Challenges in Cybersecurity and Privacy - the European Research Landscape


Book Description

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.




Challenges in Cybersecurity and Privacy - The European Research Landscape


Book Description

This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects.Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues.




Legal Issues of Mobile Apps


Book Description

In less than ten years touchscreen smartphones and their apps have created an unprecedented technological revolution. Yet they are rife with serious potential for breaches of privacy and security, and a lack of uniform rules makes navigation of the legal landscape extremely difficult. Addressing this unstable regulatory environment, this concise, practical guide for the first time provides a measure of legal certainty. It examines case law and legislation in Europe and the United States to highlight the rights and obligations of all actors involved in the marketing of mobile apps, bring to light essential principles and recommend some viable solutions. Nine experts, all versed in the latest developments in international and national laws and regulations affecting digital mobile technology, examine such key topics as the following: contract law as applied to the sale and use of smartphone apps; intellectual property rights in mobile apps; protection of users; data protection; European Union (EU) medical device legislation and its safety implications for app users; fitness or wellness apps; apps’ collection of personal data; apps as hostile code and malware delivery mechanisms; competition law issues; taxation of mobile apps; liability issues for app developers and distributors; and implications of the EU’s new regulatory framework on online platforms. Because it is difficult for a basic user to understand how vulnerable everyday apps can be, and because every new information technology platform delivers new risks along with its benefits, legal practitioners working in a wide variety of fields will be increasingly called upon to engage with both personal and enterprise security and privacy breach cases arising from the use of mobile apps. This deeply informed practical analysis goes a long way toward ensuring appropriate handling of legal issues which arise in the mobile app context. Every practitioner, government official and software developer will welcome this much-needed volume.




Leveraging Artificial Intelligence (AI) Competencies for Next-Generation Cybersecurity Solutions


Book Description

Modern enterprises are facing growing cybersecurity issues due to the massive volume of security-related data they generate over time. AI systems can be developed to resolve a range of these issues with comparative ease. This new book describes the various types of cybersecurity problems faced by businesses and how advanced AI algorithms and models can help eliminate them. With chapters from industry and security experts, this volume discribes the various types of cybersecurity problems faced by businesses and how advanced AI algorithms and models can help elimintate them. With chapters from industry and security experts, this volume discusses the many new and emerging AI technologies and approaches that can be harnessed to combat cyberattacks, including big data analytics techniques, deep neural networks, cloud computer networks, convolutional neural networks, IoT edge devices, machine learning approaches, deep learning, blockchain technology, convolutional neural networks, and more. Some unique features of this book include: Detailed overview of various security analytics techniques and tools Comprehensive descriptions of the emerging and evolving aspects of artificial intelligence (AI) technologies Industry case studies for practical comprehension and application This book, Leveraging the Artificial Intelligence Competencies for Next-Generation Cybersecurity Solutions, illustrates how AI is a futuristic and flexible technology that can be effectively used for tackling the growing menace of cybercriminals. It clearly demystifies the unique contributions of AI algorithms, models, frameworks, and libraries in nullifying the cyberattacks. The volume will be a valuable resource for research students, scholars, academic professors, business executives, security architects, and consultants in the IT industry.




The Sharing Economy for Tackling Cybercrime


Book Description

This book explains Europol’s online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate. Since the global financial crisis, online sharing economy platforms have made a significant impact on use of under-utilized resources. People who have a car (Uber) or a spare room (Airbnb) began to share their under-used assets with others for extra income. The success achieved by these online platforms that enable efficient use of limited resources raised a new discussion on whether a similar governance model can be implemented by public administrations where public resources are insufficient. Cybercrime is one of these fields where most law enforcement agencies have not got enough resources to tackle these crimes. They need the human and technical resources of the private sector for a safer society. This book, for the first time, seeks the answers to this question. It examines the feasibility of online sharing economy platforms to enhance public-private partnerships to tackle cybercrime. The European Union Policing Agency, Europol, is the first police organization to adopt a similar model to interact with policing agencies and private industry. Drawing on extensive research, the book offers crucial insights for policymakers, researchers, and the public interested in new trends in sharing economy, innovative governance models, public-private partnerships, and cybercrime investigations.




Human Aspects of Information Security and Assurance


Book Description

This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management.







Cybersecurity Awareness


Book Description

This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology. This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security. Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed. This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book.




The Ethics of Cybersecurity


Book Description

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.




ICT Policy, Research, and Innovation


Book Description

A comprehensive discussion of the findings of the PICASSO initiative on ICT policy ICT Policy, Research, and Innovation: Perspectives and Prospects for EU-US Collaboration provides a clearly readable overview of selected information and communication technology (ICT) and policy topics. Rather than deluge the reader with technical details, the distinguished authors provide just enough technical background to make sense of the underlying policy discussions. The book covers policy, research, and innovation topics on technologies as wide-ranging as: Internet of Things Cyber physical systems 5G Big data ICT Policy, Research, and Innovation compares and contrasts the policy approaches taken by the EU and the US in a variety of areas. The potential for future cooperation is outlined as well. Later chapters provide policy perspectives about some major issues affecting EU/US development cooperation, while the book closes with a discussion of how the development of these new technologies is changing our conceptions of fundamental aspects of society.