Investigation areas

Attack and defence against threats

Evaluation of systems and cyber risk

Promotion and awareness of safety

Lines of investigation

Audits of security systems

Certification

Detection and removal of malware

Detection protocols, system programming and prevention programmes

Methodology for the adoption of best practice and reduction of barriers in relation to risks

Network steganography

Practical (not theoretical) certifications

Security support services

User-oriented security programmes