Cyber security threats are the source of many broad challenges for academic research. The layered, composite nature of today’s cyber systems means that cyber research challenges tend to be rapidly evolving and that they add to or modify, rather than replace, existing issues. They require new approaches, insights and techniques (for example those leveraging the power of data science) which can build on and work alongside continuing activity in more established areas such as cryptography, malware analysis and intrusion detection. Areas that may not traditionally have been considered to be enablers of better cyber security, such as behavioral science and economics, continue to assume an increasingly important role in the field.

The Academic Centre of Excellence in Cyber Security Research at Imperial was one of the first recognised academic centres of excellence and for the past 5 years has played a significant role in major parts of the national cybersecurity programme. Imperial is leading the Research Institute on Program Analysis and Verification and the Research Institute in Trustworthy Industrial Control Systems, has played a major role in the creation and running of the PETRAS IoT Research Hub –Cybersecurity of the Internet of Things, the Cybersecurity Body of Knowledge consortium and is involved in other large scale collaborations such as the US UK DAIS International Technology Alliance.

Related videos

Should you believe anything you see and interact with online

The twenty first century has already been defined by cyberspace, powering a technology and information revolution that will have a profound impact on societies, industries, and the public sector. Smartphones, augmented reality glasses and 'thinking' robots are examples of how we will feel the influence of cyberspace on what we do and who we are.

Should you believe anything you see and interact with online

Should you believe anything you see and interact with online

The twenty first century has been defined by cyberspace

The twenty first century has already been defined by cyberspace, powering a technology and information revolution that will have a profound impact on societies, industries, and the public sector. Smartphones, augmented reality glasses and 'thinking' robots are examples of how we will feel the influence of cyberspace on what we do and who we are.

Defining the legal and ethical boundaries at the cyber front

Defining the legal and ethical boundaries at the cyber front

The 3rd Vincent Briscoe Annual Security Lecture

The 3rd Vincent Briscoe Annual Security Lecture - "Defining the legal and ethical boundaries at the cyber frontier" - Guest Speaker: The Honorable Michael Chertoff.

Accurate, robust metrics for usable security

Accurate, robust metrics for usable security

A critical part of building secure systems is verifying that they're usable and secure

A critical part of building secure systems is verifying that they're usable and secure in practice, and not just theoretically. This requires accurate and robust metrics for quantifying this "usability" and "practical security". For several years, we've been studying how to help users create passwords that are hard for attackers to crack, but are still easy for users to remember and use.

The dark net: inside the digital underworld

The dark net: inside the digital underworld

Explore the world of dark internet subcultures, crypto-currencies and the hidden web

Explore the world of dark internet subcultures, crypto-currencies and the hidden web. Jamie Bartlett delivers the Vincent Briscoe annual security lecture at Imperial College London.

Academics

Academics