Innovative means to exchange telecom fraud and network security risks information
|
|
- Eugene Geoffrey Stevens
- 8 years ago
- Views:
Transcription
1 Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing fraud and network security risks information Innovation in procurement Athens, Electronic Crime Conf., Nov
2 Accelerating innovation through collaboration The Eurescom community 17 members Including major European telcos Athens, Electronic Crime Conf., Nov
3 Benefits of collaboration Higher competitiveness Shorter time-to-market Interoperability Peer interaction Influence Benchmarking Cost / Risk sharing Organisational learning Athens, Electronic Crime Conf., Nov Collaborative innovation process Standards Service/ Product Eurescom Development Applied Research Basic Research Athens, Electronic Crime Conf., Nov
4 Eurescom servicing process Innovative solution Managing/Supporting collaborative R&D activity Identifying partners Organising collaboration Selection of best collaborative R&D activity Decision to collaborate Strategic consulting Project management, tech./ admin. support, workshops,... Via Eurescom network, cooperation partners, others Eurescom Study / Project, EU, EUREKA, Forum,... Analysis of pros and cons: collaboration vs. alone Definition of the subject and the expected solution Need for innovation Athens, Electronic Crime Conf., Nov Collaborative project options Project duration: ~ 1 2 years Eurescom members Study Programme Project duration: ~ 2 3 months Project duration: ~ 2 3 years (FP6 IPs) Eurescom members Project Programme Study duration: ~ years Fora Initiatives Set-up time: ~ 0.5 year Lifespan: ~ 3-5 years Bi-/Multi-lateral cooperation agreements Set-up time: ~ 0.5 year Lifespan: ~ 1-2 years Athens, Electronic Crime Conf., Nov
5 Why our members use us Competitive fees High flexibility Support from major telcos Reliable infrastructure Comprehensive knowledge Fast, efficient processes Experienced managers Established expert network Athens, Electronic Crime Conf., Nov Accelerate R&D in ICT! Learn more at Athens, Electronic Crime Conf., Nov
6 INNO-UTILITIES Innovation-Friendly Public Procurement & Fight Against Telecommunications Fraud and Security Threats Cost sharing RTD & Demonstration project under the 5 th Framework Programme of the EU Athens, Electronic Crime Conf., Nov Objectives Execute a trans-national demonstration of a network centric secure information system to store fraud and network risks information in the telecoms area Develop policy recommendations for the creation of an innovation-friendly procurement framework in Europe Athens, Electronic Crime Conf., Nov
7
8 Identifying the market need Interaction with user groups and associations Direct liaisons with ETNO, FIINA, HFF Results from joint collaborative Eurescom projects Capturing the user requirements Free form expression of problem statement and expectations Multi-lateral discussion with representatives of the user groups and associations Athens, Electronic Crime Conf., Nov Generic Problem Statement The demonstrator is a network information centric system working as a repository for: Services / information that can be sold to everybody Services / information that can be sold to eligible partners Internal risk analysis and survivability study Confidential information for exchange among affected stakeholders in a certain market Athens, Electronic Crime Conf., Nov
9 Identifying fraud types Fraud types are a trans-european issue and an analysis for individual countries does not yield differences This statement is substantiated by results of joint collaborative Eurescom projects Pre-study on the prevention and limitation of telecommunications fraud and Application of Intelligent Techniques to Telecommunications Fraud Detection The results of these projects cover the countries: UK, Portugal, Italy, Greece, The Netherlands, Spain, Sweden and Ireland Athens, Electronic Crime Conf., Nov
10 Network related security risks The network security risks are in effect possible attacks on the network with the following intentions: Steal services, Steal information/data (privacy) Steal identity, Stop service for individual subscribers or groups of subscribers Take the whole network down Athens, Electronic Crime Conf., Nov Attack Event Tool Physical Attack Information Exchange User Command Script of Commands Autonomous Agent Vulnerability Design Implementation Configuration Action Probe Scan Flood Authenticate Bypass Target Account Process Data Component Computer Unauthorized Result Increased Access Disclose of Information Corruption of Information Denial of Service Theft of Resources Toolkit Spoof Network Distributed Tool Read Internetwork Data Tap Copy Steal Modify Delete 10
11 Requirements analysis Security requirements No standards available, only guides ITU-T X ISO/IEC FCD ITU-T manual, Security in Telecommunications and Information Technology Operational requirements Best practice guide ISO Athens, Electronic Crime Conf., Nov Requirements analysis Legal and corporate requirements Convention on Cybercrime Data retention laws The role of electronic digital signatures for admissibility of electronic evidence in court Athens, Electronic Crime Conf., Nov
12 Functional requirements User requirements categorized into: Information types The information repository as the central element of the system The connectivity how to access the system User interface System security (as a collection of components) and survivability Legal Athens, Electronic Crime Conf., Nov
13 Deliverables Project Products System architecture Specification of components Specification of storage scheme Functional prototype Done Done Done April 2005 Survivable version of prototype (after intrusion testing) October 2005 Procurement What is the link? Innovative procurement today is associated with e-business platforms E-procurement is already in place in some organisations, companies Information exchange, tendering, bidding, etc. via electronic means (i.e. Internet) This means that most known types of security risks (and new ones) affect e-procurement Thus offering potential for fraud in the e- procurement process Athens, Electronic Crime Conf., Nov
14 Is e-procurement innovative? Some public procurement procedures distinguish between regular and innovative procurement and highlight references to the use of electronic media But if the same procedures stay in place, then we only changed the vehicle, the road remains the same Athens, Electronic Crime Conf., Nov Finally we distinguish Innovative procurement Developing policy recommendations that more effectively acknowledge and support the use of new electronic media Procurement of innovation How to procure an innovative product, that by definition does not exist yet? Requires mediation and information exchange to find out what the market and current state-of-art technology is capable of delivering Athens, Electronic Crime Conf., Nov
15 More information Anastasius Gavras Schloss-Wolfsbrunnenweg Heidelberg Germany Tel: Athens, Electronic Crime Conf., Nov
NETWORK SECURITY ASPECTS & VULNERABILITIES
NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect
More informationCOMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Regulatory Policy Standardisation Brussels, 9 th November 2005 Doc.: 34/2005 Rev. 1 EN COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34
More informationCyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
More informationInternet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
More informationEUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator
EUREKA Funding Schema in Turkey Hüseyin GÖREN EUREKA National Project Coordinator İstanbul ITEA2 Event, February 6,2008 EUREKA initiative is... intergovermental, Austria Belgium Croatia Czech Republic
More informationCyber Security. A professional qualification awarded in association with University of Manchester Business School
ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security
More informationPRACE An Introduction Tim Stitt PhD. CSCS, Switzerland
PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland High Performance Computing A Key Technology 1. Supercomputing is the tool for solving the most challenging problems through simulations; 2. Access
More informationCloud for Europe trusted Cloud Services for the European market for public administrations
Cloud for Europe trusted Cloud Services for the European market for public administrations Public sector challenges (European egovernment Action Plan 2011-2015) 2 Establishing a Trusted Cloud Europe A
More informationSupporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More informationEUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Innovation policy Technology for innovation; ICT industries and E-business Brussels, 7 th December 2005 DG ENTR/D4 M 376 - EN STANDARDISATION
More informationPROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
More informationEFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationFraud Detection for Next-Generation Networks
Fraud Detection for Next-Generation Networks Name of company/ies submitting case study: University of Deusto Web links to company/ies submitting case studies: http://www.deusto.es http://www.fundacion-deusto.deusto.es/
More informatione-sens Electronic Simple European Networked Services Rome, 16.10.2015
e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Goal To improve the cross-border access of - citizens - businesses to public services in Europe by provision of interoperable
More informationNetwork Security Innovation Platform
Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation
More informationNationwide Deployment of Social Alarms in Sweden
Nationwide Deployment of Social Alarms in Sweden ehealth forum May 13 th 2014, Athens Greece The EIP AHA Scale-up Strategy Background problems and uncertainties Background the root of the problem The telecommunication
More informationInformation Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
More informationChallenges of Health Sector
The Informed Patient Dublin, 17-18 February, 2004 The role of the information management and of new technologies in developing healthcare for patients and citizens Jean-Claude Healy and Diane Whitehouse
More informationInformation Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationResearch Infrastructures in Horizon 2020
Research Infrastructures in Horizon 2020 Philippe Froissard Deputy Head of Unit - Research Infrastructures European Commission DG Research & Innovation Research Infrastructures Research infrastructures
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationSeamless ICT Infrastructure Security.
Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange
More informationBasics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
More informationORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
More informationRegulatory Framework for Communications Security and Privacy in Greece
Regulatory Framework for Communications Security and Privacy in Greece Georgia Bafoutsou, Nikolaos Antoniadis, Eugenia Nikolouzou, Athanasios Panagopoulos Authority for the Assurance of Communications
More informationInternet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net
Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development
More informationSETTING THE STANDARD FOR SUPPLY CHAIN SECURITY
Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association
More informationAPPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
More informationESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationNetwork security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
More informationUnit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationIngate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
More informationVehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
More informationCybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
More informationANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN
Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D
More informationSecurity and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
More informationHow To Secure An Extended Enterprise
Data Security Initiatives The Layered Approach Melissa Perisce Regional Director, Global Services, South Asia April 25, 2010 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Intel Case Study Asia North
More informationCertification of Electronic Health Record systems (EHR s)
Certification of Electronic Health Record systems (EHR s) The European Inventory of Quality Criteria Georges J.E. DE MOOR, M.D., Ph.D. EUROREC EuroRec The «European Institute for Health Records» A not-for-profit
More informationEuropean Quality Labelling, Certification, Electronic Health Record systems (EHRs) gf v1
European Quality Labelling, Certification, Electronic Health Record systems (EHRs) gf v1 EuroRec: current standing on EHR certification in Europe AGENDA 1. The EuroRec Institute 2. EHR-systems Certification:
More informationBRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
More informationPreventing fraud and corruption in public procurement
Preventing fraud and corruption in public procurement CRIM, European Parliament 24 September 2012 Brussels János Bertók Head of division Public Sector Integrity OECD Data on trends in procurement Size
More informationPublic consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
More informationCOSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
More informationBuilding up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Overview about the Microsoft Reputation Service (MRS), Microsoft Malware Protection Center (MMPC)
More informationINTERNATIONAL PRICE COMPARISON: THE CYPRIOT EXAMPLE. Athos Tsinontides Health Insurance Organisation
INTERNATIONAL PRICE COMPARISON: THE CYPRIOT EXAMPLE Athos Tsinontides Health Insurance Organisation CYPRUS CYPRUS Kypros Demographics Population (2004): Gross Domestic Product (GDP): Total Health Expenditure
More informationNational Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In
More informationThe FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
More informationCourse: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management
Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security
More informationConverged Video Network Security
S T R A T E G I C W H I T E P A P E R Converged Video Network Security How service providers can counter with the various security risks associated with implementing IPTV This white paper: Describes the
More informationFighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty
Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal
More informationCouncil Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime
COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The
More informationPRIVACY AND DATA SECURITY MODULE
"This project has been funded under the fourth AAL call, AAL-2011-4. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which
More informationETIS Information Security in Telecommunications
ETIS Information Security in Telecommunications ENISA workshop on providers resilience 29 October 2009, Paris Fred Werner, Business Development Manager - ETIS Mission & Vision» What is ETIS? ETIS is a
More informationFostering Information Security Awareness Among Responding Countries
Unclassified DSTI/ICCP/REG(2005)1/FINAL DSTI/ICCP/REG(2005)1/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Dec-2005
More informationEuroRec (http://www.eurorec.org )
EuroRec (http://www.eurorec.org ) The «European Institute for Health Records» A not-for-profit organisation, established April 16, 2003 Mission: the promotion of high quality Electronic Health Record systems
More informationPEPPOL - esignature. eprocurement Meeting epractise Vienna, 24th March 2011 Lars Thölken, Deputy Work Package Manager esignature. www.peppol.
www.peppol.eu PEPPOL - esignature eprocurement Meeting epractise Vienna, 24th March 2011 Lars Thölken, Deputy Work Package Manager esignature The PEPPOL project Result of the European Competitiveness and
More informationState of the Israeli Technology Industry and the Future. Dr. Orna Berry Venture Partner, Gemini Israel Funds
State of the Israeli Technology Industry and the Future Dr. Orna Berry Venture Partner, Gemini Israel Funds 2002 ICT GDP - NIS 33 billion 17% of business sector GDP. OECD highest - compared to 10-11% in
More informationEXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS
EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS Ian Green Manager, Cybercrime & Intelligence Commonwealth Bank of Australia Session ID: GRC T17 Session Classification: ADVANCED WHY? What keeps you
More informationCyber Security. A professional qualification awarded in association with University of Manchester Business School
ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security
More informationThe European Entrepreneur Exchange Programme
The European Entrepreneur Exchange Programme Users Guide 2 Contents 1.0 Introduction... 5 2.0 Objectives... 6 3.0 Structure... 7 3.1 Basic elements... 7 3.2 Four phases... 8 4.0 Implementation... 9 4.1
More informationStudents: undergraduate and graduate students who are currently enrolled in universities
DUO-Korea: 1. General Description CAUTION: If any application falls under the following 3 cases, the application is disqualified and will not be considered for selection. If such case is found after the
More informationPrivacy and Security within an Interoperable EHR
1 Privacy and Security within an Interoperable EHR Stan Ratajczak Director Privacy and Security Solutions Architecture Group November 30, 2005 Electronic Health Information and Privacy Conference Ottawa
More informationERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME
PRESS DOSSIER INDEX PRESS DOSSIER...1 INDEX...2 ERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME...3 WHO CAN PARTICIPATE?...5 WHAT BENEFITS AND FOR WHOM?...6 HOW DOES IT WORK? STRUCTURE AND IMPLEMENTATION...7
More informationSecurity aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
More informationWork package 2 Analysis, Guidelines and recommendations
Deliverable Work Package 1 Collating and sharing good practice 1: Guidelines on how to implement Task 1.2: Innovative Procurement innovative procurement 2: Identification of fit for purpose cooperation
More informationApproach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
More informationCooperation in Securing National Critical Infrastructure
Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information
More informationPre-Commercial Procurement (PCP)
Pre-Commercial Procurement (PCP) Tsanidis Vassilis DG CONNECT F2 unit ( Innovation ) Rationale Health care Climate Change Energy Efficiency Transport Security q Public sector is faced with important societal
More informationWorkshop on Collaborative Security and Privacy Technologies
Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin Trust and Society Trustworthy systems essential
More informationData Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
More informationSECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
More informationGood practice of dissemination and exploitation results in Latvia
Good practice of dissemination and exploitation results in Latvia Dr.phys. Gunta Šlihta Vice-director, Institute of Physical Energetics Rīga, / 03 / 03 Methods of transfer of project results in the Baltic
More informationService management evolution
management evolution Vilho Räisänen 1, Wolfgang Kellerer 2, Pertti Hölttä 3, Olavi Karasti 4 and Seppo Heikkinen 4 Abstract This paper presents an outline for the evolution of service management. The outline
More informationPhishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud
1 st Half 2009 Committed to Wiping Out Internet Scams and Fraud January June 2009 Phishing Report Scope The quarterly APWG analyzes phishing attacks reported to the APWG by its member companies, its Global
More informationLegislative Council Panel on Information Technology and Broadcasting. Information Security
For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest
More informationDIGITAL FORENSICS CONSORTIUM
DIGITAL FORENSICS CONSORTIUM CYBERHUNTING COMPETITIONS Focusing on the Critical Skills and Innovative Approach to Effectively Characterize the Digital Environment Nevin Taylor DFC President/CEO The President
More informationSecurity risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
More informationehealth, mhealth and Big Data
HEALTH IT FORUM MEDICA November 12, 2014 ehealth, mhealth and Big Data Jaakko Aarnio, Dr Tech Research Programme and Policy Officer Health and Well-Being Unit (H1) DG CONNECT, European Commission Outline
More informationCall for Joint Collaborative Project Proposals On Technology & Innovation Cooperation between Spain, Germany, France and the United Kingdom
Call for Joint Collaborative Project Proposals On Technology & Innovation Cooperation between Spain, Germany, France and the United Kingdom EUREKA Project Applications and funding applications will be
More information7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
More informationOverview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
More informationHow To Become A Member Of Europol
The Hague, 08 September 2015 Reg. nº: Europol/2015/TA/AD7/219 VACANCY NOTICE Name of the Post: Senior Specialist ICT Solutions Architect (AD7), within the ICT Business Area Reporting to: Senior Specialist
More informationPublic Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009
Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Presenter Adam Mambi,(Advocate of High Court) -Deputy Executive Secretary, Law Reform Commission Tanzania
More informationThe SedNet project. Jos Brils. SedNet coordinator. Netherlands Organisation for Applied Scientific Research
The SedNet project Jos Brils SedNet coordinator Netherlands Organisation for Applied Scientific Research Mission To be a European network for environmentally, socially and economically viable practices
More informationTOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division
TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS Paulo Magina Public Sector Integrity Division 10 th Public Procurement Knowledge Exchange Platform Istanbul, May 2014 The Organization for Economic
More informationCloud for Europe lessons learned
Cloud for Europe lessons learned Public sector challenges (European egovernment Action Plan 2011-2015) 2 Elevator Pitch Public sector cloud use as a collaboration between public authorities and industry
More informationHow To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
More informationEuropean Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS
European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute
More informationCustomer or you or your means the purchaser of KYOsupport.
KYOsupport Fmpd TERMS AND CONDITIONS 1 Definitions Customer or you or your means the purchaser of KYOsupport. Kyocera Mita or we or our or us refers to the Kyocera Mita sales companies in the following
More informationReducing the Cost and Complexity of Web Vulnerability Management
WHITE PAPER: REDUCING THE COST AND COMPLEXITY OF WEB..... VULNERABILITY.............. MANAGEMENT..................... Reducing the Cost and Complexity of Web Vulnerability Management Who should read this
More informationThe self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
More informationResidual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)
Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening
More informationA Comprehensive Study on Cloud Computing Standardization
A Comprehensive Study on Cloud Computing Standardization Dr. Mukesh Chandra Negi Project Manager, Tech Mahindra Ltd, Noida, India ABSTRACT: Standard is a trust between standardization body, buyers and
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationRelease: 1. ICANWK607A Design and implement wireless network security
Release: 1 ICANWK607A Design and implement wireless network security ICANWK607A Design and implement wireless network security Modification History Release Release 1 Comments This Unit first released with
More informationThe new 27000 Family of Standards & ISO/IEC 27001
ISO/IEC 27000 Family of Standards by Dr. Angelika Plate 07-09 June 2011, Beirut, Lebanon June 2011 The new 27000 Family of Standards & ISO/IEC 27001 June 2011 ISO/IEC 27000 Family of Standards 2 The new
More information