Security of Naval Base

This writing is in response to and continuation of Prof. Ross Anderson’s book’s first chapter topic – i.e. Example of MilitaryBase [1].The security of the Naval base is also as important as the security of other military bases. However, one needs to investigate it from the perspective of a Naval war strategist. Imagine a war […]

PHD Proposal – Privacy Enhancing Technologies to Support Anonymous Communication

In year 2011, after coming from the United Kingdom I submitted a PHD Proposal to the Security Group of Cambridge University (to Dr. Steven J. Murdoch) which was rejected by him (Reason: not known. But probably my PHD research proposal was not well written in the eyes of Dr. Steven J. Murdoch). Dr. Murdoch [7] […]

Shadow IT

Quite recently, I submitted an assignment on “Shadow IT”. I want to share some of its data with the blog readers. According to Forcepoint.com [1], “Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval”. E.g. BYOD, use of cloud services like Dropbox, Google Drive, One […]

Why I am writing about Security Engineering?

During education at the school, college and universities, my majors were in the field of Science/Computing/IT/Engineering. Specifically, at the University of Oxford, I attended a course with the title of Security Principles which was taught by Professor. Andrew Martin. For prestudy, I read the first few chapters of a book with the title of Security […]