\n
", "buttontext" : "Find out more", "buttonlink" : "/open-days/postgraduate/" } },"International" : {"title" : "International","link" : "/international/","children" : [{"title" : "Our global community","link" : "/international/your-global-community/"},{"title" : "Connect with your regional officer","link" : "/international/connect-with-your-regional-officer/"},{"title" : "Applicants ","link" : "/international/applicants/"},{"title" : "International Arrival and Enrolment ","link" : "/international/leaving-for-the-uk/"},{"title" : "Meet Us","link" : "/international/meet-us/"},{"title" : "International Information Day","link" : "/international/international-information-day/"},{"title" : "Chat with our students","link" : "/chat-with-our-students/"},{"title" : "Visa and Immigration","link" : "/international/immigration/"},{"title" : "YourHud","link" : "/international/your-hud/"}],"featured" : [{"title" : "Courses and entry requirements", "desc" : "Explore our course portfolio ", "link" : "/international/courses-and-entry-requirements/", "rank" : "null", "icon" : "fas fa-language" },{"title" : "Fees and funding ", "desc" : "Discover our competitive fees ", "link" : "/international/fees-and-funding/", "rank" : "null", "icon" : "fas fa-money-bill-alt" },{"title" : "Applying to the University", "desc" : "For international students", "link" : "/international/applying-to-the-university/", "rank" : "null", "icon" : "fas fa-book" },{"title" : "Scholarships opportunities ", "desc" : "See if you are eligible ", "link" : "/international/scholarships/", "rank" : "null", "icon" : "fas fa-life-ring" }],"cta" : { "html" : "", "buttontext" : "Book Now", "buttonlink" : "/international/international-information-day/" } },"Research, innovation and skills" : {"title" : "Research, innovation and skills","link" : "/research/","children" : [{"title" : "REF 2021","link" : "https://research.hud.ac.uk/strategy/ref/"},{"title" : "Ways for business to work with us","link" : "https://research.hud.ac.uk/business/"},{"title" : "Research Impact","link" : "https://research.hud.ac.uk/impact/"},{"title" : "Our academic experts","link" : "https://pure.hud.ac.uk/en/persons/"},{"title" : "Research strategy and governance","link" : "https://research.hud.ac.uk/strategy/"}],"featured" : [{"title" : "Skilled people and training", "desc" : "Excellent training for staff", "link" : "https://research.hud.ac.uk/skilled-people/", "rank" : "null", "icon" : "fas fa-wrench" },{"title" : "Research degrees", "desc" : "Step by step help to apply", "link" : "https://hud.ac.uk/postgraduate/research/", "rank" : "null", "icon" : "fas fa-flask" },{"title" : "Institutes and centres", "desc" : "Interdisciplinary research", "link" : "https://research.hud.ac.uk/institutes-centres/", "rank" : "null", "icon" : "fas fa-university" },{"title" : "The Graduate School", "desc" : "Enhance your potential", "link" : "https://students.hud.ac.uk/grad/graduate-school/", "rank" : "5", "icon" : "fas fa-graduation-cap" }],"cta" : { "html" : "\n
IT systems are constantly evolving, both in terms of their level of technical sophistication and complexity, and capability to mitigate potential security threats. Current software systems are more reactive than proactive in terms of detecting security threats and protecting against system vulnerabilities. This will likely continue for the foreseeable future. As a result, cyber-attacks and hacks are easier to implement, users of all types and levels of experience are more easily deceived, and systems easier to compromise. For instance, email phishing—where users are deceived into executing malicious code on their own system—is now commonplace, which can render systems inoperable and hold end users to ransom. Although some safeguards are usually put in place, the detection of these and similar attacks, as well as taking necessary precautions and mitigating actions, are often the sole responsibility of the end user or system operator. This presents a considerable cognitive, social and technical challenge. A core ambition of cyber-security research within the SSI is to support cyber sensemaking and situation awareness and implement strong safeguards to prevent user-focused attacks from occurring.
Please see our Cyber Security PhD Scholarships.