1,451 research outputs found
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Risk Management Decision Making for Security and Trust in Hardware Supply Chains
Modern cyber-physical systems are enabled by electronic hardware and embedded systems. The security of these sub-components is a concern during the design and operational phases of cyber-physical system life cycles. Compromised electronics can result in mission-critical failures, unauthorized access, and other severe consequences. As systems become more complex and feature greater connectivity, system owners must make decisions regarding how to mitigate risks and ensure resilience and trust. This paper provides an overview of research efforts related to assessing and managing risks, resilience, and trust with an emphasis on electronic hardware and embedded systems. The research takes a decision-oriented perspective, drawing from the perspectives of scenario planning and portfolio analysis, and describes examples related to the risk-based prioritization of cyber assets in large-scale systems
Recommended from our members
CHOICE_ WP2_D2.1_ Online mapping of Chinese and European ICT industrial associations
Funded by the 7th Framework Programme of the European Union. Grant Agreement: 61057
Recommended from our members
D2.7 Online mapping of Chinese and European ICT industrial associations – Final report
This document is a deliverable of CHOICE project task 2.2 Bringing together European and Chinese Industrial Associations. This task will, at the end of the project, have delivered a final version of an online database of relevant Chinese and European ICT industrial associations. This document is a report on the information gathered for the development of the online database of relevant Chinese and European ICT industrial associations. It maps Chinese industrial associations to European industrial associations in ICT. It does this by providing details of the Chinese industrial associations and other relevant bodies that are a Chinese priority for collaboration with their EU counterparts related to EU-China collaborative ICT R&D&I. Other such Chinese bodies that are not a Chinese priority for such collaboration that map to European industrial associations in ICT are then summarised so that a complete mapping of Chinese industrial associations and related bodies to European industrial associations in ICT can be made. Mappings are made based on the best matches in terms of the subject matter covered by the associations, in each case the best match based on this criteria is identified and highlighted by being given in bold type. If a mapped Chinese association is not a priority for collaboration it is identified in italics. The Chinese selection of Chinese bodies that are a priority for collaboration with EU counterparts reflects the relevant policy guidance provided on behalf of the Chinese government on how the aims of the "Twelfth Five-Year" National Strategic Emerging Industry Development Plan are to be achieved. An overview of the policy guidance relevant to ICT R&D&I is given in section one of CHOICE deliverable D2.4: Handbook for China ICT Industrial Support Services. Based on this mapping opportunities to foster interaction between the associations in China and Europe are identified. A DVD of the modest database that exists on the basis of the mapping presented in this report accompanies the report
Recommended from our members
D2,1 Online mapping of Chinese and European ICT industrial as sociations – Progress report
This document is the first deliverable of CHOICE project task 2.2 Bringing together European and Chinese Industrial Associations. This task will, at the end of the second year of the project, have delivered a final version of an online database of relevant Chinese and European ICT industrial associations. This document is a report on the progress towards an online database of relevant Chinese and European ICT industrial associations. It maps Chinese industrial associations to European industrial associations in ICT. It does this by providing details of the Chinese industrial associations and other relevant bodies that are a Chinese priority for collaboration with their EU counterparts related to EU-China collaborative ICT R&D&I. Other such Chinese bodies that are not a Chinese priority for such collaboration that map to European industrial associations in ICT are then summarised so that a complete mapping of Chinese industrial associations and related bodies to European industrial associations in ICT can be made
IoT Security Adoption into Business Processes: A Socio-Technical View
Recently, the Internet of Things (IoT) has gained huge focus and has led to the generation of valuable data to create new value propositions for organisations. It is important to explore the impact these developments have on our society. IoT security is identified as the key issue amongst all the IoT applications and presents numerous social and technical challenges. We conducted interviews with IoT experts and the results illustrated how holistic security issues in IoT are undermined and to further emphasize the importance of addressing these issues by accommodating security into IoT business processes. This approach facilitated the assessment and identification of security threats from both social and technical perspectives. Our outcome highlights that IoT security must be implemented into IoT aware business processes to make the technology human centered, despite the challenges involved
Recommended from our members
Hazard Mitigation Plan Update
This report contains a discussion of many potential hazards facing Austin, including flooding. While the information contained in the report focuses primarily on general hazard descriptions and avoidance, it does mention how the Waller Creek tunnel project and Waterloo Dam will combat flooding.Waller Creek Working Grou
The Forgotten Emerging Technology: The Metaverse and Its Cybersecurity Implications
The widespread deployment of 5G devices in the United States will spur widespread use of augmented reality, virtual reality, and mixed reality applications—collectively known as extended reality. The over-commercialization of the term "metaverse" has impeded honest conversations about the implications of an insecure metaverse and the technologies associated with it. While these applications and devices will bring significant benefits, they will be accompanied by numerous cybersecurity challenges. As a result, U.S. policymakers run afoul of repeating past mistakes: failing to secure technology before it ushers in a new era of national security concerns. The U.S. government must work closely with industry, academia, nonprofits, and international partners to begin thinking about these consequential issues
EVALUATING THE CYBER SECURITY IN THE INTERNET OF THINGS: SMART HOME VULNERABILITIES
The need for advanced cyber security measures and strategies is attributed to modern sophistication of cyber-attacks and intense media attention when attacks and breaches occur. In May 2014, a congressional report suggested that Americans used approximately 500 million Internet-capable devices at home, including, but not limited to Smartphones, tablets, and other Internet-connected devices, which run various unimpeded applications. Owing to this high level of connectivity, our home environment is not immune to the cyber-attack paradigm; rather, the home has evolved to become one of the most influenced markets where the Internet of Things has had extensive surfaces, vectors for attacks, and unanswered security concerns. Thus, the aim of the present research was to investigate behavioral heuristics of the Internet of Things by adopting an exploratory multiple case study approach. A controlled Internet of Things ecosystem was constructed consisting of real-life data observed during a typical life cycle of initial configuration and average use. The information obtained during the course of this study involved the systematic acquisition and analysis of Smart Home ecosystem link-layer protocol data units (PDUs). The methodology employed during this study involved a recursive multiple case study evaluation of the Smart Home ecosystem data-link layer PDUs and aligned the case studies to the existing Intrusion Kill Chain design model. The proposed solution emerging from the case studies builds the appropriate data collection template while concurrently developing a Security as a Service (SECaaS) capability to evaluate collected results
- …