Ciberseguridad industrial
Investigation areas
Data processing
Evaluation of systems and cyber risk
Identity management
Others
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Audits of security systems
Cloud and web application architecture
Cloud Computing
CPSs
Cyber risks
Data origination
Data protection (confidentiality)
Design of security requirements
Development of applications
Development of integrated security environments
Development of methodologies for increased reliability and updating of systems
Development of microelectronics
Development of prototypes of dependable systems in applications and infrastructures
Dynamic evaluation and management of risks
Early detection of cyber risks
Fog computing
Fuzz testing of industrial systems
Hardware testing (side-channel attacks and flaw injection)
Harvesting of information on threats
Integrated risk metrics and indicators
Integration of systems
Internet of Things
Key and certificate management (PKI)
Penetration testing of industrial systems
Protección de datos (integridad y disponibilidad)
Prototyping of reliable and upgradable systems
Risk evaluation and prevention
Risk quantification
Robustness testing of communications
Role-based access control
Secure computing
Secure data processing
Secure data processing based on Hardware Security Module (HSM)
Secure execution platforms
Secure integration
Secure processing of encrypted data and signals
Security / privacy through design
Security engineering
Security in critical systems (aeronautics, rail, automotive)
Security in operating systems
Smart cards
Systems Compliance