CONCORDIA Service – Cybersecurity Improvements

Cybersecurity Improvements

Published Deliverables

Deliverable No.Deliverable NameTypeDissemination level
D1.11st year report on designing and developing an ESRTE (M12)ReportPublic
D3.11st year report on community building (M12)ReportPublic
D4.11st year report on cybersecurity threats) (M12)ReportPublic
D4.7 1st year report on liaison with stakeholders(M12)ReportPublic
D5.1 Website and Social Media presences (M2)Report + DemonstrationPublic
D5.21st year report on exploitation, dissemination, certification and standardization (M12)ReportPublic
D6.1 Project handbook (M1)ReportConfidential
D6.2 Data management plan (M3)ReportConfidential
D6.3 Innovation strategy plan (M6)ReportConfidential
D6.8Open Data
Management Plan(M6)
ORDP:
Open
Research
Data Pilot
Confidential
D7.1H – Requirement No. 1
(M6)
EthicsConfidential

White Papers

TitleAuthors
Quo Vadis “Data-Centric” Systems Security?Neeraj Suri


May 2020

Security Threat Landscape

Driven by digitalization, information sharing has been experiencing exponential growth in the past few years. In turn, one’s eagerness to better prepare and protect depends on the ability to change the attitude from “need to know” to “need to share”. Digital technologies, most notably Artificial Intelligence (AI), have shaped decision-making, everyday communication, life, and work, hence highlighting the importance of maintaining the online economy and ensuring its prosperity.

May 2020

Cybersecurity Top Findings & Key Takeaways

Cybersecurity impacts every ICT domain. In the following we consider the CONCORDIA taxonomy of domains:
  • Device/IoT-Centric Security: Internet of Things (IoT) can be defined as “the networked interconnection of everyday objects, equipped with ubiquitous intelligence”[1]. IoT, edge computing, and smart devices are changing the environment in many ways, including smart transportation, sustainable mobility, smart cities, e-health, smart vehicles, and UAVs, just to name the few. The exponential growth of connected devices (from minuscule sensors to bigger machines), which, according to Intel[2] are expected to reach 200 billion by 2020, is revolutionizing current IT systems. The existence of billions of resource-constrained devices connected to the Internet introduces fundamental risks that can threaten users’ life and personal sphere.