A TRUST-BY-DESIGN FRAMEWORK FOR THE INTERNET OF THINGS

Size: px
Start display at page:

Download "A TRUST-BY-DESIGN FRAMEWORK FOR THE INTERNET OF THINGS"

Transcription

1 A TRUST-BY-DESIGN FRAMEWORK FOR THE INTERNET OF THINGS ESR3 - Davide Ferraris PhD University of Malaga, NICS lab Tutors: Prof. Javier Lopez, Dr. Carmen Fernandez Gago 1

2 Contents Introduction o Trust o Internet of Things Architecture Framework o K Model o Transversal Activities Use Case Scenario Conclusion 2

3 Introduction Introduction o Trust o Internet of Things Architecture Framework o K Model o Transversal Activities Use Case Scenario Conclusion 3

4 Trust Trust is difficult to define because: To believe that someone is good and honest and will not harm you, or that something is safe and reliable. Trustor and Trustee 4

5 Internet of Things 20.4 billions of devices will be connected by 2020 ( Heterogeneity Dinamicity Communication Trust is needed 5

6 Architecture Framework Introduction o Trust o Internet of Things Architecture Framework o K Model o Transversal Activities Use Case Scenario Conclusion 6

7 K Model 7

8 Context Always present Environment Services Properties (alone or composition) Dynamic 8

9 K Model 9

10 Need Characteristics of trust Type of Architecture Protocols 10

11 K Model 11

12 Requirements IEEE specification 12

13 Requirement Specification 13

14 K Model 14

15 Model SysML Trust Models o Evaluation o Decision 15

16 K Model 16

17 Development Top Down approach Bottom Up approach Depending on the previous and following phases Core of the framework Developer centric approach 17

18 K Model 18

19 Verification Check if the entity has been built right Verification of the functionalities Verification of the requirements related to the system Developer point of view Intermediate product 19

20 K Model 20

21 Validation Check if the right entity has been built The need must be met Validation of the requirements related to Real system environment Customer point of view Final product 21

22 K Model 22

23 Utilization Dynamicity of IoT must face with devices that (Join, Stay, Leave) the System 23

24 K Model (links) 24

25 Architecture Framework Introduction o Trust o Internet of Things Architecture Framework o K Model o Transversal Activities Use Case Scenario Conclusion 25

26 Transversal Activities Documentation Metrics Decision Gates Traceability Threat Analysis Risk Management Decision-Making 26

27 Documentation Connection Justification Procedures Guide Verba volant, scripta manent 27

28 Metrics Trust Metrics Performance Efficiency Measures 28

29 Decision Gates They permit to move between phases Back-Up in case something goes wrong 29

30 Traceability Connection between o Phases o Requirements o Activities and Phases Control Domino effects Help against Unintended Consequences 30

31 Threat Analysis Attacks o Internal o External Malfunctions Malwares 31

32 Risk Management Likelihood Severity Detectability 32

33 Decision Making Connected to many phases o Requirement o Model o Development o Utilization 33

34 Use Case Scenario Introduction o Trust o Internet of Things Architecture Framework o K Model o Transversal Activities Use Case Scenario Conclusion 34

35 Smart Cake Machine Smart Hub Smart Supermarke t Smart Fridge Smart Cake Machine 35

36 Smart Cake Machine Context o Smart Home o Trusted Smart entities Need o Smart Cake Machine Requirements o Security Requirement o Trust Requirement o Usability Requirement Models o Trusted ClassDiagram o Trusted RequirementDiagram 36

37 Smart Cake Machine Development o Top Down Verification o Verify the correct functionalities of the Smart Cake Machine Validation o Validate it in the cooperation with Smart Fridge and Smart Supermarkets Utilization o Join the Smart Home o Deal with join and leaving Smart devices 37

38 Conclusion Introduction o Trust o Internet of Things Architecture Framework o K Model o Transversal Activities Use Case Scenario Conclusion 38

39 Conclusion IoT has brought new security challenges Trust as a key Software, Security and System Engineering approach to ensure trust in an entity Trust and other security properties are included in the whole life cycle K-Model Transversal Activities 39

40 Future Work Validation of the Framework We will expand the phases of the framework Application to a real complex IoT scenario Application in an IoT System 40

41 Questions? Thanks to the European Commission, NeCS Project and to the university of Malaga for the opportunity given to me. This project has received funding from the European Union s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No This work reflects only the author s view and the Research Executive Agency is not responsible for any use that may be made of the information it contains. 41

(Project Number ) SecSoN Workshop, ACM SIGCOMM 2018 Budapest, 24 August Mike Surridge, University of Southampton IT Innovation Centre

(Project Number ) SecSoN Workshop, ACM SIGCOMM 2018 Budapest, 24 August Mike Surridge, University of Southampton IT Innovation Centre 5G-ENSURE (Project Number 671562) Trust Modelling in 5G Networks SecSoN Workshop, ACM SIGCOMM 2018 Budapest, 24 August 2018 Mike Surridge, University of Southampton IT Innovation Centre ms _at_ it-innovation.soton.ac.uk

More information

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,

More information

Open to the World. Dr. Anne Haglund-Morrissey Senior Policy Officer - Japan Desk DG Research and Innovation

Open to the World. Dr. Anne Haglund-Morrissey Senior Policy Officer - Japan Desk DG Research and Innovation Open to the World Dr. Anne Haglund-Morrissey Senior Policy Officer - Japan Desk DG Research and Innovation What is Horizon 2020? Horizon 2020 is the EU Framework Programme for Research & Innovation and

More information

Tax data analysis with secure computing. Dan Bogdanov, PhD Head of the Department of Privacy Technologies

Tax data analysis with secure computing. Dan Bogdanov, PhD Head of the Department of Privacy Technologies Tax data analysis with secure computing Dan Bogdanov, PhD Head of the Department of Privacy Technologies Tax revenue Tax records for people and companies Re-using tax records for data-driven policymaking

More information

5G-ENSURE Workshop, ETSI Security Week Sophia Antipolis, 16 June Mike Surridge, University of Southampton IT Innovation Centre

5G-ENSURE Workshop, ETSI Security Week Sophia Antipolis, 16 June Mike Surridge, University of Southampton IT Innovation Centre 5G-ENSURE (Project Number 671562) A Trust Model for 5G 5G-ENSURE Workshop, ETSI Security Week Sophia Antipolis, 16 June 2017 Mike Surridge, University of Southampton IT Innovation Centre ms _at_ it-innovation.soton.ac.uk

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

R&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security

R&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Overview of DG INFSO R&D on Trust & Security Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Setting the scene - The Digital Wave Sophia

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Cyber security: a building block of the Digital Single Market

Cyber security: a building block of the Digital Single Market Cyber security: a building block of the Digital Single Market Dr. Andreas Mitrakas Workshop Building blocks of the Ubiquitous Digital Single Market, European Parliament, 13/11/2014 European Union Agency

More information

Development, Analysis and Evaluation of Cyber Resilience Strategies

Development, Analysis and Evaluation of Cyber Resilience Strategies Development, Analysis and Evaluation of Cyber Resilience Strategies Prof. Dr. Axel Lehmann Prof. Dr. Udo Helmbrecht Institut für Technische Informatik, Universität der Bundeswehr München, Germany European

More information

Secure Societies in 2015

Secure Societies in 2015 Secure Societies in 2015 In the Horizon 2020 work programme Nicole Wyss National Contact Point Security & Transport Euresearch Head Office Nicole.wyss@euresearch.ch +41 31 380 60 04 Agenda 1. Why participate

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

THE CHAIN OF TRUST. Keeping Computing Systems More Secure. Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd.

THE CHAIN OF TRUST. Keeping Computing Systems More Secure. Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd. THE CHAIN OF TRUST Keeping Computing Systems More Secure Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd. Dick_Wilkins@phoenix.com Toby Nixon, Senior Standards Program Manager Windows and Devices

More information

R&D to shape the networks and services of the future

R&D to shape the networks and services of the future R&D to shape the networks and services of the future IEEE-ICC'13 Budapest, 12 th June 2013 Panel: Horizon 2020 Europe's major new collaborative R&D Programme Luis Rodríguez-Roselló European Commission

More information

WP2 Metrics of Cyber Security

WP2 Metrics of Cyber Security WP2 Metrics of Cyber Security WP2 Athens March 2018 CYBE Presented by: Jart Armin This work is performed within the SAINT Project (Systemic Analyser in Network Threats), with the support of the European

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

An Integrated Framework for Multi-layer Certification-based Assurance

An Integrated Framework for Multi-layer Certification-based Assurance 1 An Integrated Framework for Multi-layer Certification-based Assurance ACSAC 2014 - Layered Assurance Workshop New Orleans, Louisiana, USA. December 2014 Authors: Rajesh Harjani, Marcos Arjona, Javier

More information

Security Enhancements

Security Enhancements https://www.shield-h2020.eu/ Security Enhancements By means of NFV and Cognitive Security Managed Security Services (MSS) and NFV NFV becomes a key enabler for security services Security VNFs are emerging

More information

Illinois Cyber Navigator Program

Illinois Cyber Navigator Program Illinois Cyber Navigator Program Illinois State Board of Elections PA 100-0587 (10 ILCS 5/1A-55) Sec. 1A-55. Cyber security efforts. The State Board of Elections shall provide by rule, after at least 2

More information

IoT privacy risk management in ANASTACIA project

IoT privacy risk management in ANASTACIA project ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

PROJECT HIGHLIGHTS, EXPECTED IMPACT & FUTURE DIRECTIONS

PROJECT HIGHLIGHTS, EXPECTED IMPACT & FUTURE DIRECTIONS PROJECT HIGHLIGHTS, EXPECTED IMPACT & FUTURE DIRECTIONS Dr. Angelos Amditis (project coordinator) Institute of Communication and Computer Systems (ICCS), Research Director Final Event AstaZero, Sandhult,

More information

Tool-Supported Cyber-Risk Assessment

Tool-Supported Cyber-Risk Assessment Tool-Supported Cyber-Risk Assessment Security Assessment for Systems, Services and Infrastructures (SASSI'15) Bjørnar Solhaug (SINTEF ICT) Berlin, September 15, 2015 1 Me Bjørnar Solhaug Bjornar.Solhaug@sintef.no

More information

Soumya Kanti Datta Research Engineer

Soumya Kanti Datta Research Engineer Testing Semantic Interoperability Soumya Kanti Datta Research Engineer Email dattas@eurecom.fr 22/03/2018 Testing Semantic Inteoperability 2 Roadmap Introduction Testing Semantic Interop Survey Conclusion

More information

Research Infrastructures and Horizon 2020

Research Infrastructures and Horizon 2020 Ana Arana Antelo DG Research & Head of Research Infrastructures ERF Workshop - Hamburg, 31 May 2012 Research Infrastructures and Horizon 2020 The EU Framework Programme for Research and 2014-2020 Research

More information

Agenda. 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions

Agenda. 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions 5G for Remote Areas Agenda 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions 5G Brazil Project Private autonomous project under Telebrasil

More information

How to return control over user data back to the user The rethink framework

How to return control over user data back to the user The rethink framework How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon

More information

European Responsible Care Forum. Security & Safe Maintenance

European Responsible Care Forum. Security & Safe Maintenance European Responsible Care Forum Security & Safe Maintenance Brussels, Thursday 7 April 2011 Mike Zeegers - Director Europe Agenda: History IMPROVE PROJECT To enhance Secure infrastructure Objective of

More information

EU Research for Secure Societies

EU Research for Secure Societies EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies

More information

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network

More information

Securing Europe s IoT Devices and Services

Securing Europe s IoT Devices and Services Securing Europe s IoT Devices and Services Dr. Evangelos OUZOUNIS Head of Unit - Secure Infrastructure and Services Validation Workshop Berlin 16 October 2015 European Union Agency for Network and Information

More information

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services David Nuñez, Isaac Agudo, and Javier Lopez Network, Information and Computer Security Laboratory (NICS Lab)

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

WP6 D6.2 Project website

WP6 D6.2 Project website WP6 D6.2 Project website Project title: Project Acronym: Promoting Youth Scientific Career Awareness and it Attractiveness through Multistakeholder Cooperation MultiCO Project ID: 665100 Prepared by: University

More information

GlobalPlatform Trusted Execution Environment (TEE) for Mobile

GlobalPlatform Trusted Execution Environment (TEE) for Mobile GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform

More information

Adaptive Dispatching of Incidences based on Reputation for SCADA Systems

Adaptive Dispatching of Incidences based on Reputation for SCADA Systems C. Alcaraz, et al., Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems, 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus09), LNCS, pp. 86-94,

More information

A Universal Micro-Server Ecosystem Exceeding the Energy and Performance Scaling Boundaries

A Universal Micro-Server Ecosystem Exceeding the Energy and Performance Scaling Boundaries A Universal Micro-Server Ecosystem Exceeding the Energy and Performance Scaling Boundaries www.uniserver2020.eu UniServer facilitates the advent of IoT solutions through the adoption of a distributed infrastructure

More information

UCD Centre for Cybersecurity & Cybercrime Investigation

UCD Centre for Cybersecurity & Cybercrime Investigation UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder

More information

The Industrial Internet: Opportunities, Disruptions and Standards. Stephen Mellor Chief Technical Officer Industrial Internet Consortium

The Industrial Internet: Opportunities, Disruptions and Standards. Stephen Mellor Chief Technical Officer Industrial Internet Consortium The Industrial Internet: Opportunities, Disruptions and Standards Stephen Mellor Chief Technical Officer Industrial Internet Consortium Industrial vs. Consumer Internet of Things Similar Technology Drivers

More information

Bringing EU Cybersecurity & privacy research results closer to the market

Bringing EU Cybersecurity & privacy research results closer to the market Bringing EU Cybersecurity & privacy research results closer to the market EU-Unity Workshop 11 October 2017, Tokyo, Japan Nicholas Ferguson, Trust-IT Services & Coordinator, Cyberwatching.eu www.cyberwatching.eu

More information

ESET SMART SECURITY 10

ESET SMART SECURITY 10 ESET SMART SECURITY 10 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security software.

More information

EXAMINATION [The sum of points equals to 100]

EXAMINATION [The sum of points equals to 100] Student name and surname: Student ID: EXAMINATION [The sum of points equals to 100] PART I: Meeting Scheduling example Description: Electronic meeting Scheduling system helps meeting initiator to schedule

More information

SCOTT Methodology for Building Blocks and Use Cases

SCOTT Methodology for Building Blocks and Use Cases SCOTT - Jan2018 SCOTT Methodology for Building Blocks and Use Cases Josef Noll, Maghsoud Morshedi, Toktam Ramezani secure connected trustable things SCOTT has received funding from the Electronic Component

More information

SECURED SECurity at the network EDge

SECURED SECurity at the network EDge SECURED SECurity at the network EDge Antonio Lioy Politecnico di Torino < lioy @ polito.it > TENACE meeting Sestriere (Italy) January 22 nd, 2015 The SECURED FP7 project FP7 call 10 Collaborative Project

More information

FlexLogIC Manufacturing innovation by PragmatIC

FlexLogIC Manufacturing innovation by PragmatIC FlexLogIC Manufacturing innovation by PragmatIC Introductory presentation www.flexlogic.systems The FlexLogIC programme has received funding from the European Union s Horizon 2020 SME Instrument (grant

More information

Cybercrime what is the hidden nature of digital criminal activities nowadays?

Cybercrime what is the hidden nature of digital criminal activities nowadays? Cybercrime what is the hidden nature of digital criminal activities nowadays? The Internet has opened a parallel platform for communications, exchange of information and goods. While the digital dimension

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

A European Perspective on Smart Grids

A European Perspective on Smart Grids A European Perspective on Smart Grids Patricia Arsene Unit Smart Cities and Sustainability CONNECT/H Sustainable & Secure Society DG Communication Networks, Content and Technology European Commission European

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018

Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 Testimony of Gerard Keegan CTIA Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 On behalf of CTIA, the trade association for the wireless communications industry, thank you

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Introduction to Trusted Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Summer Term 2017 Roadmap: Trusted Computing Motivation

More information

The exida. IEC Functional Safety and. IEC Cybersecurity. Certification Programs

The exida. IEC Functional Safety and. IEC Cybersecurity. Certification Programs The exida IEC 61508 - Functional Safety and IEC 62443- Cybersecurity Certification Programs V1 R1 November 10, 2017 exida Sellersville, PA 18960, USA, +1-215-453-1720 Munich, Germany, +49 89 4900 0547

More information

SEC-04-DRS-2017: Broadband communication systems

SEC-04-DRS-2017: Broadband communication systems SEC-04-DRS-2017: Broadband communication systems Policy background Strong interest from Member States, both on ministerial level as well as on end-user level. Cross-border communication issues between

More information

Social Value Creation via IoT

Social Value Creation via IoT Social Value Creation via IoT Smart City, Enterprise and Service Solutions Kurt Jacobs kurt.jacobs@necect.com NEC Enterprise Communication Technologies 3 June 2016 The Earth in 2050 (Source:OECD, FAO,

More information

Opportunities for collaboration in Big Data between US and EU

Opportunities for collaboration in Big Data between US and EU Opportunities for collaboration in Big Data between US and EU Vasilis Papanikolaou ATC ilab, Greece ICT Policy, Research and Innovation for a Smart Society www.picasso-project.eu PICASSO has received funding

More information

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:

More information

Odyssey Entertainment Marketing, LLC Privacy Policy

Odyssey Entertainment Marketing, LLC Privacy Policy Odyssey Entertainment Marketing, LLC Privacy Policy We collect the following types of information about you: Information you provide us directly: We ask for certain information such as your username, real

More information

Advanced Systems Security: Ordinary Operating Systems

Advanced Systems Security: Ordinary Operating Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018 The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018 European Union Agency for Network and Information Security Outline 1. Cybersecurity

More information

Research Infrastructures and Horizon 2020

Research Infrastructures and Horizon 2020 Research Infrastructures and Horizon 2020 Christos VASILAKOS DG Research & 1 st CoPoRI Workshop on EoE 11-12 June 2012 Hamburg, DE The EU Framework Programme for Research and 2014-2020 Research and Europe

More information

Work Package 6 Dissemination and Exploitation Involved Partners: Planet Media, City Passenger, LTU, CTI

Work Package 6 Dissemination and Exploitation Involved Partners: Planet Media, City Passenger, LTU, CTI Ref. Ares(2016)1549823-31/03/2016 Information and Communication Technologies (H2020- ICT-12-2015) Integrating experiments and facilities in FIRE+Innovation actions Deliverable 6.1 Project Website Work

More information

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview

More information

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING A GUIDE TO 12 CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING There is a major difference between perceived and actual security. Perceived security is what you believe to be in place at

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications

More information

TREDISEC Framework. March Co-funded by the Horizon 2020 Framework Programme of the European Union

TREDISEC Framework. March Co-funded by the Horizon 2020 Framework Programme of the European Union TREDISEC Framework Overview of the GUI March 2018 Co-funded by the Horizon 2020 Framework Programme of the European Union Table of Content Framework Landing Commons Search Creation of artefacts Management

More information

Smart Gas Grids. Manuel Sánchez, Ph.D. Team Leader Smart Grids Directorate General for Energy European Commission

Smart Gas Grids. Manuel Sánchez, Ph.D. Team Leader Smart Grids Directorate General for Energy European Commission Smart Gas Grids Manuel Sánchez, Ph.D. Team Leader Smart Grids Directorate General for Energy European Commission Smart Gas Grids in practice Brussels 1st December 2015 Energy Low carbon economy requires

More information

An Integrated Platform for Increased FLEXIbility in smart TRANSmission grids with STORage Entities and large penetration of Renewable Energy Sources

An Integrated Platform for Increased FLEXIbility in smart TRANSmission grids with STORage Entities and large penetration of Renewable Energy Sources An Integrated Platform for Increased FLEXIbility in smart TRANSmission grids with STORage Entities and large penetration of Renewable Energy Sources Project presentation This project has received funding

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

CS 307: Software Engineering. Lecture 10: Software Design and Architecture

CS 307: Software Engineering. Lecture 10: Software Design and Architecture CS 307: Software Engineering Lecture 10: Software Design and Architecture Prof. Jeff Turkstra 2017 Dr. Jeffrey A. Turkstra 1 Announcements Discuss your product backlog in person or via email by Today Office

More information

Tolbert Family SPADE Foundation Privacy Policy

Tolbert Family SPADE Foundation Privacy Policy Tolbert Family SPADE Foundation Privacy Policy We collect the following types of information about you: Information you provide us directly: We ask for certain information such as your username, real name,

More information

CTI Capability Maturity Model Marco Lourenco

CTI Capability Maturity Model Marco Lourenco 1 CTI Capability Maturity Model Cyber Threat Intelligence Course NIS Summer School 2018, Crete October 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Moving from Prevention to Detection March 2017

Moving from Prevention to Detection March 2017 www.pwc.com Moving from Prevention to Detection Le Tran Hai Minh Manager Cyber Security 29 Agenda Slide Cyber Security Statistics 3 How to Stay Confidence 8 Contact 19 2 Cyber Security Statistics 3 Cyber

More information

NRENs and IoT Security: Challenges and Opportunities. Karen O Donoghue TICAL 2018 Cartagena 4 September 2018

NRENs and IoT Security: Challenges and Opportunities. Karen O Donoghue TICAL 2018 Cartagena 4 September 2018 NRENs and IoT Security: Challenges and Opportunities Karen O Donoghue TICAL 2018 Cartagena 4 September 2018 The number of IoT devices and systems connected to the Internet will be more than 5x the global

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

Strategic Transport Research and Innovation Agenda - STRIA

Strategic Transport Research and Innovation Agenda - STRIA Strategic Transport Research and Innovation Agenda - STRIA Brussels, 15 September 2016 Cristina Marolda DG Mobility & Transport European Commission Mobility & Transport Why do we need a new transport R&I

More information

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013 Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing

More information

Towards new avenues in EU-US ICT collaboration:

Towards new avenues in EU-US ICT collaboration: Towards new avenues in EU-US ICT collaboration: 5G, Big Data, Internet of Things and Cyber Physical Systems for smart cities, smart transport and smart energy Project overview ICT Policy, Research and

More information

French & American Educational System. Collaboration between Rutgers & Paris 6. M.S. : Distributed Systems & Applications

French & American Educational System. Collaboration between Rutgers & Paris 6. M.S. : Distributed Systems & Applications French & American Educational System French system American system Doctorat Ph.D Collaboration between Rutgers & Paris 6 22-23 Master Master s degree 21-22 Supervised by : Prof. Liviu Iftode - Univ. of

More information

Guard Your Business with the Best Network Security. ds-inc.com (609)

Guard Your Business with the Best Network Security. ds-inc.com (609) Guard Your Business with the Best Network Security ds-inc.com (609) 655 1707 Guard Your Business with the Best Network Security With top-tier network security and a strong security policy that follows

More information

Control System Security for Social Infrastructure

Control System Security for Social Infrastructure 277 Hitachi Review Vol. 63 (201), No. 5 Featured Articles Control System Security for Social Infrastructure Toshihiko Nakano, Ph.D. Katsuhito Shimizu Tsutomu Yamada Tadashi Kaji, Dr. Info. OVERVIEW: The

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence The 3rd Annual Intelligence and National Security Forum Jim McCarthy NIST / NCCoE 05/11/2018 This presentation is unclassified in its entirety Foundations Collaborative Hub The NCCoE assembles experts

More information

WHOIS Accuracy Study Findings, Public Comments, and Discussion

WHOIS Accuracy Study Findings, Public Comments, and Discussion I C A I NC N A N M N E ME ET EI NT G I N NG O N. o. 3 83 8 2 0 -- 2 55 JJ uu nn e E 2 20 01 10 0 WHOIS Accuracy Study Findings, Public Comments, and Discussion 23 June 2010 David Giza, ICANN Jenny Kelly,

More information

Enhancing Critical Infrastructure Protection with innovative SECurity framework

Enhancing Critical Infrastructure Protection with innovative SECurity framework Enhancing Critical Infrastructure Protection with innovative SECurity framework Manos Athanatos FORTH-ICS, Distributed Computing Lab H2020 SAINT Project Workshop 20/03/2018 The research leading to these

More information

Patient Information Security

Patient Information Security Patient Information Security An overview of practice and procedure UK CAB Meeting 13th April 2012 Nathan Lea Senior Research Associate CHIME, UCL Overview - Questions that have been asked What happens

More information

WP3: Policy and Best Practice Harmonisation

WP3: Policy and Best Practice Harmonisation Authentication and Authorisation for Research and Collaboration WP3: Policy and Best Practice Harmonisation David Groep AARC2 2018 AL/TL meeting 12-13 September, 2018 Amsterdam 0.4 Policy and best practice

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

Secure Societies Work Programme Call

Secure Societies Work Programme Call Secure Societies Work Programme 2018-2020 2019 Call Andrea DE CANDIDO Deputy Head of Unit Innovation and Industry for Security European Commission andrea.de-candido@ec.europa.eu Outline 1. Policy context

More information

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of

More information

New Business Opportunities Through Evolved OSS/BSS. SEMAFOUR vision on unified Self-Management

New Business Opportunities Through Evolved OSS/BSS. SEMAFOUR vision on unified Self-Management New Business Opportunities Through Evolved OSS/BSS SEMAFOUR vision on unified Self-Management Luis M Campoy Radio 12.10.2014 01 From SON functionalities to integrated management 01 Why Self-Management?

More information

Applying the Semantic Web Layers to Access Control

Applying the Semantic Web Layers to Access Control J. Lopez, A. Mana, J. maria troya, and M. Yague, Applying the Semantic Web Layers to Access Control, IEEE International Workshop on Web Semantics (WebS03), pp. 622-626, 2003. NICS Lab. Publications: https://www.nics.uma.es/publications

More information

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki

More information

Upcoming EC Systems Research Perspectives

Upcoming EC Systems Research Perspectives Upcoming EC Systems Research Perspectives Neeraj Suri Dept. of Computer Science TU Darmstadt, Germany Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de EU Computing Systems Strategy

More information

Challenges and Opportunities in Cyber Physical System Research

Challenges and Opportunities in Cyber Physical System Research Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy

More information

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

EU GDPR and  . The complete text of the EU GDPR can be found at  What is GDPR? EU GDPR and Email The EU General Data Protection Regulation (GDPR) is the new legal framework governing the use of the personal data of European Union (EU) citizens across all EU markets. It replaces existing

More information

Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020

Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020 Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020 Prof. Gerhard Fettweis Vodafone Chair Professor at TU Dresden Coordinator 5G Lab Germany PICASSO 5G Networks Expert Group Chair

More information

The Future of Solid State Lighting in Europe

The Future of Solid State Lighting in Europe PLUS Conference "LED Lighting Strategies for Urban Spaces", 20/6/2012 The Future of Solid State Lighting in Europe Michael Ziegler European Commission DG Information Society and Media [-> DG CONNECT -

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information