Our degrees are designed to support the development of technical skills and an offensive approach to cybersecurity. We are Abertay's centre for teaching, research and knowledge exchange in applied computer science and cybersecurity.
We provide exciting opportunities to collaborate closely with industry, lecturers and fellow students. You will devise and learn innovative methods to defend systems from cyber attacks.
Our staff have substantial expertise in areas including cybersecurity, ethical hacking, penetration testing, digital forensics, human-computer interaction, usable security, IoT, secure software development, artificial intelligence, and parallel programming.
Abertay was the first university to offer degrees in Ethical Hacking and Computer Games Technology, and our degrees maintain an excellent reputation for quality and employability.
Most of our teaching is laboratory-based, and our students have access to well-equipped specialist teaching laboratories for ethical hacking, networking, the Internet of Things and general software development.
We also have close ties to industry in our areas of expertise; our staff and students provide cybersecurity and usability consultancy to businesses around the world.
Head of Division
The Division’s MSc in Ethical Hacking and Cyber Security course equips students with the skills and expertise needed to enter the cyber security industry. Topics include
The Division of Cybersecurity offers a specialist computing environment for teaching and research in Cybersecurity.
The Hack Lab is isolated from the main university network, allowing our students to experiment with all aspects of ethical hacking in a safe, controlled environment.
We also use Computing Room 2021. This room has a specialist high power WIFI router to enable the connection Of Internet of Things-enabled devices. This router has specific facilities not available elsewhere in the University. The room also has controlled access to allow students to carry out project work, and leave the equipment set up and running if required.
Cybersecurity is one of three Divisions in the School of Design and Informatics.
We have developed strong links with government, Police and industry to collaborate on a range of research projects including improving the security of SMEs, training in cybercrime response using games technologies, and cybersecurity into the Software Development Lifecycle.
Research in the Division is a major part of the Security theme, and is structured into four overlapping areas:
The areas of computer security and software development are often regarded separately, each with minimal consideration for the other. However, a large number of security flaws are caused by a limited understanding of how poor coding practices can be exploited by a malicious hacker. In partnership with industry, we are exploiting design patterns to increase secure coding awareness in software developers.
We have analysed and catalogued security threats and vulnerabilities in order to better understand their root cause and identify appropriate techniques to improve communication of security problems. The academics are Dr Natalie Coull, Dr Ian Ferguson, Dr Gavin Hales and Dr Adam Sampson.
This combination of root cause and the security problem are encapsulated in vulnerability anti-patterns as a means to transfer knowledge from the cybersecurity community to the software development community to ensure that secure software is developed from the outset. Our findings show that these anti-patterns can improve software developers’ ability to recognise vulnerabilities in systems and how they can be exploited. Further research will measure the longer-term impact of this improved awareness on the overall security of the developers’ software.
Any computer network is potentially vulnerable to cyber attacks. Every network has an attack surface, i.e., the set of devices on the network and the ways in which the surface may be attacked, and threats can occur at any point on that landscape. In addition to this general threat, many common household devices are now being connected to the Internet, and newly developed devices are also being introduced into people's homes. The number of devices connected to the Internet is expected to reach 75 billion by 2025. In a number of cases, these devices have security flaws that can compromise the privacy of the owners, or can be subverted to be used as a means to attack other systems.
We are developing novel solutions to effect pervasive security and privacy for networks in general and IoT devices in particular. For example, we have used artificial neural networks, a machine-learning technique, to build an intrusion detection system able to detect a range of Distributed Denial of Service attacks. We are also exploiting off-the-shelf massively parallel architectures such as GPUs by exploring distributed computation approaches and refactoring the underlying data to significantly reduce its size and so improve on existing algorithm performance.
Cybersecurity is in part a technical challenge anda human challenge: it depends on the interplay between users and security technology in societal and industrial contexts.
A key aspect of cybersecurity is encouraging users to behave safely online.
Many online activities attract risks; some of these are known to the user and some are not. We have drawn on techniques from nudge theory and affective computing to encourage safe behaviour online. We have successfully nudged users through visual cues in a web browser into choosing longer and stronger passwords during a system enrolment task. We have developed a system that automatically detects risky online behaviour and provides feedback on risky behaviour in real time.
Extending human-centred security beyond cybersecurity, and in partnership with industry we have investigated the perceived influence of social presence at self-service checkouts by staff and its perceived effect on dishonest customer behavior. Our findings show that the perceived motivational and situational factors contributing to theft are complex, and surveillance in its current form does not appear to provide a sufficient social presence to prevent potential theft at self-service checkouts.
Digital devices play an important role in our everyday lives and the nature of the data stored on these devices will paint a vivid picture of the life of its owner. Patterns of behaviour and social connections are deeply embedded in much of this data. For institutions such as law enforcement, this digital forensic data can serve as invaluable evidence, yet the sheer volume and complexity of these data makes analysis challenging.
We are combining our expertise in digital forensics with the knowledge in the Division of Computing and Mathematics in augmented and virtual realities to discover new ways of exploring these highly complex digital forensic datasets. The academics are Dr Ethan Bayne, Dr Gavin Hales, Dr Ian Ferguson and Mr Paul Robertson. If we can successfully harness augmented and virtual realities, we will drive marked increases in investigative efficiency.
In our games programming research, we also make use of the rendering and compute functionalities offered by the GPU to increase spatial and temporal scale of simulations. Interpretation of simulation output can be challenging and we advocate the 'built-in' visual simulation afforded by GPGPU implementations that employ optimisations that are standard in the production of real-time interactive scenes.
Our expertise in programming also extends to design patterns and in partnership with the Division of Cybersecurity we have been developing design patterns to improve computer system security.
Tax returns, CVs and bank statements were among the files retrieved
Cheryl Torano has shared her incredible story in an inspiring new book
Dr Natalie Coull says need for skilled cyber graduates has 'never been greater'
Around 600 people took part in the public poll
The project will allow former forces personnel to learn ethical hacking skills
Professor Karen Renaud shares her top security tips
New School of Design and Informatics hailed 'an investment in Scotland's future'
Cybersecurity expert Professor Karen Renaud looks at password behaviour
A study found that human-like face resulted in fewer instances of dishonesty
Tayyaba has gone on to run an extremely successful business
A study found that human-like face resulted in fewer instances of dishonesty
A major upcoming research and development centre
Our game courses are the best in Europe. Games technology, game arts and develop...
Internationally recognised research and courses in game design, computer games t...
The centre for degrees, research and knowledge in applied computer science, game...