Cybersecurity Cluster
Investigation areas
Attack and defence against threats
Critical infrastructures
Evaluation of systems and cyber risk
Identity management
Privacy
Promotion and awareness of safety
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Anomaly detection
Anonymous authentication systems
Authentication of transactions at global level
Authentication protocols
Big data analysis focussed on privacy
Biometric authentication
Bridging the digital divide
Confidence and reliable big data
Creation of barriers to entry
Cryptographic authentication
Data protection (confidentiality)
Decision-making management tools
Development of applications
Development of automatic defences
Early detection of cyber risks
Encryption protocols for preserving privacy
Improved security in technological standards
Improvement of security protocols and standards
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Integration of systems
Internet of Things
IoT privacy
IT attack insurance
Large-scale data analysis
Management of identity
Online fraud
Physical data protection
Preparation of mechanisms to respond to attacks
Privacy enhancing technology (PET)
Privacy in the cloud
Reliable global-level identity generation
Risk quantification
Secure development languages and frameworks
Secure multipart computing
Security / privacy through design
Security support services
Smart cities and safe cities
Statistical and predictive risk analysis
Threat and attack simulation
Verifiable computing