Risk
5/10/2013
10:55 AM
50%
50%

British Universities Given Funds For Cyber Security Program

U.K. government provides grants to University of Oxford and Royal Holloway, University of London to fund doctoral programs in cyber security.

The U.K. government plans to offer a grant of £7.5 million ($11.5 million) to two British universities in order to train a new cohort of cyber security Ph.Ds.

The Royal Holloway college of the University of London and the University of Oxford -- which both already enjoy international reputations as centers of security research -- have been asked to recruit extra postgraduates to develop new ways of resisting cyber attacks.

Both institutions plan to set up new centers for doctoral training, or CDTs, in cyber security problems. At Oxford, the CDT will focus on big data-related security problems, exploring the best way to link physical and information security. Meanwhile, the Royal Holloway center will research cryptographic systems and protocols, telecommunication networks and critical infrastructure, and organizational processes and socio-technical systems.

[ Are apprenticeships the solution to addressing the IT talent gap? Read U.K. Eyes Apprenticeships To Grow IT Talent. ]

At Holloway, 10 Ph.D. scholarships over three annual intakes for a four-year program will be funded. Students will attend a year of courses in advance of a three-year research program and will be placed during their study at firms including BM, McAfee and Thales. The initiative is expected to supply 66 highly trained doctorate-level experts by 2020.

"We are looking forward to taking on the great responsibility of delivering graduates who will directly benefit the country," said Royal Holloway information security group director and professor Keith Martin.

The investment is another step in the U.K.'s attempts to improve its cyber security efforts. The new research places are in addition to 30 previously announced doctorates being underwritten by GCHQ, the country's official center for monitoring signals, which are part of the government's £650 million ($1 billion) National Cyber Security Program. For the Oxford and Royal Holloway investments, cash is coming in the form of a £5 million ($7.7 million) donation from the government Ministry for Business, Innovation and Skills, along with £2.5 million ($3.8 million) from the Engineering and Physical Sciences Research Council.

"These new centers will produce a new generation of cyber security specialists, able to use their skills and research expertise to improve cyber security and drive growth," said Minister for Universities and Science David Willetts.

The news was generally welcomed by the British IT security industry, although with some caveats. John Yeo, EMEA director at Trustwave, which supplies on-demand and subscription-based information security and PCI DSS compliance management solutions, noted, "It would be prudent to ensure that for within this type of very focused and specialized academic course, a sufficient level of practical, hands-on and industry experience is built in -- primarily to ensure students maximize their employability and value to hiring organizations upon completing their course."

Antivirus systems alone can't fight a growing category of malware whose strength lies in the fact that we have never seen it before. The How To Detect Zero-Day Malware And Limit Its Impact report examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.