Cybersecurity Cluster

Investigation areas

Attack and defence against threats

Critical infrastructures

Evaluation of systems and cyber risk

Identity management

Privacy

Promotion and awareness of safety

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Anomaly detection

Anonymous authentication systems

Authentication of transactions at global level

Authentication protocols

Big data analysis focussed on privacy

Biometric authentication

Bridging the digital divide

Confidence and reliable big data

Creation of barriers to entry

Cryptographic authentication

Data protection (confidentiality)

Decision-making management tools

Development of applications

Development of automatic defences

Early detection of cyber risks

Encryption protocols for preserving privacy

Improved security in technological standards

Improvement of security protocols and standards

Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)

Integration of systems

Internet of Things

IoT privacy

IT attack insurance

Large-scale data analysis

Management of identity

Online fraud

Physical data protection

Preparation of mechanisms to respond to attacks

Privacy enhancing technology (PET)

Privacy in the cloud

Reliable global-level identity generation

Risk quantification

Secure development languages and frameworks

Secure multipart computing

Security / privacy through design

Security support services

Smart cities and safe cities

Statistical and predictive risk analysis

Threat and attack simulation

Verifiable computing