D2.1 Cybersecurity and Privacy ecosystem model report - A Taxonomy of Cybersecurity and Privacy to assess the coverage of developed landscape by EC and nationally funded projects

Home » D2.1 Cybersecurity and Privacy ecosystem model report - A Taxonomy of Cybersecurity and Privacy to assess the coverage of developed landscape by EC and nationally funded projects

One of the objectives of the Cyberwatching.eu project is to support projects in the cybersecurity domain in classifying and clustering themselves and others into meaningful groups of common topics and concerns to generate synergies and collaboration.

The process by which this is achieved involves a two-tier taxonomy of cybersecurity topics, against which European projects, both national and international, are first mapped against the first tier of domains of cybersecurity. Since many projects concern themselves with not only one domain, the three domains in the first tier are ranked accordance to the level of concern in the mapped project: High, medium, low, or not  applicable.

As a consequence, some projects are entirely out of scope, as the only concern themselves with using cybersecurity procedures or technology instead of addressing any of them as a concern of its own right.

News

What are the challenges and (cybersecurity) issues the financial sector is currently facing? 

Future Events

The Digital Transformation EXPO Manchester (formerly IP EXPO Manchester) is the North's biggest IT event, and it's completely free to attend.

It will offer the opportunity to learn all about the technologies that enable digital transformation: upgrade legacy systems to build modern infrastructure; migrate to a secure public, private or hybrid cloud; detect and prevent cyber attacks; improve business operations with AI and robotic process automation (RPA); collect data for effective analysis. 

04/11/2020 to 05/11/2020

Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. Similarly, many of the novel technological solutions that are used to improve the security of systems and networks are also being used by those who wish to threaten well-established algorithms and protocols.

13/11/2020