Download PDF version ITEA Challenge

Safety and Security

Introduction

Digital literacy encounters the challenge of moving from searching, finding and understanding digital information to managing digital footprints, being aware of copyright issues and behaving ethically in crediting ownership, cognisant of the lasting imprint of information online and managing issues of privacy and constructive presence. Safety and security have become critical issues. In adopting cloud services, robust and efficient identity management is a key business necessity for both cloud service providers and cloud consumers. In the energy domain Europe is transforming a current traditional electricity network into an advanced, digitised and more efficient Smart Grid. However, both here and in the ever more connected automotive domain, massive data collection also creates new security challenges that have to be tackled. The digital transition is reshaping all of society, exercising control through data flows. Anything arising from these data flows (attacks, bugs) may generate significant damage to our society in the physical sense, too. For all the benefits the digital world brings, there are always threats, and there lies the challenge for Safety and Security.


Some facts and figures


Imagine …

Imagine investing a huge amount of effort in the digital transition of society, a transformation that will generate huge quantities of data flows that contain everything you are doing and all the command & control signals of society worldwide. These data flows will be susceptible to thieves, terrorists and uninhibited businessman to spy on you, blackmail or intimidate you, or even to command & control the different systems such that they destroy the quality of lives or even lives themselves. The dream of developing some new engineering tools to reduce the number of breaches in the software, to protect access to the data flows for those who need to know and exclusively for them. To have dynamic agents continuously analysing how the data are used and detecting any misuse or bugs so that they can react in real time and adapt the software to protect the end users. Imagine keeping all your data digitally without having the worry of it being misused, stolen or monitored.

Imagine what is possible when we dare to dream, when we reach for the stars in a galaxy full of opportunities …


References

[26] Net Losses: Estimating the Global Cost of Cyber-Crime. Center for Strategic and International Studies & McAfee, June 2014.

[27] PwC Global State of Information Security Survey 2015. PwC, September 2014.

[28] Symantec 2017 Internet Security Threat Report. Symantec, Volume 22 – April 2017.

[29] 10 cyber security predictions for 2017. C. Cunningham. ITProPortal, January 2017.

Projects related to the challenge Safety and Security

APE

APE

ITEA 3 Call 5

Automatic Privacy Explorer

CASCAdE+

CASCAdE+

ITEA 3 Call 5

Compositional Analysis and Synthesis for Critical Embedded Applications +

DEFRAUDify

DEFRAUDify

ITEA 3 Call 5

Detect Fraudulent Activities in dark web and clear web to protect your business

SCRATCh

SCRATCh

ITEA 3 Call 4

SeCuRe and Agile Connected Things

ALADIN

ALADIN

ITEA 3 Call 2

Airports Landside and air-land side Attacks’ Detection and preventIoN

HI-RISE

ITEA 3 Call 2

High Integrity RPAS by Innovative Software Engineering

PARFAIT

PARFAIT

ITEA 3 Call 2

Personal dAta pRotection FrAmework for IoT

SecureGrid

SecureGrid

ITEA 3 Call 1

Security, fraud detection and encryption for smart grids based on AI

APPS

ITEA 2 Call 8

Advancing Plug & Play Smart Surveillance

InCloudInG

ITEA 2 Call 8

Inter-cloud identity governance

INSIST

ITEA 2 Call 8

Integrated service delivery for citizens' safety and comfort

IDEA4SWIFT

ITEA 2 Call 7

Identity, Doc, Exchange, Authentication 4 Systems Worldwide Interconnections of Frequent Travelers

ViSCa

ITEA 2 Call 7

VIrtualization of Smart CArds

FedSS

ITEA 2 Call 6

Federated Security Shield

ADAX

ITEA 2 Call 5

Attack Detection And Countermeasures Simulation

DiCoMa

ITEA 2 Call 5

Disaster Control Management

PREDYKOT

ITEA 2 Call 5

Policies REfined DYnamically and Kept On Track

SAFE

ITEA 2 Call 5

Safe Automotive soFtware architEcture

RECONSURVE

ITEA 2 Call 4

A Reconfigurable Surveillance System with Smart Sensors and Communication

SPY

ITEA 2 Call 4

Surveillance imProved sYstem

Guarantee

Guarantee

ITEA 2 Call 3

A Guardian Angel for the Extended Home Environment

ROLE-ID

ROLE-ID

ITEA 2 Call 3

Role-centric identity

MULTIPOL

ITEA 2 Call 2

Security policies in multi-domain environments

TECOM

TECOM

ITEA 2 Call 1

Trusted Embedded Computing