Ciberseguridad industrial

Investigation areas

Data processing

Evaluation of systems and cyber risk

Identity management

Others

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Audits of security systems

Cloud and web application architecture

Cloud Computing

CPSs

Cyber risks

Data origination

Data protection (confidentiality)

Design of security requirements

Development of applications

Development of integrated security environments

Development of methodologies for increased reliability and updating of systems

Development of microelectronics

Development of prototypes of dependable systems in applications and infrastructures

Dynamic evaluation and management of risks

Early detection of cyber risks

Fog computing

Fuzz testing of industrial systems

Hardware testing (side-channel attacks and flaw injection)

Harvesting of information on threats

Integrated risk metrics and indicators

Integration of systems

Internet of Things

Key and certificate management (PKI)

Penetration testing of industrial systems

Protección de datos (integridad y disponibilidad)

Prototyping of reliable and upgradable systems

Risk evaluation and prevention

Risk quantification

Robustness testing of communications

Role-based access control

Secure computing

Secure data processing

Secure data processing based on Hardware Security Module (HSM)

Secure execution platforms

Secure integration

Secure processing of encrypted data and signals

Security / privacy through design

Security engineering

Security in critical systems (aeronautics, rail, automotive)

Security in operating systems

Smart cards

Systems Compliance