Skip to main content

Exploring Cyber Security Research at De- Montfort University.

 Exploring Cyber Security Research at DMU

by Sajinthavi Navarajah , Computing and Engineering Student at De Montfort University.


As a Computing student at De Montfort University, I've had the opportunity to explore the evolving world of cyber security through high quality research, expert teaching and industry collaboration. DMU has established itself as a leading institution for cyber security research in the UK, and this post aims to highlight the extensive resources and academic excellence available to students like myself.




Cyber Technology Institute (CT)

At the core of DMU's cyber security research is the Cyber Technology Institute (CT) a nationally recognized center for excellence. the CTI has been designated as an Academic Research (ACE- CSR) by the National Cyber Security Center (NCSC), a division of GCHQ.



Key research areas:

  • Malware and threat detection.
  • Digital forensics and incident response
  • Cyber crime and societal impact
  • Industrial and infrastructure security
  • Artificial Intelligence in cyber security
  • Data protection and privacy.
This recognition reflect DMU's strong commitment to both academic practical contributions in cyber defense. 


Collaboration with Industry and Government 



DMU's cyber security research is not confined to the academic world. The university actively collaborates with major institutions and companies such as:

  • Interpol and Europol for international cyber crime operations.
  • Ministry of Defence (MoD) to support cyber resilience in national security
  • Airbus and BT on threat analysis and infrastructure protection.
  • National Cyber Security Center (NCSC) for policy and standards development.
These partnerships provide real- world impact and offer students exposure to cutting edge challenges and solutions in the field.


Accessing Research via DORA

DMU's research is accessible through the De Montfort Open Research Archive (DORA):  




DORA contains a wide range of peer reviewed publications, including those on cyber security topics such as:
  • AI- based phishing detection
  • Behavioral  analysis for insider threats
  • IoT and smart device security
  • Cryptography and secure communications
  • Legal and ethical dimensions of cyber defense
This open access makes it easier for students and researchers to engage with current knowledge and integrate it into projects and assignments.

Expert Researchers at DMU

DMU is home to several leading cyber security experts whose work contributes both to academia and public policy. Notable researchers include:


  • Professor Eerke Boiten :- A specialist in data privacy, encryption and GDPR
  • Professor Helge Janicke :- Focuses on cyber physical systems and critical infrastructure security
  • Dr. Richard Smith :-  Works in malware analysis and cyber forensics.
  • Dr. Xavier Bellekens :- Explores emerging threats and AI- powered defenses.
Their contributions are featured in academic journals, conferences and national security consultations.


Student Learning and Opportunities

As a student at DMU, I've benefited from a wide range of modules and extracurricular opportunities, including:
  • Modules:- Ethical Hacking, Cyber threat intelligence, network security and cyber law
  • Events: Capture the flap (CTF) competitions, hackathons, guest lectures
  • Placements:- Opportunities to work with security- focused organizations and government department. 
These experiences provide practical, hands-on learning that bridges theory and real-world practice.

Conclusion 

Cyber security is a rapidly evolving field and De Montfort University offers a powerful environment for students to grow in both knowledge and skills. With a globally recognized research center, collaborations with industry leaders and strong academic community. DMU equips students to become future cyber security professionals ready to face the digital challenges of tomorrow.




🔗 Useful Links and Resources:
  Cyber Technology Institute (CTI): CTI at DMU
DORA (Research Repository): https://www.dora.dmu.ac.uk
Cybersecurity Courses at DMU: https://www.dmu.ac.uk
NCSC Academic Centre of Excellence List: https://www.ncsc.gov.uk

Comments

Popular posts from this blog

Welcome to my Cyber Security Blog!

       Hello and welcome! I'm Sajinthavi Navarajah, a computing and Engineering student with a strong passion for cyber security and ethical technology. This blog is part of an academic assignment where I explore a critical topic in modern IT: Cyber security. 💡  Why I chose this topic  With the increasing reliance on the internet for education, communication, finance and healthcare, cyber security is no longer optional it's essential. I've witnessed first hand how people lose access to accounts and suffer data breaches due to weak security awareness. This blog is my effort to education and spread practical, research based knowledge about digital safety. 👩  Something about me I enjoy researching technology trends and understanding the deeper"why" behind digital issues. I'm especially interested in ethical hacking and how attackers think because understanding that is key to defending systems. 🚨 What inspires me A friend once lost access to all of her ...

Cyber Security Case Study

 Real - World Cyber security case study - The NHS Ransomware attack What happened? In May 2017 , the UK's National Health Service (NHS) was hit by a global ransomware attack known as WannaCry. This cyber security affected over 200,000 computers across 150 countries, including key NHS systems in England and Scotland. The ransomware encrypted files and demanded payment in Bitcoin for access restoration. Many NHS services were disrupted: surgeries were cancelled, ambulances were diverted and sensitive patient data was temporarily inaccessible. Why it mattered Healthcare systems handle sensitive and life-critical data  The NHS was not targeted directly it was affected because it was running outdated Windows systems The attack exposed major weaknesses in legacy infrastructure and incident response planning. What Caused IT? Lack of timely system updates (many systems were running Windows XP) No centralized patch management or vulnerability scanning Insufficient training for staff ...