KET DE CIBERSEGURIDAD Y BLOCKCHAIN

Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Evaluation of systems and cyber risk

Identity management

Others

Privacy

Promotion and awareness of safety

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Access control based on behaviour

Anomaly detection

Architecture of protection

Attacker identification and location

Authentication of transactions at global level

Big data analysis focussed on privacy

Big data security

Blockchain and other DLTs

Cloud and web application architecture

Cloud Computing

Communication systems resistant to programmed attacks

Compliance&Certification

Computation of relevant metadata

Confidence and reliable big data

CPSs

Creation of barriers to entry

Creation of information repositories

Cryptographic authentication

Cryptography

Cyber risks

Data protection (confidentiality)

Data sanitization and anonymization

Decision-making management tools

Design of security requirements

Detection and monitoring of attacks

Detection of malicious software

Detection protocols, system programming and prevention programmes

Development of data harvesting mechanisms

Development of methodologies for increased reliability and updating of systems

Development of threat detection tools

Digital Rights Management

Dynamic evaluation and management of risks

Early detection of cyber risks

Electronic evidence management

Encryption protocols for preserving privacy

Forensic science

Harvesting of information on threats

Improved security in technological standards

Improvement of security protocols and standards

Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)

Integrated risk metrics and indicators

Internet of Things

Interoperability of systems

IoT privacy

Large-scale data analysis

Lattice-based homomorphic encryption

Legacy systems management

Mechanisms for data harvesting

Methodology for the adoption of best practice and reduction of barriers in relation to risks

Methods and development of protection tools

Methods for reducing and managing complex systems

Monitoring and profiling

Network monitoring and security

Network security

PET for organizations and infrastructures

Physical data protection

Post-quantum encryption

Preparation of mechanisms to respond to attacks

Privacy

Privacy in the cloud

Privacy of consultations

Privacy-aware security technologies

Protección de datos (integridad y disponibilidad)

Regulatory security compliance

Reliable global-level identity generation

Resilient architectures

Risk management and analysis

Risk quantification

Scalability and interoperability of identity management solutions

Search for the origin of the threat

Secure data processing

Secure multipart computing

Secure processing of encrypted data and signals

Security / privacy through design

Security engineering

Security in critical systems (aeronautics, rail, automotive)

Security support services

Simulation of dangerous environments

Smart cities and safe cities

Statistical and predictive risk analysis

System entry and exit filters

System modelling and system attacks

Systems Compliance

Threat and attack simulation

Threat detection

Verifiable computing