pretend to be you…(read on)

Ninja White Hat Hacking

Professional woman behind computer screen

Hackers cause lots of harm and mayhem. Not all hackers are bad though. Some, called white hat hackers, are ethical hackers, paid by companies to test their security by actively trying to break in – it’s called penetration testing. It’s not just business though, it was also turned into a card game….(read on)

Shafi Goldwasser and the Zero Knowledge Proof

Tunnel made from books

Shafi Goldwasser is one of the greatest living computer scientists, having won the Turing Award in 2012 (equivalent to a Nobel Prize). Her work helped turn cryptography from a dark art into a science. If you’ve ever used a credit card through a web browser, for example, her work was helping you stay secure. Her greatest achievement, with Silvio Micali and Charles Rackoff, is the “Zero knowledge proof”…(read on)

I know where your cat lives

Governments pass laws to protect their citizens’ privacy. They outlaw reading email, listening in to phone calls and accessing data without permission or a court order. If you really care about privacy though, you need to protect your ‘metadata’ too: data about data. The police and security services can learn a lot from metadata when they put their minds to it. Anyone else with access can too. You need to take care of yours (and that of your cat)…(read on)

Every breath you take: reclaim the Internet

The 1983 hit song by the Police “Every breath you take” is up there in the top 100 pop songs ever. It seems a charming love song, and some couples even treat it as “their” song, playing it for the first dance at their wedding. Some of the lyrics “Every single day…I’ll be watching you”, if in a loving relationship, might be a good and positive thing. As the Police’s Sting has said though, the lyrics are about exactly the opposite….(read on)


Related Careers

Careers related to this article include:

  • Security Analyst
    • Responsible for identifying threats, setting up systems to protect against them, identifying breaches if they do occur and preventing harm resulting from them
  • Cyber Security Researcher
    • Responsible for conducting research in cyber security such as understanding new and future threats, and developing new ways to protect systems from threats,

Examples of PAST jobs (closed) advertised in cyber security

Note that these jobs are CLOSED (the first closed in March 2024, the second in April 2024) but a copy of the job advert, job description and person specification (where available) are preserved so that you can see a couple of examples of the types of roles people might do in this area.

A job advert lets an organisation tell that they have a new job available, a job description (also known as a ‘JD’) describes what they want the person who gets the job to actually do and a person specification (or ‘PS’) says what skills and experience an ideal applicant might need in order to do the job. Sometimes these are separate PDF documents to download but more usually the JD and PS are combined into one PDF document, and sometimes combined with the job advert too, with all the information just listed on the web page.

This job closed in March 2024
This job closed in April 2024


Related Magazine …

Contents: Credit card fraud, tinkering with DNA, Shafi Goldwasser and Zero Knowledge, A phishing story, the Cyber Security Honeypot, I know where your cat lives, your regular supermarket might know too much, cyber security at the movies – Rogue One (authentication), covert channels and card tricks, hiding in Elizabethan binary, piracy on the open wi-fi, WannaCry ransomware, password dictionary cracking, how to vanish, Pokémon lost, Back Page (under the duvet).


Subscribe to be notified whenever we publish a new post to the CS4FN blog.


This page is funded by EPSRC on research agreement EP/W033615/1.

QMUL CS4FN EPSRC logos

Keywords: cyber security, online safety, cybersecurity