6 research outputs found

    On the importance of cyber-security training for multi-vector energy distribution system operators

    Get PDF
    Multi-vector Energy Distribution Systems (EDS) are increasingly connected to provide new services to consumers and Distribution Network Operators (DNO). This exponential growth in connectivity, while beneficial, tremendously increases the attack surface of critical infrastructures, demonstrating a clear need for energy operator cyber-security training. This paper highlights the cyber-security challenges faced by EDS operators as well as the impact a successful cyber-attack could have on the grid. Finally, training needs are contextualised through cyber-attack examples

    TENSOR: retrieval and analysis of heterogeneous online content for terrorist activity recognition

    Get PDF
    The proliferation of terrorist generated content online is a cause for concern as it goes together with the rise of radicalisation and violent extremism. Law enforcement agencies (LEAs) need powerful platforms to help stem the influence of such content. This article showcases the TENSOR project which focusses on the early detection of online terrorist activities, radicalisation and recruitment. Operating under the H2020 Secure Societies Challenge, TENSOR aims to develop a terrorism intelligence platform for increasing the ability of LEAs to identify, gather and analyse terrorism-related online content. The mechanisms to tackle this challenge by bringing together LEAs, industry, research, and legal experts are presented

    Cyber Security Certification Programmes

    Get PDF
    Although a large and fast-growing workforce for qualified cybersecurity professionals exists, developing a cybersecurity certification framework has to overcome many challenges. Towards this end, an extended review of the cybersecurity certifications offered currently on the market from 9 major issuing companies is conducted. Moreover, the guidelines for the definition of a cybersecurity certification framework as they are provided from the recent Cyber Security Act and framework of ENISA, NIST and ISO/IEC 17024 are covered. A vast comparison among the presented cybersecurity certifications is given, based not only on the cybersecurity domain covered but also the required level of candidate's experience. A proposed certification program has been also analyzed based on the learning pathways and the knowledge areas described in FORESIGHT

    Kavallieros et al PPDR Information Systems -A Current Status Review Report PPDR Information Systems -A Current Status Review Report

    No full text
    ABSTRACT Public safety organizations include emergency and law enforcement agencies, fire departments, rescue squads, and Emergency Medical Services (EMS). In response to increasing threats of terrorism and natural disasters, safety and security personnel must overcome technology barriers to enhance their efficiency, especially in the neuralgic section of information exchange. Limited availability of information hinders the response time and decision making process. Efficient communications supported by interoperable technology are vital to the situational awareness, scalability, and effectiveness of incident response. This paper's prime objective is the review of available information systems than can be used to support and assist security agencies

    Combatting cybercrime and sexual exploitation of children: an open source toolkit

    No full text
    This chapter presents the UINFC2 “Engaging Users in preventing and fighting Cybercrime” software platform, showcasing how software tools designed to detect, collect, analyse, categorise and correlate information that is publically available online, can be used to enable and enhance the reporting, detection and removal capabilities of law enforcement and hotlines in response to cybercrimes and crimes associated with the sexual exploitation of children. It further discusses the social, economic and wider impact of cybercrime on a European and global scale, highlighting a number of challenges it poses to modern society before moving on to discuss the specific challenge posed by the proliferation of online child exploitation material and discussing the functionalities of the UINFC2 system as a response mechanism
    corecore