SECURED SECurity at the network EDge
|
|
- Jane Craig
- 6 years ago
- Views:
Transcription
1 SECURED SECurity at the network EDge Antonio Lioy Politecnico di Torino < polito.it > TENACE meeting Sestriere (Italy) January 22 nd, 2015
2 The SECURED FP7 project FP7 call 10 Collaborative Project (FP7-ICT ) grant agreement no duration: 3 years (1/10/ /9/2016) EC contribution: 2.7 M Euro web: fp7.eu mail: coordinator@secured fp7.eu 2
3 The Consortium (I) Politecnico di Torino Italy coordinator = Prof. Antonio Lioy ( antonio.lioy@polito.it ) networking, trusted computing, security policies HP Laboratory Bristol United Kingdom networking, trusted computing Primetel PLC Cyprus telco, network and content provider (regional) Telefonica Investigacion y Desarrollo Spain telco and network provider (worldwide) 3
4 The Consortium (II) United Nations Interregional Crime and Justice Research Institute Italy social and policy aspects of security Universitat Politecnica de Catalunya Spain networking, mobility (Barcelona Supercomputing Center Spain) computational architectures VTT Technical Research Centre of Finland cybersecurity 4
5 Main idea users have many "terminals" laptop, desktop, tablet, smartphone, Internet-connected TV, car infosystem, with very different security level (because it's difficult to develop security controls for so many platforms with so different characteristics) and different network connection (hence we can't consistently rely on network border protection) IDEA: offload security controls from the user terminals to a (trusted and secure) network node 5
6 From heterogeneous to uniform security security applications independent from user terminals security protection independent from user location 6
7 Use cases home home gateway, protection of family (and visitors') devices enterprise wired/wireless access, protection of hosts (including servers?) public hotspot WiFi access, protection of visitors mobile 3G/4G access, protection of subscriber's device IoT wireless access point, protection of IoT node NOTE: first hop not "SECURED"? then create a secure connection to a SECURED-node somewhere in the network 7
8 Main components NED (Network Edge Device) trusted node (with TC techniques) VMM for multi-tenancy (one VM per user) e.g. home gateway, corporate router, wireless AP, GGSN security applications specific tasks (packet filter, parental control, anti-phishing, content inspection, ) executed at the NED security policies simplify configuration of applications share "best practice" policies flexibility (users care about policy, not implementation) 8
9 SECURED architecture authn application repository 2. authenticate 1. trust 3. get apps 4. get policies policy repository user terminal NED 5. protect! personal execution environment 9
10 Trust and security NED (Network Edge Device user terminal policy app(s) TPM secure & trusted channel measures verifier 10
11 Monolithic vs split NED end-user device end-user device network SEC edge device (SECURED) network edge device (SECURED) OF SEC computing device (SECURED) network network 11
12 Hierarchical security policies the same connection may be subject to constraints from different tenants (depending on the network environment) policies are applied in a hierarchical way user is informed of the overall policy applied to her connection (and may refuse connecting to the network) government government ISP parent user (child) ISP corporation department user (employee) 12
13 Security policy: levels high-level block access to malware distribution hosts medium-level use service MalwareLookup to verify if a host is a known malware distribution point low-level if ( lookup( host, dns.malware.org) == 1) then deny; else permit 13
14 Cooperative and uncooperative policies cooperative policies disclose their content (to the end-user) and hence permit policy reconciliation display of the final policy implementation on a single PSA uncooperative policies do not disclose their content to anybody (but the policy owner) policy reconciliation impossible policy display impossible require a dedicated PSA (chained to the others of the user) 14
15 Components and issues in SECURED components PSC = Personal Security Controller PSA = Personal Security Application TVD = Trusted Virtual Domain (PSC + PSA 1 PSA N ) the "split" model implies personalized network path (SDN?) access to network-hosted computational capabilities (NFV?) these points have issues with security trust "personal" 15
16 Cloud / SDN / NFV for Secured 1. attestation 2. config( α ) cloud controller NED PSC PSA 1 PSA 2 PSA 3 α / 1 α / 2 α / 3 ext Mr. α 16
17 THANK YOU!
18 Disclaimer and confidentiality note EU disclaimer SECURED (project no ) is co-funded by the European Union (EU) via the European Commission (EC), under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7). This document does not represent the opinion of the EC and the EC is not responsible for any use that might be made of its content. SECURED disclaimer The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability Confidentiality The information in this document is confidential and restricted only to the members of the SECURED consortium (including the Commission Services). 18
Uniform IoT security using NFV based policy enforcement gateways
Uniform IoT security using NFV based policy enforcement gateways Adrian L. Shaw Hewlett Packard Labs (Bristol, UK) SICS Security Day 2016 # whoami Senior Researcher, Hewlett Packard Labs HPE s advanced
More informationExploiting the network for securing personal devices
Exploiting the for securing personal devices Chris Dalton ( ), Antonio Lioy (+), Diego Lopez ($), Fulvio Risso (+), and Roberto Sassu (+) (*) HP Laboratories, Bristol, United Kingdom (+) Politecnico di
More informationSecurity Enhancements
https://www.shield-h2020.eu/ Security Enhancements By means of NFV and Cognitive Security Managed Security Services (MSS) and NFV NFV becomes a key enabler for security services Security VNFs are emerging
More informationElectronic ID at work: issues and perspective
Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":
More informationEU funded research is keeping up trust in digital society
EU funded research is keeping up trust in digital society Rafael Tesoro Trust and Security Unit DG Communica5ons Networks, Content and Technology European Commission Cybersecurity Strategy of the EU: An
More informationDeliverable D3.4 5G-PPP Security Enablers Documentation (v1.0) Enabler Micro-Segmentation
Deliverable D3.4 5G-PPP Security Enablers Documentation (v1.0) Enabler Micro-Segmentation Project name 5G Enablers for Network and System Security and Resilience Short name 5G-ENSURE Grant agreement 671562
More informationVirtualized Security at the Network Edge: A User-centric Approach
Virtualized Security at the Network Edge: A User-centric Approach D. Montero, M. Yannuzzi, A. Shaw, L. Jacquin, A. Pastor, R. Serral-Gracià, A. Lioy, F. Risso, C. Basile, R. Sassu, M. Nemirovsky, F. Ciaccia,
More informationRaj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)
APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These
More informationSPLIT INTERFACES (SPIN) Jordi Domingo-Pascual Universitat Politècnica de Catalunya BarcelonaTECH (UPC) VFCS17. ISCTE. Lisboa.
SPLIT INTERFACES (SPIN) Jordi Domingo-Pascual Universitat Politècnica de Catalunya BarcelonaTECH (UPC) VFCS17. ISCTE. Lisboa. October 24, 2017 SPLIT INTERFACES (SPIN) The main goal is to decouple the devices
More informationTowards the roll-out of highly customizable Future 5G Networks
Towards the roll-out of highly customizable Future 5G Networks Sergios Soursos, Ph.D. Master Research Engineer souse@intracom-telecom.com ITU Forum, Towards 5G Enabled Gigabit Society, Athens, 11 Oct 2018
More informationShaping the Cyber Security R&D Agenda in Europe, Horizon 2020
Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Aristotelis Tzafalias Trust and Security unit DG Communica4ons Networks, Content and Technology European Commission Shaping the Cyber Security
More informationSecurity analysis and configuration of large networks
Security analysis and configuration of large networks Antonio Lioy Politecnico di Torino Dip. Automatica e Informatica lioy@polito.it Abstract Providing and managing for large networked systems is difficult
More informationIoT privacy risk management in ANASTACIA project
ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.
More informationA Leading Internet Business Enabler
A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My hotel guests are bringing too many devices into my network. How do I manage them? I allow
More informationA European Perspective on Smart Grids
A European Perspective on Smart Grids Patricia Arsene Unit Smart Cities and Sustainability CONNECT/H Sustainable & Secure Society DG Communication Networks, Content and Technology European Commission European
More informationDynamic spectrum allocation and energy efficiency in 5G systems. The SPEED-5G perspective
Dynamic spectrum allocation and energy efficiency in 5G systems The SPEED-5G perspective CLEEN2016 Workshop @CROWNCOM 2016, 31.05.2016, Grenoble Benoit MISCOPEIN CEA-Leti www.speed-5g.eu on behalf of the
More informationApplication Deployment in Future Global Multi-Cloud Environment
Application Deployment in Future Global Multi-Cloud Environment Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu OIN Workshop, Saint Louis, MO October 20, 2015 These slides
More informationProject Presentation v2
Project Presentation v2 EPES Project Eco-Process Engineering System For Composition of Services to Optimize Product Life-cycle FoF-ICT-2011.7.3-285093 Public Project Report Project Facts: Duration: 36
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationCustom Connect. All Area Networks. customer s guide to how it works version 1.0
All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the
More informationUCD Centre for Cybersecurity & Cybercrime Investigation
UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationD6.1. Project Portal and Communication Channels
H2020 5G-Coral Project Grant No. 761586 D6.1. Project Portal and Communication Channels Abstract This deliverable (D6.1) reports the set-up of project portal and communication channels such as social media
More informationTEDS BEE TEST OF DIGITAL SERVICES FOR BUILDING ENERGY EFFICIENCY A PROJECT TOWARDS THE ENERGY SAVING AND SUSTAINABILITY OF PUBLIC BUILDINGS
4 TEDS BEE TEST OF DIGITAL SERVICES FOR BUILDING ENERGY EFFICIENCY A PROJECT TOWARDS THE ENERGY SAVING AND SUSTAINABILITY OF PUBLIC BUILDINGS 4 TEDS BEE A project led by Ferrovial Servicios towards the
More information5G-PICTURE. 5G Programmable Infrastructure Converging disaggregated network and compute Resources
5G-PICTURE 5G Programmable Infrastructure Converging disaggregated network and compute s Anna Tzanakaki (University of Bristol, UK, NKUA, Greece) Consortium IHP GmbH (Coordinator) University of Bristol
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationCloud-based Rapid Elastic MAnufacturing
Cloud-based Rapid Elastic MAnufacturing WP9 Impact D9.2.1 Promotion and Promotional Material Deliverable Lead: TANet Contributing Partners: ASC Delivery 03/2015 Dissemination Level: Public Version 1.0
More informationAIMS Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things
AIMS 2017 Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things Dr Jim Martin School of Computing Clemson University (jmarty@clemson.edu) Talk Overview Setting the
More informationCTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud
CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud Khalid Raza CTO & Co-Founder Viptela khalid@viptela.com Danny Johnson Director, Product Marketing Verizon daniel.johnson@verizonwireless.com
More informationHigh Performance Computing from an EU perspective
High Performance Computing from an EU perspective DEISA PRACE Symposium 2010 Barcelona, 10 May 2010 Kostas Glinos European Commission - DG INFSO Head of Unit GÉANT & e-infrastructures 1 "The views expressed
More informationM2M in the Real World: Security Best Practices and Lessons Learned
M2M in the Real World: Security Best Practices and Lessons Learned Tyson Macaulay VP Global Telecommunications Strategy & Corporate Development Oct 10, 2013 Agenda and Topics M2M compliance and regulatory
More information1. Publishable Summary
1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,
More informationNetwork Function Virtualization (NFV)
Network Function Virtualization (NFV) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Mijumbi et al., Network Function Virtualization:
More informationSCOTT Methodology for Building Blocks and Use Cases
SCOTT - Jan2018 SCOTT Methodology for Building Blocks and Use Cases Josef Noll, Maghsoud Morshedi, Toktam Ramezani secure connected trustable things SCOTT has received funding from the Electronic Component
More informationRevolutionising mobile networks with SDN and NFV
Revolutionising mobile networks with SDN and NFV Cambridge Wireless Virtual Networks SIG 8 th May 2014 Philip Bridge, Senior Network Architect at EE May 2014 Networks are getting messy Vertically integrated
More informationEU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017
EU Cloud Computing Policy Luis C. Busquets Pérez 26 September 2017 The digital revolution is built on data Most economic activity will depend on data within a decade Potential of the data-driven economy
More informationChapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011
Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationInformation Security BYOD Procedure
Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationLevel 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services
9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s
More informationKlaus-Michael KOCH TECHNIKON Forschungsgesellschaft mbh DRS-workshop Vienna
This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 607577. Presented by: Klaus-Michael
More informationTowards a European Cloud Computing Strategy
Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society
More informationETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)
ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security
More informationDr. Kontantinos Psannis, Assis. Prof. UOM Tel: Dr. Georgios Kokkonis, Scientific Staff TEIWM
Dr. Kontantinos Psannis, Assis. Prof. UOM Tel: +302310891737 - http://users.uom.gr/~kpsannis/ Dr. Georgios Kokkonis, Scientific Staff TEIWM Department of Applied Informatics University of Macedonia Greece
More informationAAI in EGI Current status
AAI in EGI Current status Peter Solagna EGI.eu Operations Manager www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142 User authentication
More informationEnabler Manual Security Indicator
Enabler Manual Security Indicator Project name 5G Enablers for Network and System Security and Resilience Short name 5G-ENSURE Grant agreement 671562 Call H2020-ICT-2014-2 Authors UOXF: Ravishankar Borgaonkar
More informationThe EUCISE2020 project
The EUCISE2020 project (EUropean test bed for the maritime Common Information Sharing Environment in the 2020 perspective) P. Sacco, 16/01/2018 CISE Roadmap Cross Sectorial interoperability for better
More informationProcedure: Bring your own device
Procedure: Bring your own device Purpose This procedure defines the obligations for all authorised users who choose to connect a personally owned device to the University s network or who use their personal
More informationTowards new avenues in EU-US ICT collaboration:
Towards new avenues in EU-US ICT collaboration: 5G, Big Data, Internet of Things and Cyber Physical Systems for smart cities, smart transport and smart energy Project overview ICT Policy, Research and
More informationHORIZON2020 FRAMEWORK PROGRAMME TOPIC EUK Federated Cloud resource brokerage for mobile cloud services. D7.1 Initial publication package
HORIZON2020 FRAMEWORK PROGRAMME TOPIC EUK-03-2016 Federated Cloud resource brokerage for mobile cloud services D7.1 Initial publication package Project acronym: BASMATI Project full title: Cloud Brokerage
More informationR E F E R E N C E TCG. Trusted Multi-Tenant Infrastructure Work Group. Use Cases. Version 1.1. November 15, 2013
R E F E R E N C E Trusted Multi-Tenant Infrastructure Work Group Use Cases Version 1.1 November 15, 2013 Contact: admin@trustedcomputinggroup.org TCG Copyright TCG 2011-2013 Disclaimers, Notices, and License
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationIn Accountable IoT We Trust
In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design
More informationA novel approach to ICN: POINT ip Over IcN the better ip. Dr. Dmitrij Lagutin, Aalto University, Finland
A novel approach to ICN: POINT ip Over IcN the better ip Dr. Dmitrij Lagutin, dmitrij.lagutin@aalto.fi, Aalto University, Finland Information Centric Networking (ICN) Information Centric Networking (ICN)
More informationVNC Connect security whitepaper. Cloud versus direct with VNC Connect
VNC Connect security whitepaper Cloud versus direct with VNC Connect November 2017 Contents Introduction... 3 Key terminology... 3 Direct connectivity... 4 Cloud connectivity... 5 Summary... 6 Appendix:
More informationBuilding digital competences in national and regional clusters
Building digital competences in national and regional clusters FIIF event on "Digital Trust and Security 14.2.2019 Jarno Salonen 14.2.2019 VTT beyond the obvious 1 Agenda Background Building competences
More informationWhere is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations
Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationTESTA-ng. TESTA 20 years of history October TESTA-ng Brief Presentation. October 2017
TESTA-ng TESTA 20 years of history TESTA-ng Brief Presentation 1 Agenda Introduction on TESTA Objectives Mission A brief history Who is connected today? Multiple communities of interests Applications using
More informationEU-TW Partnership. l l
l l EU-TW Partnership To establish formal 5G cooperation between Taiwan and Europe To enable Taiwan s participation in H2020 projects as a strategic partner Eco-system Global Linkage Agreement with EC,
More informationEU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE)
EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE) Manuela Cabral Directorate General for Taxation and Customs Union Head of Risk management and Security, Unit B 2 Brussels,
More informationA Strategy for a secure Information Society Dialogue, Partnership and empowerment
A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information
More informationEC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation
EC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation Francisco García Morán Chief IT Advisor European Commission Roadmap to a Single European
More informationINFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT
INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT Policy UT Health San Antonio shall adopt and document Standards and Procedures to define and manage a secured operating configuration for all
More informationMedia (NEM) Initiative
Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom
More informationASERCOM cyber-security guideline for connected HVAC/R equipment
ASERCOM cyber-security guideline for connected HVAC/R equipment Preface Many HVAC/R components like compressors, fans or controllers have connectivity features today. This includes Bluetooth, Wi-Fi or
More informationEnergy Management of Microgrids in a Smart City Environment
Energy Management of Microgrids in a Smart City Environment Meeting: M2M Forum 2013 Date: May 14 th 2013 Presenter: Maurizio Spirito Project Coordinator of EU GreenCom project, ISMB Istituto Superiore
More informationWe are innovating in security
We are innovating in security Security Network Network Innovation Day Day 2018 2018 We are We in are in threat and defense Complex mix of multiple vendors without effective orchestration IoT connected
More informationMulti-RATs Convergence: A New Spin Through the Edge
Multi-RATs Convergence: A New Spin Through the Edge Ping-Heng (Wallace) Kuo and Alain Mourad InterDigital, London, UK Cambridge Wireless, 14 December 2017 2016 InterDigital, Inc. All Rights Reserved. Outline
More informationCybersecurity The Evolving Landscape
Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG
More informationTowards Multitechnology
Towards Multitechnology seamless access for 5G: a first approach with very tight coupling IMT 5G Workshop, 7 sep 2015 X. Lagrange, Y. Khadraoui, A. Gravey Outline Introduction : Fixed Mobile Convergence
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet Elements of Modern Networking ACK: content taken from Foundations
More informationIntel s Architecture for NFV
Intel s Architecture for NFV Evolution from specialized technology to mainstream programming Net Futures 2015 Network applications Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationSEC-04-DRS-2017: Broadband communication systems
SEC-04-DRS-2017: Broadband communication systems Policy background Strong interest from Member States, both on ministerial level as well as on end-user level. Cross-border communication issues between
More informationTHE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS
THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS FIDO ALLIANCE WEBINAR MARCH 28, 2017 1 INTRODUCTION TO THE FIDO ALLIANCE ANDREW SHIKIAR SENIOR DIRECTOR OF MARKETING MARCH 28, 2017 2 THE FACTS ON
More informationUNIVERSITAT POLITÈCNICA DE CATALUNYA
Department of Signal Theory and Communications UNIVERSITAT POLITÈCNICA DE CATALUNYA RESOURCE MANAGEMENT STRATEGIES FOR SDR CLOUDS Vuk Marojevic Ismael Gomez Gabriel Montoro Antoni Gelonch Pere Gilabert
More informationMobility First How Tomorrow Moves for Education
Mobility First How Tomorrow Moves for Education Presented by: Sponsored by: CONFIDENTIAL Copyright 2016. Aruba Networks, an HP Company. All rights reserved GENMOBILE IS AT THE HEART OF OUR TECHNOLOGY STRATEGY
More informationCyber Security Updates and Trends Affecting the Real Estate Industry
Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways
More informationEvolving FIRE into a 5G-Oriented Experimental Playground for Vertical Industries
Evolving FIRE into a 5G-Oriented Experimental Playground for Vertical Industries Spyros Denazis University of Patras, Greece 5GinFIRE.eu contact@5ginfire.eu 5GinFIRE 5GINFIRE is a three years Research
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationAutomotive Industry: Why the ITS B usinesses Need to C are about IPv6?
Automotive Industry: Why the ITS B usinesses Need to C are about IPv6? i.e. a presentation on IPv6 and C ooperative ITS Thierry.Ernst@inria.fr JRU LARA (INR IA & M ines ParisTech) http://www.lara.prd.fr/ipv6-its
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationTERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE
TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationINTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY
INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY Plains Communication Services ( PCS ), LLC and Plainstel.com provides its subscribers with access to the Internet only on the terms and conditions
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationCYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS
CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS Susanne Bieller, EUnited Robotics EC Workshop in the area of autonomous systems / robots / IoT Brussels, 13 July 2017 Different needs according to classification
More informationPRIVACY POLICY QUICK GUIDE TO CONTENTS
PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationInstruction For Use Laptop Internet On Mobile Via Wifi Hotspot
Instruction For Use Laptop Internet On Mobile Via Wifi Hotspot Follow the instructions to create a Wi-Fi hotspot on Android 4.4 Kitkat to share You can share your own cellular data connection with your
More informationDeliverable Final Data Management Plan
EU H2020 Research and Innovation Project HOBBIT Holistic Benchmarking of Big Linked Data Project Number: 688227 Start Date of Project: 01/12/2015 Duration: 36 months Deliverable 8.5.3 Final Data Management
More informationEuro 5G Cooperation with other European R&D Programmes
Euro 5G Cooperation with other European R&D Programmes In order to grow the 5G PPP initiative, its impact and relevance for the whole Digital Society, cooperation with other European R&D programmes is
More informationDISCERN Libraries User Guide
Distributed Intelligence for Cost-Effective and Reliable Distribution Network Operation DISCERN Libraries User Guide Author: OFFIS Date: 22.04.2016 www.discern.eu The research leading to these results
More informationD5.2 FOODstars website WP5 Dissemination and networking
D5.2 FOODstars website WP5 Dissemination and networking This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No 692276. DISCLAIMER
More informationTalenom Plc. Description of Data Protection and Descriptions of Registers
Talenom Plc. Description of Data Protection and Descriptions of Registers TALENOM DESCRIPTION OF DATA PROTECTION Last updated 14 March 2018 Scope Limitations Data protection principles Personal data Registers
More informationCloud versus direct with VNC Connect
VNC Connect security whitepaper Cloud versus direct with VNC Connect This document discusses strategies for choosing the best connectivity method for your business: establishing direct connections between
More informationEnhancing Critical Infrastructure Protection with innovative SECurity framework
Enhancing Critical Infrastructure Protection with innovative SECurity framework Manos Athanatos FORTH-ICS, Distributed Computing Lab H2020 SAINT Project Workshop 20/03/2018 The research leading to these
More information