Cybersecurity and Internet of things (IoT): How safe are you and the Internet?

Date/Time:
Thursday 21 March 2019, 6.30pm - 8.30pm

Venue:
University of Wales Trinity St. David, UWTSD IQ Building, Room 002, SA1 Innovation Quarter, Swansea, SA1 8EW

Cost:
Free

Description

Cyber war has begun, and we can see the consequences in our daily lives. Threats are real, with sophisticated attacks, such as:

  • British Airways hacked, compromising 380k payments
  • NHS computers held ransom during cyber-attack
  • Two cars wirelessly sabotaged, with brakes and lights controlled outside the driver’s control
  • Luxury yacht lured off-course by researchers hacking the GPS signal it used to navigate
  • Privacy concerns raised about TV sets, video cameras and child monitors.
  • Banks and cash machines hacked. Power meters hacked to steal electric power.

IoT is still very much a work in progress. When machines become autonomous, they are able to interact with other machines and make decisions which impact upon the physical world. The IoT will increase the potential attack surface for cyber-criminals. More devices online means more devices that need protecting, and IoT systems are not usually designed for cyber-security. The question is: How safe are you, and the Internet?

Dr Carlene Campbell is a Senior Lecturer and Director of Research Degrees at the University of Wales Trinity Saint David. She is actively engaged in research with several top-ranked journal papers, is supervising 5 PhD students, and is a reviewer for scientific-professional journals. Her qualifications include

  • PhD in Wireless Sensor Networks, Middlesex University.
  • MSc. in Telecomms & Computer Network Engineering, London South Bank Uni.
  • PGCHE Professional Practice, Coventry University
  • BSc in Computer and Management Studies, University of Technology - Jamaica.
  • Professional qualifications in, Ethical Hacking, Computer Forensics Cisco Trainer Training and Supervising Postgrad Research Degrees.

Her research interests include wireless computer networks, cyber security, ethical hacking, computer hacking forensics investigation and protocol development for communication networks.