It security

Application security (5)
Computer security (154)
Data security (44)
Information security (36)
Internet security (9)
Network security (4)

Synopsis: Security: It security:


(Focus) Eunika Mercier-Laurent-The Innovation Biosphere_ Planet and Brains in the Digital Era-Wiley-ISTE (2015).pdf

and Innovation Policies 107 4) proposing EU cybersecurity strategy and Directive; 5) updating EU's Copyright Framework;

The Parisian version of this event consists of monthly meetings organized on current topics of interest to the community of professional mobility (mobile applications, games, geolocation, fixed mobile convergence, IT SECURITY, machine2machine, etc..


10_MOD_Innovation in Romanian SMEs - revised february 2013.pdf

Beheshti, H. M. 2004), The impact of IT on SMES in the United states, Information management and Computer security, vol. 12, no. 4, pp. 318-327.


2014_global_rd_funding_forecast.pdf

Continued development of wireless technologies was cited by nearly half (49%)of the respondents, cybersecurity capabilities (46),

Among the ADS respondents, development of cybersecurity technologies also has taken on increasing importance. 45%of the respondents in our current survey cite it as a key development area,


A Comparison of Smart Grid Technologies_ 2012.pdf

2) dynamic optimization of grid operations, including cyber security; 3) deployment of distributed resources, including renewable resources;

Smart Grid, vol. 1, no. 1, pp. 99 107, Jun. 2010.26 S. Clements and H. Kirkham, Cybersecurity considerations for the smart grid, in Proc.


A digital agenda for European SMEs.pdf

ENISA (European Network and Information security Agency)( 2009), An SME Perspective on Cloud computing, online report,<http://www. enisa. europa. eu/act/rm/files/deliverables


Case study analysis report of online collaboration and networing tools for Social Innovation.pdf

Another barrier in the Eastserve case is data security due to the citizens'PCS connected to the Internet

Technically there is further need to address concerns about data security, sensitivity & privacy. Upon closer examination the examples in this category are probably more examples of innovative telemedicine examples,

to address concerns about data security, sensitivity & privacy Personalised health & smarter patient environments Mainly bespoke ICTS-Content creation-Issue identification-Matching assets to needs-In theory online knowledge communities No network

Policy issues related to ICT in social innovation Data security is a big topic in the multi-partner approaches,

MONDEY specifically also highlight the importance of requires a good framework for data security and data protection. 129 Concluding,

relationships-Knowledge and idea sharing-Funding for multi-partner approaches & sustainable business models-Specific technological issues such as data security-Bespoke ICT for high ability group

Possibly requires adaptation of specific policies regarding data security. 131 References Bertot, J. C.,Jaeger, P. T,


Collective Awareness Platforms for Sustainability and Social Innovation_ An Introduction.pdf

Another important area of analysis is related to data security, protection and data sharing in the use of online social networks and the value proposition and business models that surround personal and sensitive data.

which puts users in control of their data security and was touted by the media as a'Facebook killer'.


Consultation on the EU strategic work programme 2016-2017.pdf

cybersecurity, etc in strictly controlled environments rather than on live systems. Horizon 2020 Expert Advisory Group Innovation in SMES:


DB15-Full-Report.pdf

Effective security measures are needed to ensure data security. And reliable internet and electricity connections are critical to ensure that online platforms function properly.


Deloitte_Europe's vision and action plan to foster digital entrepeneurship.pdf

Fighting abuse by the establishment of the European Cybercrime Center and definition of a cybersecurity strategy;

the Commission will propose a Directive on network and information security. 6. For Entrepreneurship, Digital jobs and Skills,


Developing National eHealth Interoperability Standards for Ireland - a consultation Document - HIQA 2011.pdf

ISO 17090 Public Key Infrastructure Data security Standards Standards for protection of patient data by means of e g. data encryption and electronic signatures to prevent loss and theft.


Digital Agenda 2014-2017 - Germany.pdf

making use of the latest digital administration services and insisting on innovative IT SECURITY and data protection,

we will ensure that IT SECURITY is preserved and that no new gateways for anonymous crime are created.

Efficient, reliable and cost-effective communication infrastructure is as important in this context as standards for ensuring data protection, data security and interoperability.

Before the end of 2014, we will start creating reliable framework conditions for the secure implementation of smart metering systems for consumers, producers and water storage heaters on the basis of protection profiles and the technical guidelines of the Federal office for Information security.

Agreements on integrating cross-departmental networks are to follow from 2018. zzin the area of information security,

IT SECURITY research, microelectronics and service research. zzwe are increasing innovation support for the area of big data to exploit its inherent potential for business (e g.

and empowered in the digital world research programme (Selbstbestimmt und sicher in der digitalen Welt) will deal with the IT SECURITY of new technologies and the protection of data in tomorrow‘s world.

We help companies improve their IT SECURITY. Small and medium-sized enterprises (SMES), in particular, often do not have the necessary resources.

The complementary initiatives IT SECURITY in business (IT-Sicherheit in der Wirtschaft) and Alliance for cyber security (Allianz für Cybersicherheit) are being expanded. 2. Modern data protection for the information age We are committed to a high level of data protection

and data security are essential to maintain trust in digital services and products. We are therefore supporting and demanding technology-based data protection (privacy by design)

IT SECURITY is an important driver of innovation and growth in Germany. We are committed to ensuring that our country remains one of the most secure digital locations in the world.

business, civil society, science and government must work together closely. zzwe are improving IT SECURITY by developing partnerships with operators of critical infrastructures;

and by introducing mandatory reporting for serious IT SECURITY incidents as part of an IT SECURITY law. zzwe support

and demand the use of trustworthy IT SECURITY technologies, especially the use of more and better encryption in electronic communication.

This will also lead to a more robust market for IT SECURITY solutions. zzwe investing greater efforts into the certification

Network and Information security Agency) and Europol‘s European Cybercrime Centre. 5. More security in cyberspace As in the offline world,

We acknowledge this responsibility for public IT SECURITY and want to play our part in protecting society and the economy in the digital age.

This requires a strategic realignment of the cyber security architecture and better resources for security authorities in terms of technology and staffing. zzwe are strengthening the Federal office for Information security (BSI).

Improving the resources made available to the BSI will be part of this process. zzthe National Cyber Response Centre is a platform that we are using to improve cooperation between specialised authorities.

The Centre will be assigned a greater coordination role in the operational handling of cyber security incidents. zzwe are improving technical

cyber espionage and cyber security. This means that we will expand the Cyber crime Centre, which analyses and investigates incidents in these areas, in the Federal Criminal Police office.

IT SECURITY and research funding involve not just German, but also important European considerations. We therefore act as advocates for the Digital Agenda for Germany on the relevant European committees

‘but instead favour a peaceful alignment of international cyber security policy. We will continue to actively follow discussions on the subject of the Internet

zzdriving cyber capacity building and, in a narrower sense, cyber security capacity building. zzexpanding the digital aspect of the Federal government‘s Africa strategy.


Digital Opportunities_ Innovative ICT solutions for youth employment.pdf

picking the right management information system (MIS) ability to assess rapidly changing technology tools integrating technology tools into business operations software updates data security


DIGITAL SOCIAL INNOVATION Collective Awareness Platforms for Sustainability and Social Innovation.pdf

Another important area of analysis is related to data security, protection and data sharing in the use of online social networks and the value proposition and business models that surround personal and sensitive data.

which puts users in control of their data security and was touted by the media as a'Facebook killer'.


DIGITAL SOCIAL INNOVATION Growning a Digital Social Innovation Ecosystem for Europe.pdf

and provide information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism and data security.


dsi-report-complete-EU.pdf

and provide information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism, data security etc.

The site is verified also by Geotrust, a world leader on Internet security verification. The Avaaz donation pages have addresses beginning with https://rather than http

Avaaz were advised to further upgrade their IT SECURITY in the event of similar future attacks. Avaaz consequently launched a campaign (the first of its kind in over 5 years) asking for donations to allow for this security upgrade.


dsi-report-complete-lr.pdf

and provide information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism, data security etc.

The site is verified also by Geotrust, a world leader on Internet security verification. The Avaaz donation pages have addresses beginning with https://rather than http

Avaaz were advised to further upgrade their IT SECURITY in the event of similar future attacks. Avaaz consequently launched a campaign (the first of its kind in over 5 years) asking for donations to allow for this security upgrade.


E-commerce Action plan 2012-2015.pdf

in 2012, propose an overall strategy on internet security in Europe aimed at better protection against cyber attacks in the EU. The establishment of the European Cybercrime Centre by 2013 will play a particularly important role in this.

On 7 february 2013, the Commission and the High Representative for Foreign and Security policy adopted a comprehensive Cybersecurity Strategy of the European union entitled an open, safe and secure cyberspace.

and awareness in the field of Network and Information security, for the public and private sectors both at national and EU level;

Fostering industrial and technological resources for cybersecurity: stimulate the emergence of a European industry and market for secure ICT and contribute to the growth and competitiveness of the EU economy;

Increasing public and private spending on Research and development (R&d) to improve cybersecurity and combat cybercrime and cyber terrorism;

and assisting countries outside the EU in building cybersecurity capacity. In parallel to the Strategy, the Commission has proposed a legislative initiative on a high level of network

and information security across the Union. 21 3. 5 DEPLOY HIGH-SPEED NETWORKS AND ADVANCED TECHNOLOGICAL SOLUTIONS Main action 14:

Certification would also encompass the verification that the provider has implemented the appropriate IT SECURITY and data protection measures,


Economist Intelligence Unit_Reaping the benefits of ICT_2004.pdf

enforced standards of network security as well as trust in payment systems, digital identities and digital contracts is vital to encourage more business leaders to offer ICT-enabled services,

At the regional level, the European commission and major systems vendors are trying to coordinate cybersecurity efforts.


Education - technology and connectedness.pdf

Cybersecurity, Brussels: European commission, 2012b. Eurofound, Third European Quality of life Survey-Quality of life in Europe: Impacts of the crisis,,Luxembourg:


Entrepreneurship and SMEs Innovation in Romania - Nelu Eugen Popescu.pdf

processes in the Romanian SMES vision are data security (48,44%),fast access to the enterprise data form anywhere and at anytime (38.21%)and regulatory compliance (35.84%.

9. 42 4. 74 4. 2 2. 31 Data security Access to company data anytime, anywhere Regulatory compliance Ease of team-working Better internal control Removal of redundant data insertion in more Ease of use due to romanian language interface Free and quick solution upgrade

data security, data access from anywhere and at anytime, regulatory compliance, team-working possibilities and better internal control.


Entrepreneurship, SMEs and Local Development in Andalusia.pdf

The main IT solutions offered were antivirus (to 29%of clients), business management software (to 28%)and web and email (to 19%.


Forfas_South_East_Action_Plan_Publication.pdf

Aspects such as data protection and information security become increasingly important Ireland is positioned well with regard to Data protection legislation and neutrality,

evolving Risks Leveraged by infrastructure and processes Data security, IP leakage Target Economies of scale Domain expertise Depth not size Challenges Attrition, wage inflation Skills availability, regulatory limitations


Fueling innovation through information technology in smes.pdf

Strategic Use of Information technology for Increased Innovation and Performance, Information management and Computer security 7 (1), 5 22.


Grids Initiatives in Europe _2011.pdf

Information models Data security, Protocols Infrastructure, System security &-arcitecture Balancing price flexible demand DK: National thematic focus FINLAND 35 FI:


Growing a digital social innovation ecosystem for Europe.pdf

and provide information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism and data security.


H2020_societal_challenges.pdf

providing effective cybersecurity and protecting borders against illegal trafficking. But while ensuring the security of citizens is an essential task of any administration,

http://www. facebook. com/innovation. union http://twitter. com/innovationunion About EU-funded research into cyber security and online privacy The digital and online economy are central

The Commission is working to increase confidence in the online economy in particular through research into cyber security


ICT and e-Business Impact in the Transport and Logistics Services Industry.pdf

Revenge of the Nerds, IT DIRECTOR. 89 Wikipedia, http://en. wikipedia. org/wiki/Digital signature. 90 American Bar Association Section of Science and Technology Information security Committee E-business

and Open systems, by retaining a high degree of information security, even for information sent over open, insecure,

The centralised information system has also a positive impact on data security. It is now possible to make backup copies of all the relevant data from the central servers,


ICT for Societal Challenges.pdf

The forthcoming European Strategy on Cybersecurity will 34 set out ways to strengthen network and information security across the EU. It will protect the public and private sectors from intrusion and fraud,

by strengthening cross-border cooperation and information exchange. trust in technology 74%of EU Internet users in 2012 think that the risk of becoming a victim of cybercrime has increased in the past year.

the European commission will propose the EU's Strategy for Cyber security. It has created also a Task force Legislation Team (eidas) to deliver a predictable regulatory environment for electronic identification

promote cyber security education and to engage a think-tank in discovering the threats and vulnerabilities of the Current and Future Internet;

/en/telecoms-internet/cybersecurity http://www. enisa. europa. eu/@EU TRUSTSEC Smart Cities and Sustainability https://ec. europa. eu/digital-agenda/node


Impact of ICT on Home Healthcare 2012.pdf

Standard Internet security techniques provide authentication and encryption of the communication with a service provider. However

Proceedings of the 17th IEEE Workshop on Computer security Foundations, IEEE (2004) 139 154 28. Røstad, L.:


Improving Health Sector Efficiency - the role of ICT - OECD 2010.pdf

and enabling solutions for privacy and IT SECURITY) setting the conditions for the development of interoperable EHR systems across Canada.

convenience and data security. Instead of making security concerns the main feature of the patient brochures, the MAEHC placed these issues in a familiar context,


Innovation driven growth in Regions The role of Smart specialisation.pdf

The aim is to identify as many as possible narrow fields in which regional economy has significant position in the world market (e g. electron microscopes, cyber security SW.


Intelligent transport systems in action.pdf

Data security and protection, and liability issues...pp. 26 27 Action area 6: European ITS cooperation and coordination...

Data security and protection, and liability issues The handling of data notably personal and financial in ITS applications raises a number of issues as citizens'dataprotection rights are at stake.

addressing the specific data security and data protection issues related to ITS applications and services. Meanwhile, a number of EU-backed research projects have carried out work relevant to the topic,

and personal data protection aspects related to the handling of data in ITS applications and services and propose measures in full compliance with EU legislation Data security


Intelligent transport systems.pdf

data security and protection, and liability issues; European ITS cooperation and coordination. The ITS Directive is a seven-year legal framework for a coordinated deployment of ITS,


ITIF_Raising European Productivity_2014.pdf

The rule could be impossible to implement, according to the European Network and Information security Agency rendering the attempt not only damaging to commerce


JRC95227_Mapping_Smart_Specialisation_Priorities.pdf

middle mile and backhaul ICT trust, cyber security and network security Intelligent inter-modal and sustainable urban areas (e g. smart cities) New media and easier access to cultural contents


Management of patient information - trenda and challenges in member states - WHO 2012.pdf

It calls on governments to form national ehealth bodies to provide guidance in policy and strategy, data security, legal and ethical issues, interoperability, cultural and linguistic issues,


MIS2014_without_Annex_4.pdf

Cybersecurity readiness should be improved by 40%by 2020d Target 3. 2: Volume of redundant e-waste to be reduced by 50%by 2020 Target 3. 3:

currently mobile-broadband signal coverage is considering in determining this target. d Data being compiled by the Global Cybersecurity Index (GCI).

with minimal (if any) associated registration Information security imperatives have prompted increasingly governments to require registration information, even for prepaid customers (GSMA, 2013b),


National Strategy on Digital Agenda for Romania.pdf

32 2 Field of Action I-egovernment, Interoperability, Cyber security, Cloud computing, Open Data, Big data and Social media...

37 2. 2 Cyber security Information systems and networks Security...45 2. 2. 1 Introduction...45 2. 2. 2 European context...

Field of action 1-egovernment, Interoperability, Cyber security, Cloud computing, Open Data, Big data and Social media increase efficiency

All strategies (including the Digital Agenda for Romania) will be reviewed after the Government Enterprise Architecture initiative that will take place in Romania according to Appendix 5 Implementation Methodology Field of Action 1. 2 Cyber security Romania

's Cyber security Strategy Field of Action 1. 5 Open Data National Anticorruption Strategy 2014 2016 Field of Action 2. 2 ICT in Health Romania

Field of action Objective Digital Agenda for Europe Pillars Europe 2020 Target Support DAE 2020 Target Support 1. egovernment, Interoperability, Cyber security, Cloud computing

using egovernment Returning completed forms Key cross-border public 1. 2. Raising cyber security networks and systems III-Trust and security Page 10 of 170 In order to reach the goal to reform the way how the government works,

of action Lines of action Entities responsible for implementation Indicators Field of action 1 egovernment, Interoperability, Cyber security, Cloud computing, Open Data,

and operationalization of the national cyber security system Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Cyber security#of cyberattacks/threats registered by the Government on private

To be defined based on Appendix 5 Methodology#of training programs regarding cyber security Target: To be defined based on Appendix 5 Methodology Improve legislation Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Strengthening the partnership between public & private

sector Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Data base Consolidation of Knowledge Operative Council for Cyber security (COSC)( responsible

) All Ministries offering public services Ministry of Interior Boost the Research & development capabilities in cyber security Operative Council for Cyber security (COSC)( responsible) Page 15 of 170 All Ministries

offering public services Ministry of Interior Cyber security Infrastructure Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior CERT-RO Operative

Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Implementing security standards Operative Council for Cyber security (COSC)( responsible) All Ministries

offering public services Ministry of Interior Inter-institutional cooperation Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Development of public

awareness programs in public administration and the private sector Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Development of educational programs Operative Council for Cyber security (COSC)( responsible) All Ministries

offering Page 16 of 170 public services Training Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Concluding agreements of international cooperation for improving the response

capacity in the event of major cyber attacks Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Participation in international programs

and exercises in the cyber security field Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Promote the

national security interests in the international cooperation formats in which Romania is a member Operative Council for Cyber security (COSC)( responsible) All Ministries offering public services Ministry of Interior Consolidation of the Acquisition Process for the Public Institutions IT Infrastructure Ministry

for Information Society (responsible) All Ministries offering public services Cloud computing, Data Management and Social media#of applications performed based on Governmental Cloud Target:

31 of 170 The Digital Agenda Roadmap for the implementation of strategic initiatives Field of Action Iegovernment, Interoperability, Cyber security, Cloud computing, Open Data, Big data and Social Mediafield of Action

structures for ICTPROMOTE and implement better standardspromote and implement transparency and opennessdefine the National Interoperability Frameworkprepare E-Identityunique Portalbuild sustainable initiativesestablish the National Cyber security Systemboost R&d

X x X Page 34 of 170 2 FIELD OF ACTION I-EGOVERNMENT, INTEROPERABILITY, CYBER SECURITY, CLOUD COMPUTING, OPEN DATA

including the institutions directly involved in issues related to data security. All public bodies will adhere to this Line Action Portal (Operational) Implementation of the web portals goes through stages;

All public bodies will adhere to this Line Action 2. 2 CYBER SECURITY INFORMATION SYSTEMS AND NETWORKS SECURITY 2. 2. 1 Introduction Preamble Trust and security in public services is national priority for the Romanian government

Cyber security Definition Cyber security is defined as"the state of normality that results after provisioning proactive and reactive measures that ensure confidentiality, integrity, availability, authenticity and non-repudiation of electronic information, of private and public resources and services in the cybernetic environment.

At the beginning of 2013, published a proposal on European Cyber security Strategy was published, for a directive concerning measures to ensure a high common level of network and information security across the Union.

A new Cyber security Strategy was developed by the European commission which comprises internal market, justice and home affairs and foreign policy angles of the cyberspace issues.

The Strategy is accompanied by the technical legislative proposal by the European commission's Directorate General Connect to strengthen the security of information systems in the EU

Developing cyber security capacity building Fostering international cooperation in cyberspace issues To respond to EU cyber strategy,

to address cyber security in a comprehensive manner, the activity should be spread over three sub-key pillars-NIS network

and information security law enforcement defense, sub-pillars that already operate in various institutions in Romania horizontally and vertically as in the following scheme:

European commission Strategy http://ec. europa. eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cybersecurity In its Pillar III

"the Digital Agenda for Europe defines a series of cyber security initiatives at European level to ensure cyber security incident response capabilities and the protection of personal data.

primarily the state institutions constituting the Cyber security Operations Council in accordance with the Cyber security Strategy of Romania.

In order to achieve a strengthened network and information security policy cooperation is needed between EU governments, public institutions and private companies to improve the exchange of information

and information gathering on Page 47 of 170 cyber security incidents either in an automated manner or secured through direct communication as appropriate.

CERT-RO will develop proposals to amend the legislative framework to foster the development of cyber security infrastructure that provides public utility functionality or information society services.

Regarding the transatlantic cooperation it is necessary to improve the EU-US relations for the application of the European commission's cyber security plan

and their active involvement when they return home. 2. 2. 3 National context Cyber security Approach in Romania Risks of cyber incidents occurrence are caused by human or procedural reasons.

A positive development in the field of cyber security is the setting up of CERT-RO (http://www. cert-ro. eu),

Romania's cyber security strategy adopted by Decision no. 271/2013 sets out the objectives, principles and main directions of action for understanding, preventing

vulnerabilities and cyber security risks and promotes Romania's interests, values and national objectives in cyberspace.

The strategy and action plan aim at setting targets for cyber security and lines of action for the coming years.

The topic"Network Information security"is a real priority of both the European commission and national structures.

Raising cybersecurity awareness issues such as viruses and malware, how to use passwords, social engineering-blogging,

The National Cyber security System (NSCC) is the general framework for cooperation that brings together public authorities and institutions with responsibilities and capabilities in the field,

The National Center for Response to Cyber security Incidents-CERT-RO is a structure of expertise and research and development in the cyber infrastructure protection, under the coordination of the Ministry for Information Society,

analyze, identify and respond to cyber security incidents of information systems. Developing cooperation between the public and private sectors in order to ensure cyber security represents a priority for action at the national level,

given that cyberspace include cyber infrastructure owned and managed by both the State and private entities.

institutions within the National Cyber security System creates, at the level of public institutions, the technical and operational framework in order to ensure interoperability between computer security components

in order to protect the cyber infrastructure within the public and increase the availability and level of confidence in the specialized public services provided to citizens, businesses and government.

Romanian Indicators pertaining to Cyber security According to a Eurostat survey on ICT3 usage by individuals and households:

Strategic Lines of Development Strategic Lines of Development for Cyber security in Romania Strategic Lines of Development Lines of Actions Description Establishing the necessary conceptual and organizational framework for cyber security Establishing

and operationalization of the national cyber security system (Strategic) Setting up the platform for cooperation and harmonization of the existing CERT capabilities at national level that should capitalize the tools,

will work to strengthen expertise in cyber risk, by fostering synergies between different action plans on cyber security (military and civil, public-private, government, non-government;

Operative Council for Cyber security (COSC) 3 http://ec. europa. eu/public opinion/archives/ebs/ebs 404 en. pdf Page 49 of 170 Improve legislation (Enabler) Completing

Operative Council for Cyber security (COSC) Strengthening the partnership between public & private sector (Operational) Developing cooperation between the public and private sectors, including by fostering the exchange of information on threats, vulnerabilities, risks,

Operative Council for Cyber security (COSC) Developing national capacities for risk management in cyber security and cyber incident response under a national program Construction of Data base with relevant information (Operational) Consolidating, at the level of the competent

Operative Council for Cyber security (COSC) Boost the Research & development capabilities in cyber security (Enabler) Fostering national R & D capabilities and innovation in cyber security Responsible:

Operative Council for Cyber security (COSC) Cyber security Infrastructure (Enabler) Increasing the resilience of cyber infrastructure Responsible:

Operative Council for Cyber security (COSC) CERT-RO (Strategic) Developing CERT entities, in both public sector and private sector Responsible:

Operative Council for Cyber security (COSC) Implementing security standards (Strategic) Increase cyber security by reducing vulnerabilities and implement minimum procedural and security standards for cyber public and private infrastructures Responsible:

Operative Council for Page 50 of 170 Cyber security (COSC) Inter-institutional cooperation (Operational) Coordination of inter-institutional response in case of cyber security incidents Responsible:

Operative Council for Cyber security (COSC) Promoting and consolidating the security culture in cyber field Development of public awareness programs in public administration

Operative Council for Cyber security (COSC) Development of educational programs (Enabler) Educational programs in the forms of compulsory education on the safe use of the Internet and computing equipment Responsible:

Operative Council for Cyber security (COSC) Training (Operational) Appropriate training to people working in cyber security and promoting widespread professional certifications in the field Responsible:

Operative Council for Cyber security (COSC) Developing international cooperation in the field of cyber security Concluding agreements of international cooperation for improving the response capacity in the event of major cyber attacks (Strategic) Responsible:

Operative Council for Cyber security (COSC) Participation in international programs and exercises in the cyber security field (Operational) Responsible:

Operative Council for Cyber security (COSC) Promote the national security interests in the international cooperation formats in

Operative Council for Cyber security (COSC) Page 51 of 170 2. 3 CLOUD COMPUTING 2. 3. 1 Introduction Preamble Cloud computing is offering several potential benefits to public bodies,

indirect indirect direct direct direct direct direct direct direct IT Spending for Security indirect indirect indirect direct indirect indirect direct indirect indirect direct direct#of training programs regarding cyber security indirect


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011