Innovative means to exchange telecom fraud and network security risks information

Size: px
Start display at page:

Download "Innovative means to exchange telecom fraud and network security risks information"

Transcription

1 Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing fraud and network security risks information Innovation in procurement Athens, Electronic Crime Conf., Nov

2 Accelerating innovation through collaboration The Eurescom community 17 members Including major European telcos Athens, Electronic Crime Conf., Nov

3 Benefits of collaboration Higher competitiveness Shorter time-to-market Interoperability Peer interaction Influence Benchmarking Cost / Risk sharing Organisational learning Athens, Electronic Crime Conf., Nov Collaborative innovation process Standards Service/ Product Eurescom Development Applied Research Basic Research Athens, Electronic Crime Conf., Nov

4 Eurescom servicing process Innovative solution Managing/Supporting collaborative R&D activity Identifying partners Organising collaboration Selection of best collaborative R&D activity Decision to collaborate Strategic consulting Project management, tech./ admin. support, workshops,... Via Eurescom network, cooperation partners, others Eurescom Study / Project, EU, EUREKA, Forum,... Analysis of pros and cons: collaboration vs. alone Definition of the subject and the expected solution Need for innovation Athens, Electronic Crime Conf., Nov Collaborative project options Project duration: ~ 1 2 years Eurescom members Study Programme Project duration: ~ 2 3 months Project duration: ~ 2 3 years (FP6 IPs) Eurescom members Project Programme Study duration: ~ years Fora Initiatives Set-up time: ~ 0.5 year Lifespan: ~ 3-5 years Bi-/Multi-lateral cooperation agreements Set-up time: ~ 0.5 year Lifespan: ~ 1-2 years Athens, Electronic Crime Conf., Nov

5 Why our members use us Competitive fees High flexibility Support from major telcos Reliable infrastructure Comprehensive knowledge Fast, efficient processes Experienced managers Established expert network Athens, Electronic Crime Conf., Nov Accelerate R&D in ICT! Learn more at Athens, Electronic Crime Conf., Nov

6 INNO-UTILITIES Innovation-Friendly Public Procurement & Fight Against Telecommunications Fraud and Security Threats Cost sharing RTD & Demonstration project under the 5 th Framework Programme of the EU Athens, Electronic Crime Conf., Nov Objectives Execute a trans-national demonstration of a network centric secure information system to store fraud and network risks information in the telecoms area Develop policy recommendations for the creation of an innovation-friendly procurement framework in Europe Athens, Electronic Crime Conf., Nov

7

8 Identifying the market need Interaction with user groups and associations Direct liaisons with ETNO, FIINA, HFF Results from joint collaborative Eurescom projects Capturing the user requirements Free form expression of problem statement and expectations Multi-lateral discussion with representatives of the user groups and associations Athens, Electronic Crime Conf., Nov Generic Problem Statement The demonstrator is a network information centric system working as a repository for: Services / information that can be sold to everybody Services / information that can be sold to eligible partners Internal risk analysis and survivability study Confidential information for exchange among affected stakeholders in a certain market Athens, Electronic Crime Conf., Nov

9 Identifying fraud types Fraud types are a trans-european issue and an analysis for individual countries does not yield differences This statement is substantiated by results of joint collaborative Eurescom projects Pre-study on the prevention and limitation of telecommunications fraud and Application of Intelligent Techniques to Telecommunications Fraud Detection The results of these projects cover the countries: UK, Portugal, Italy, Greece, The Netherlands, Spain, Sweden and Ireland Athens, Electronic Crime Conf., Nov

10 Network related security risks The network security risks are in effect possible attacks on the network with the following intentions: Steal services, Steal information/data (privacy) Steal identity, Stop service for individual subscribers or groups of subscribers Take the whole network down Athens, Electronic Crime Conf., Nov Attack Event Tool Physical Attack Information Exchange User Command Script of Commands Autonomous Agent Vulnerability Design Implementation Configuration Action Probe Scan Flood Authenticate Bypass Target Account Process Data Component Computer Unauthorized Result Increased Access Disclose of Information Corruption of Information Denial of Service Theft of Resources Toolkit Spoof Network Distributed Tool Read Internetwork Data Tap Copy Steal Modify Delete 10

11 Requirements analysis Security requirements No standards available, only guides ITU-T X ISO/IEC FCD ITU-T manual, Security in Telecommunications and Information Technology Operational requirements Best practice guide ISO Athens, Electronic Crime Conf., Nov Requirements analysis Legal and corporate requirements Convention on Cybercrime Data retention laws The role of electronic digital signatures for admissibility of electronic evidence in court Athens, Electronic Crime Conf., Nov

12 Functional requirements User requirements categorized into: Information types The information repository as the central element of the system The connectivity how to access the system User interface System security (as a collection of components) and survivability Legal Athens, Electronic Crime Conf., Nov

13 Deliverables Project Products System architecture Specification of components Specification of storage scheme Functional prototype Done Done Done April 2005 Survivable version of prototype (after intrusion testing) October 2005 Procurement What is the link? Innovative procurement today is associated with e-business platforms E-procurement is already in place in some organisations, companies Information exchange, tendering, bidding, etc. via electronic means (i.e. Internet) This means that most known types of security risks (and new ones) affect e-procurement Thus offering potential for fraud in the e- procurement process Athens, Electronic Crime Conf., Nov

14 Is e-procurement innovative? Some public procurement procedures distinguish between regular and innovative procurement and highlight references to the use of electronic media But if the same procedures stay in place, then we only changed the vehicle, the road remains the same Athens, Electronic Crime Conf., Nov Finally we distinguish Innovative procurement Developing policy recommendations that more effectively acknowledge and support the use of new electronic media Procurement of innovation How to procure an innovative product, that by definition does not exist yet? Requires mediation and information exchange to find out what the market and current state-of-art technology is capable of delivering Athens, Electronic Crime Conf., Nov

15 More information Anastasius Gavras Schloss-Wolfsbrunnenweg Heidelberg Germany Tel: Athens, Electronic Crime Conf., Nov

NETWORK SECURITY ASPECTS & VULNERABILITIES

NETWORK SECURITY ASPECTS & VULNERABILITIES NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect

More information

COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)

COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE) EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Regulatory Policy Standardisation Brussels, 9 th November 2005 Doc.: 34/2005 Rev. 1 EN COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

EUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator

EUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator EUREKA Funding Schema in Turkey Hüseyin GÖREN EUREKA National Project Coordinator İstanbul ITEA2 Event, February 6,2008 EUREKA initiative is... intergovermental, Austria Belgium Croatia Czech Republic

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland

PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland High Performance Computing A Key Technology 1. Supercomputing is the tool for solving the most challenging problems through simulations; 2. Access

More information

Cloud for Europe trusted Cloud Services for the European market for public administrations

Cloud for Europe trusted Cloud Services for the European market for public administrations Cloud for Europe trusted Cloud Services for the European market for public administrations Public sector challenges (European egovernment Action Plan 2011-2015) 2 Establishing a Trusted Cloud Europe A

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Innovation policy Technology for innovation; ICT industries and E-business Brussels, 7 th December 2005 DG ENTR/D4 M 376 - EN STANDARDISATION

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

Fraud Detection for Next-Generation Networks

Fraud Detection for Next-Generation Networks Fraud Detection for Next-Generation Networks Name of company/ies submitting case study: University of Deusto Web links to company/ies submitting case studies: http://www.deusto.es http://www.fundacion-deusto.deusto.es/

More information

e-sens Electronic Simple European Networked Services Rome, 16.10.2015

e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Goal To improve the cross-border access of - citizens - businesses to public services in Europe by provision of interoperable

More information

Network Security Innovation Platform

Network Security Innovation Platform Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation

More information

Nationwide Deployment of Social Alarms in Sweden

Nationwide Deployment of Social Alarms in Sweden Nationwide Deployment of Social Alarms in Sweden ehealth forum May 13 th 2014, Athens Greece The EIP AHA Scale-up Strategy Background problems and uncertainties Background the root of the problem The telecommunication

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Challenges of Health Sector

Challenges of Health Sector The Informed Patient Dublin, 17-18 February, 2004 The role of the information management and of new technologies in developing healthcare for patients and citizens Jean-Claude Healy and Diane Whitehouse

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Research Infrastructures in Horizon 2020

Research Infrastructures in Horizon 2020 Research Infrastructures in Horizon 2020 Philippe Froissard Deputy Head of Unit - Research Infrastructures European Commission DG Research & Innovation Research Infrastructures Research infrastructures

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Seamless ICT Infrastructure Security.

Seamless ICT Infrastructure Security. Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of

More information

Regulatory Framework for Communications Security and Privacy in Greece

Regulatory Framework for Communications Security and Privacy in Greece Regulatory Framework for Communications Security and Privacy in Greece Georgia Bafoutsou, Nikolaos Antoniadis, Eugenia Nikolouzou, Athanasios Panagopoulos Authority for the Assurance of Communications

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D

More information

Security and Privacy in Cloud Computing

Security and Privacy in Cloud Computing Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model

More information

How To Secure An Extended Enterprise

How To Secure An Extended Enterprise Data Security Initiatives The Layered Approach Melissa Perisce Regional Director, Global Services, South Asia April 25, 2010 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Intel Case Study Asia North

More information

Certification of Electronic Health Record systems (EHR s)

Certification of Electronic Health Record systems (EHR s) Certification of Electronic Health Record systems (EHR s) The European Inventory of Quality Criteria Georges J.E. DE MOOR, M.D., Ph.D. EUROREC EuroRec The «European Institute for Health Records» A not-for-profit

More information

European Quality Labelling, Certification, Electronic Health Record systems (EHRs) gf v1

European Quality Labelling, Certification, Electronic Health Record systems (EHRs) gf v1 European Quality Labelling, Certification, Electronic Health Record systems (EHRs) gf v1 EuroRec: current standing on EHR certification in Europe AGENDA 1. The EuroRec Institute 2. EHR-systems Certification:

More information

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and

More information

Preventing fraud and corruption in public procurement

Preventing fraud and corruption in public procurement Preventing fraud and corruption in public procurement CRIM, European Parliament 24 September 2012 Brussels János Bertók Head of division Public Sector Integrity OECD Data on trends in procurement Size

More information

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Overview about the Microsoft Reputation Service (MRS), Microsoft Malware Protection Center (MMPC)

More information

INTERNATIONAL PRICE COMPARISON: THE CYPRIOT EXAMPLE. Athos Tsinontides Health Insurance Organisation

INTERNATIONAL PRICE COMPARISON: THE CYPRIOT EXAMPLE. Athos Tsinontides Health Insurance Organisation INTERNATIONAL PRICE COMPARISON: THE CYPRIOT EXAMPLE Athos Tsinontides Health Insurance Organisation CYPRUS CYPRUS Kypros Demographics Population (2004): Gross Domestic Product (GDP): Total Health Expenditure

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security

More information

Converged Video Network Security

Converged Video Network Security S T R A T E G I C W H I T E P A P E R Converged Video Network Security How service providers can counter with the various security risks associated with implementing IPTV This white paper: Describes the

More information

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal

More information

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The

More information

PRIVACY AND DATA SECURITY MODULE

PRIVACY AND DATA SECURITY MODULE "This project has been funded under the fourth AAL call, AAL-2011-4. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which

More information

ETIS Information Security in Telecommunications

ETIS Information Security in Telecommunications ETIS Information Security in Telecommunications ENISA workshop on providers resilience 29 October 2009, Paris Fred Werner, Business Development Manager - ETIS Mission & Vision» What is ETIS? ETIS is a

More information

Fostering Information Security Awareness Among Responding Countries

Fostering Information Security Awareness Among Responding Countries Unclassified DSTI/ICCP/REG(2005)1/FINAL DSTI/ICCP/REG(2005)1/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Dec-2005

More information

EuroRec (http://www.eurorec.org )

EuroRec (http://www.eurorec.org ) EuroRec (http://www.eurorec.org ) The «European Institute for Health Records» A not-for-profit organisation, established April 16, 2003 Mission: the promotion of high quality Electronic Health Record systems

More information

PEPPOL - esignature. eprocurement Meeting epractise Vienna, 24th March 2011 Lars Thölken, Deputy Work Package Manager esignature. www.peppol.

PEPPOL - esignature. eprocurement Meeting epractise Vienna, 24th March 2011 Lars Thölken, Deputy Work Package Manager esignature. www.peppol. www.peppol.eu PEPPOL - esignature eprocurement Meeting epractise Vienna, 24th March 2011 Lars Thölken, Deputy Work Package Manager esignature The PEPPOL project Result of the European Competitiveness and

More information

State of the Israeli Technology Industry and the Future. Dr. Orna Berry Venture Partner, Gemini Israel Funds

State of the Israeli Technology Industry and the Future. Dr. Orna Berry Venture Partner, Gemini Israel Funds State of the Israeli Technology Industry and the Future Dr. Orna Berry Venture Partner, Gemini Israel Funds 2002 ICT GDP - NIS 33 billion 17% of business sector GDP. OECD highest - compared to 10-11% in

More information

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS Ian Green Manager, Cybercrime & Intelligence Commonwealth Bank of Australia Session ID: GRC T17 Session Classification: ADVANCED WHY? What keeps you

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

The European Entrepreneur Exchange Programme

The European Entrepreneur Exchange Programme The European Entrepreneur Exchange Programme Users Guide 2 Contents 1.0 Introduction... 5 2.0 Objectives... 6 3.0 Structure... 7 3.1 Basic elements... 7 3.2 Four phases... 8 4.0 Implementation... 9 4.1

More information

Students: undergraduate and graduate students who are currently enrolled in universities

Students: undergraduate and graduate students who are currently enrolled in universities DUO-Korea: 1. General Description CAUTION: If any application falls under the following 3 cases, the application is disqualified and will not be considered for selection. If such case is found after the

More information

Privacy and Security within an Interoperable EHR

Privacy and Security within an Interoperable EHR 1 Privacy and Security within an Interoperable EHR Stan Ratajczak Director Privacy and Security Solutions Architecture Group November 30, 2005 Electronic Health Information and Privacy Conference Ottawa

More information

ERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME

ERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME PRESS DOSSIER INDEX PRESS DOSSIER...1 INDEX...2 ERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME...3 WHO CAN PARTICIPATE?...5 WHAT BENEFITS AND FOR WHOM?...6 HOW DOES IT WORK? STRUCTURE AND IMPLEMENTATION...7

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

Work package 2 Analysis, Guidelines and recommendations

Work package 2 Analysis, Guidelines and recommendations Deliverable Work Package 1 Collating and sharing good practice 1: Guidelines on how to implement Task 1.2: Innovative Procurement innovative procurement 2: Identification of fit for purpose cooperation

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Cooperation in Securing National Critical Infrastructure

Cooperation in Securing National Critical Infrastructure Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information

More information

Pre-Commercial Procurement (PCP)

Pre-Commercial Procurement (PCP) Pre-Commercial Procurement (PCP) Tsanidis Vassilis DG CONNECT F2 unit ( Innovation ) Rationale Health care Climate Change Energy Efficiency Transport Security q Public sector is faced with important societal

More information

Workshop on Collaborative Security and Privacy Technologies

Workshop on Collaborative Security and Privacy Technologies Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin Trust and Society Trustworthy systems essential

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

Good practice of dissemination and exploitation results in Latvia

Good practice of dissemination and exploitation results in Latvia Good practice of dissemination and exploitation results in Latvia Dr.phys. Gunta Šlihta Vice-director, Institute of Physical Energetics Rīga, / 03 / 03 Methods of transfer of project results in the Baltic

More information

Service management evolution

Service management evolution management evolution Vilho Räisänen 1, Wolfgang Kellerer 2, Pertti Hölttä 3, Olavi Karasti 4 and Seppo Heikkinen 4 Abstract This paper presents an outline for the evolution of service management. The outline

More information

Phishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud

Phishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud 1 st Half 2009 Committed to Wiping Out Internet Scams and Fraud January June 2009 Phishing Report Scope The quarterly APWG analyzes phishing attacks reported to the APWG by its member companies, its Global

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

DIGITAL FORENSICS CONSORTIUM

DIGITAL FORENSICS CONSORTIUM DIGITAL FORENSICS CONSORTIUM CYBERHUNTING COMPETITIONS Focusing on the Critical Skills and Innovative Approach to Effectively Characterize the Digital Environment Nevin Taylor DFC President/CEO The President

More information

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

ehealth, mhealth and Big Data

ehealth, mhealth and Big Data HEALTH IT FORUM MEDICA November 12, 2014 ehealth, mhealth and Big Data Jaakko Aarnio, Dr Tech Research Programme and Policy Officer Health and Well-Being Unit (H1) DG CONNECT, European Commission Outline

More information

Call for Joint Collaborative Project Proposals On Technology & Innovation Cooperation between Spain, Germany, France and the United Kingdom

Call for Joint Collaborative Project Proposals On Technology & Innovation Cooperation between Spain, Germany, France and the United Kingdom Call for Joint Collaborative Project Proposals On Technology & Innovation Cooperation between Spain, Germany, France and the United Kingdom EUREKA Project Applications and funding applications will be

More information

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11. Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric

More information

Overview TECHIS60241. Carry out risk assessment and management activities

Overview TECHIS60241. Carry out risk assessment and management activities Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection

More information

How To Become A Member Of Europol

How To Become A Member Of Europol The Hague, 08 September 2015 Reg. nº: Europol/2015/TA/AD7/219 VACANCY NOTICE Name of the Post: Senior Specialist ICT Solutions Architect (AD7), within the ICT Business Area Reporting to: Senior Specialist

More information

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Presenter Adam Mambi,(Advocate of High Court) -Deputy Executive Secretary, Law Reform Commission Tanzania

More information

The SedNet project. Jos Brils. SedNet coordinator. Netherlands Organisation for Applied Scientific Research

The SedNet project. Jos Brils. SedNet coordinator. Netherlands Organisation for Applied Scientific Research The SedNet project Jos Brils SedNet coordinator Netherlands Organisation for Applied Scientific Research Mission To be a European network for environmentally, socially and economically viable practices

More information

TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division

TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS Paulo Magina Public Sector Integrity Division 10 th Public Procurement Knowledge Exchange Platform Istanbul, May 2014 The Organization for Economic

More information

Cloud for Europe lessons learned

Cloud for Europe lessons learned Cloud for Europe lessons learned Public sector challenges (European egovernment Action Plan 2011-2015) 2 Elevator Pitch Public sector cloud use as a collaboration between public authorities and industry

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute

More information

Customer or you or your means the purchaser of KYOsupport.

Customer or you or your means the purchaser of KYOsupport. KYOsupport Fmpd TERMS AND CONDITIONS 1 Definitions Customer or you or your means the purchaser of KYOsupport. Kyocera Mita or we or our or us refers to the Kyocera Mita sales companies in the following

More information

Reducing the Cost and Complexity of Web Vulnerability Management

Reducing the Cost and Complexity of Web Vulnerability Management WHITE PAPER: REDUCING THE COST AND COMPLEXITY OF WEB..... VULNERABILITY.............. MANAGEMENT..................... Reducing the Cost and Complexity of Web Vulnerability Management Who should read this

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.) Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening

More information

A Comprehensive Study on Cloud Computing Standardization

A Comprehensive Study on Cloud Computing Standardization A Comprehensive Study on Cloud Computing Standardization Dr. Mukesh Chandra Negi Project Manager, Tech Mahindra Ltd, Noida, India ABSTRACT: Standard is a trust between standardization body, buyers and

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Release: 1. ICANWK607A Design and implement wireless network security

Release: 1. ICANWK607A Design and implement wireless network security Release: 1 ICANWK607A Design and implement wireless network security ICANWK607A Design and implement wireless network security Modification History Release Release 1 Comments This Unit first released with

More information

The new 27000 Family of Standards & ISO/IEC 27001

The new 27000 Family of Standards & ISO/IEC 27001 ISO/IEC 27000 Family of Standards by Dr. Angelika Plate 07-09 June 2011, Beirut, Lebanon June 2011 The new 27000 Family of Standards & ISO/IEC 27001 June 2011 ISO/IEC 27000 Family of Standards 2 The new

More information