Preview

Information Security

Good Essays
Open Document
Open Document
11954 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security
National Cyber Security Research Agenda
— Trust and Security for our Digital Life —
Version 1.2

Editors: dr.ir. Herbert Bos (Vrije Universiteit Amsterdam) prof.dr. Sandro Etalle (Technische Universiteit Eindhoven) dr.ir. Erik Poll (Radboud Universiteit Nijmegen)

Contents
1 A National Research Agenda for Cyber Security 2 Focus and objectives 3 The many aspects of cyber security 4 Setting the research agenda 4.1 Contexts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Research Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Appendix A. The cyber security research community in the Netherlands Appendix B. Ongoing ICT security research initiatives Appendix C. The Sentinels research program 2 3 4 6 6 10 16 22 23

About this document
This document is the result of a series of discussions about the best shape, form and content of a national research agenda in line with the National Cyber Security Strategy (NCSS). It formulates, in concrete terms, common thoughts and promising directions for a research agenda in cyber security. While all contributors firmly believe that a realisation of the agenda requires ambitious funding, as well as solid governance and embedding, this document addresses only the research directions. Acknowledgments This document has been edited under the coordination of the ICT Innovatie Platform Veilig Verbonden, with a broad involvement of researchers from various disciplines (computer science, law, public administration, cyber crime sciences and police studies) and from several universities and research centres (RU Nijmegen, VU Amsterdam, TU Eindhoven, University of Twente, TU Delft, Tilburg University, TNO, Novay). Discussions have extensively involved experts from the industry as well as from (semi-)government organizations.

1

1

A National Research Agenda for Cyber Security

As our reliance on the ICT infrastructure increases, so do concerns about its



References: Cho, A. (2008). University hackers test the right to expose security concerns. 322(5906):p.1322–1323. Science, Clarke, R

You May Also Find These Documents Helpful

  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cyber Warfare

    • 896 Words
    • 4 Pages

    “Cyber warfare is a term used to describe the use of the Internet to wage war in the virtual world, often with real effects in the physical world,” (McGuigan). In the past recent years, cyber warfare has become a pertinent issue among the major nations on the planet; this issue has forced militaries, all over the world, to incorporate a new branch that is devoted to both conducting and protecting against cyber warfare. Cyber warfare is also used to define attacks amongst corporations, form radical organizations, and/or attacks by hackers, who are perceived as being warlike in their intent. Most situations pertaining to cyber warfare are attacks from one “sovereign state,” to another virtually in cyberspace (McGuigan).…

    • 896 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Keywords associated with this project: computer network, network security, malicious, vulnerabilities, attack, threats, quality of services, security policies.…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Internet Security

    • 1915 Words
    • 8 Pages

    Internet security is defined as the securing and protecting from unauthorized access, theft and, loss of data. Security vulnerabilities pose a constant threat to organizations that rely on the Internet, and the critical infrastructures that it depends on. The fact that security vulnerabilities do exist organizations must have of course acquire secure software systems that will be able to withstand any online attacks. Nonetheless, because security vulnerabilities do occur, it is vital that information systems should be protected against them as effectively as possible. President Obama articulated in May 2009 the need for wider public participation in protecting America’s communication and information technology (IT) infrastructure, or cyberspace (2010). He called for a…

    • 1915 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    Arab Leqgue Resolution

    • 334 Words
    • 2 Pages

    Assessing the current state of cyber-security and its implications for regional defense and economic interests…

    • 334 Words
    • 2 Pages
    Best Essays
  • Best Essays

    References: Whiteman, Mattord, M.E.W, H,J,M 2011, Principles of Information Security, Cengage learning, Kennesaw State University…

    • 3522 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    cyber crime

    • 6338 Words
    • 26 Pages

    Bibliography: FAQ: The Anti-cyber squatting Consumer Protection Act, by Richard Keyt, April 20, 2001, Keyt Law:…

    • 6338 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Cybercrime is a global problem for all the parties: Government, industry and individuals. The dangers come from nation states but also non- state actors.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MacSweeney, G. (2000). When "I love you" isn 't so sweet. Insurance & Technology, 25(7), 7.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    module1

    • 7587 Words
    • 49 Pages

    What does & Bartlett mean to you? Do you automatically think of protecting yourLearning, LLC…

    • 7587 Words
    • 49 Pages
    Satisfactory Essays
  • Good Essays

    The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of expertise for the European Member States and European institutions in network and information security, giving advice and recommendations and acting as a central source of information on good practice. Moreover, the agency facilitates contacts between European institutions, the Member States, and private business and industry players. This work takes place in the context of ENISA‘s Emerging and Future Risk programme.…

    • 59262 Words
    • 172 Pages
    Good Essays
  • Good Essays

    This report is the result of SDI's extensive market and company research covering the global cyber security industry. It provides detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry participants, analysis of the leading companies in the industry, and key news.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Spalević, Ž. (2014). CYBER SECURITY AS A GLOBAL CHALLENGE TODAY. Singidunum Journal of Applied Sciences, 687-692.…

    • 1226 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    cyber security

    • 1147 Words
    • 5 Pages

    The critical infrastructure – such as the electricity grid, financial sector, and transportation networks that sustain our way of life – has suffered repeated cyber intrusions, and cyber-crime has increased dramatically over the last decade. The President has thus made cyber security an Administration priority. When the President released his Cyberspace Policy Review almost two years ago, he declared that the…

    • 1147 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cyber Terrorism

    • 821 Words
    • 4 Pages

    Cyber terrorism is a dreaded and unethical utilization of the internet to hack or gain access to computer systems without the owner’s authorization. This is done by either the internal or external stakeholders for the purpose of acquiring confidential information without the owner’s consent including inciting, fundraising for terror attacks, and promotion of racism (Council of Europe,2007).…

    • 821 Words
    • 4 Pages
    Good Essays