19

Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 2: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 4: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 5: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 6: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 7: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 8: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 9: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence

”…The Web will be understood not as

screenfulls of text and graphics but as

a transport mechanism, the ether

through which interactivity happens…”

DiNucci, 1999

Page 10: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 11: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence

A map of the World,

showing the most

popular social

networks by country,

according to Alexa &

Google Trends for

Websites traffic data

(June, 2010).

Page 12: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence

Intuitive entity-relationship notation;

Details’ consideration in I-SCIP*;

Familiar to the scientific world for more

then half a century.

Page 13: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence

The Universe

of Physical

Realities

Decision

Verification

Discretization

Errors

Validation

Observ.

Errors Modelling

Errors

Computational

Models

Theory/

Mathematical

Models Observations

Knowledge

Page 14: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 15: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence
Page 17: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence

SysSec

Community

Industry

Other Stakeholders

Center of Academic Excellence (Education)

Center of Research

Excellence

Academia

Page 18: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence

SysSec Europe

Italy

Nether-land

France

Austria

Bulgaria

Sweden

Turkey

Greece

SysSec Europe

Google

AT&T

Microsoft

Panda

Hispasec

Orange

F-Secure

Symantec

Page 19: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence