It security

Application security (34)
Computer security (150)
Data security (44)
Information security (32)
Internet security (30)
Network security (7)

Synopsis: Security: It security:


(Focus) Eunika Mercier-Laurent-The Innovation Biosphere_ Planet and Brains in the Digital Era-Wiley-ISTE (2015).pdf.txt

and Innovation Policies 107 4) proposing EU cybersecurity strategy and Directive; 5) updating EU€ s Copyright Framework;

The Parisian version of this event consists of monthly meetings organized on current topics of interest to the community of professional mobility (mobile applications, games, geolocation, fixed mobile convergence, IT SECURITY, machine2machine, etc..


10_MOD_Innovation in Romanian SMEs - revised february 2013.pdf.txt

Beheshti, H. M. 2004), The impact of IT on SMES in the United states, Information management and Computer security, vol. 12, no. 4, pp. 318-327.


2014_global_rd_funding_forecast.pdf.txt

Continued development of wireless technologies was cited by nearly half (49%)of the respondents, cybersecurity capabilities (46),

Among the ADS respondents, development of cybersecurity technologies also has taken on increasing importance. 45%of the respondents in our current survey cite it as a key development area,


A Comparison of Smart Grid Technologies_ 2012.pdf.txt

2) dynamic optimization of grid operations, including cyber security; 3) deployment of distributed resources, including renewable resources;


A digital agenda for European SMEs.pdf.txt

ENISA (European Network and Information security Agency)( 2009), An SME perspective on Cloud computing, online report,<http://www. enisa. europa. eu/act/rm/files/deliverables


Basedoc.scn

G#1v 12542 IT SECURITY G#2v 12543 Application security G#3v 12544 Antispyware software 0#4#antispyware Antispyware software

0#4#antispyware software Antispyware software G#3v 12545 Antivirus software G#4v 12546 Antivirus software 0#5#anti virus Antivirus software

0#5#antimalware Antivirus software 0#5#antimalware software Antivirus software 0#5#antivirus Antivirus software 0#5#antivirus software Antivirus software

G#4v 12547 Bitdefender 0#5#bitdefender Bitdefender G#4v 12548 Kaspersky 0#5#kaspersky Kaspersky

G#3v 12549 Application security 0#4#application security Application security 0#4#software security Application security G#2v 12550 Computer security

0#3#computer security Computer security 0#3#cyber security Computer security 0#3#cybersecurity Computer security 0#3#it security Computer security

G#2v 12551 Data security 0#3#data security Data security G#2v 12552 Information security 0#3#information security Information security

0#3#infosecurity Information security G#2v 12553 Internet security G#3v 12554 Browser security 0#4#browser security Browser security

G#3v 12555 Electronic mail security 0#4#electronic mail security Electronic mail security G#3v 12556 Internet protocol security 0#4#internet protocol security Internet protocol security

G#3v 12557 Internet security 0#4#internet security Internet security G#3v 12558 Mysecurecyberspace 0#4#mysecurecyberspace Mysecurecyberspace

G#3v 12559 Password security 0#4#password security Password security G#3v 12560 Security token 0#4#security token Security token

G#2v 12561 Network security 0#3#network security Network security G#1v 12510 Missile defence system 0#2#missile defence system Missile defence system

G#1v 12562 Physical security G#2v 12563 Airport security 0#3#airport security Airport security G#2v 12564 Aviation security

0#3#aviation security Aviation security G#2v 12565 Communications security G#3v 12566 Communications security 0#4#communications security Communications security

G#3v 12567 Mobile security 0#4#mobile security Mobile security G#3v 12568 Transmission security 0#4#transmission security Transmission security

G#2v 12569 Corporate security 0#3#corporate security Corporate security G#2v 12570 Food security 0#3#food security Food security

0#3#global food security Food security 0#3#international food security Food security G#2v 12571 Home security 0#3#home security Home security

G#2v 12572 Infrastructure security 0#3#infrastructure security Infrastructure security G#2v 12573 Physical security 0#3#physical security Physical security

G#2v 12574 Port security 0#3#port security Port security G#2v 12575 Private security 0#3#private security Private security

G#2v 12576 School security 0#3#school security School security G#2v 12577 Security checkpoint 0#3#security checkpoint Security checkpoint

G#2v 12578 Security spike 0#3#security spike Security spike G#2v 12579 Shopping center security 0#3#shopping center security Shopping center security

G#2v 12580 Supply chain security 0#3#supply chain security Supply chain security G#2v 12581 Transportation security 0#3#transportation security Transportation security

G#1v 12582 Political security G#2v 12583 Homeland security 0#3#homeland defense Homeland security 0#3#homeland security Homeland security

G#2v 12584 Human security 0#3#human security Human security G#2v 12585 Internal security 0#3#internal security Internal security

G#2v 12586 International security 0#3#global security International security 0#3#international security International security G#2v 12587 National security

G#3v 12588 Economic security G#4v 12589 Economic security 0#5#economic security Economic security G#4v 12590 Financial security

0#5#financial security Financial security G#4v 12591 Monetary security 0#5#monetary security Monetary security G#3v 12592 Energy security

0#4#energy security Energy security G#3v 12593 Environmental security 0#4#environmental security Environmental security G#3v 12594 Espionage

0#4#espionage Espionage G#3v 12595 Intelligence services G#4v 12596 Electronic intelligence 0#5#electronic intelligence Electronic intelligence

G#4v 12597 Intelligence agency G#5v 12598 Central intelligence agency 0#6#central intelligence agency Central intelligence agency G#5v 12599 Federal bureau of investigation

0#6#federal bureau of investigation Federal bureau of investigation G#5v 12600 Intelligence agency 0#6#intelligence agency Intelligence agency G#5v 12601 National security agency

0#6#national security agency National security agency G#5v 12602 Secret intelligence service 0#6#secret intelligence service Secret intelligence service G#4v 12603 Intelligence community

0#5#intelligence community Intelligence community G#4v 12604 Intelligence service 0#5#intelligence service Intelligence service G#4v 12605 Secret police

0#5#secret police Secret police G#4v 12606 Security intelligence 0#5#security intelligence Security intelligence G#4v 12607 Special agent

0#5#special agent Special agent G#4v 12608 Tactical intelligence 0#5#tactical intelligence Tactical intelligence G#3v 12609 National security

0#4#national security National security G#2v 12610 Public security 0#3#public security Public security G#2v 12611 State security

0#3#state security State security G#1v 12674 Robot dragonfly 0#2#robot dragonfly Robot dragonfly G#1v 12511 Sabotage

0#2#sabotage Sabotage G#1v 12612 Security G#2v 12613 Cryptosecurity 0#3#cryptosecurity Cryptosecurity

G#2v 12614 Secured area 0#3#secured area Secured area G#2v 12615 Security 0#3#security Security

G#2v 12616 Security adviser 0#3#security adviser Security adviser G#2v 12617 Security advisory 0#3#security advisory Security advisory

G#2v 12618 Security increase 0#3#security increase Security increase G#2v 12619 Security measure 0#3#security measure Security measure

G#2v 12620 Security policy 0#3#security policy Security policy G#2v 12621 Security program 0#3#security program Security program

G#1v 12622 Security companies G#2v 12623 G4s 0#3#g4s G4s G#2v 12624 Panda security

0#3#panda security Panda security G#2v 12625 Pinkerton 0#3#pinkerton Pinkerton G#2v 12626 Security company

0#3#security company Security company G#2v 12627 Trustwave 0#3#trustwave Trustwave G#1v 12628 Security concepts

G#2v 12629 Assurance 0#3#assurance Assurance G#2v 12630 Countermeasure 0#3#countermeasure Countermeasure


Case study analysis report of online collaboration and networing tools for Social Innovation.pdf.txt

Another barrier in the Eastserve case is data security due to the citizens†PCS connected to the Internet

Technically there is further need to address concerns about data security sensitivity & privacy Upon closer examination the examples in this category are probably more examples of innovative telemedicine

concerns about data security sensitivity & privacy Personalised health & smarter patient environ -ments Mainly bespoke

Data security is a big topic in the multi-partner approaches, particularly if data is used further for research about

MONDEY specifically also highlight the importance of requires a good framework for data security and data protection

data security -Bespoke ICT for high ability group & good mix with physical activities -Strong belief and


Collective Awareness Platforms for Sustainability and Social Innovation_ An Introduction.pdf.txt

Another important area of analysis is related to data security, protection and data sharing in the use of online social networks and the value proposition and business models that

which puts users in control of their data security and was touted by the media as a'Facebook killer


Consultation on the EU strategic work programme 2016-2017.pdf.txt

13 The idea comes from the ICT world where sandboxes are used routinely to beta-test software, cybersecurity, etc in strictly


Deloitte_Europe's vision and action plan to foster digital entrepeneurship.pdf.txt

definition of a cybersecurity strategy ï§Integrating technological developments such as cloud computing, communication on radio spectrum sharing, guidelines on state aids on broadband, etc

information security 6. For Entrepreneurship, Digital jobs and Skills, the European commission launched on 4 march 2013 the'Grand Coalition for Digital Jobs'to address the shortage of ICT


Developing National eHealth Interoperability Standards for Ireland - a consultation Document - HIQA 2011.pdf.txt

Data security Standards Standards for protection of patient data by means of e g. data encryption and


Digital Agenda 2014-2017 - Germany.pdf.txt

on innovative IT SECURITY and data protection, we want to act as a beacon for digitisation in Germany. Through open

IT SECURITY is preserved and that no new gateways for anonymous crime are created. We will therefore create

-tion, data security and interoperability. We will therefore continually review current standards, network and regula -tion models in terms of their performance to identify if

the Federal office for Information security. Where possible and practical, we will seek to integrate Energiewende projects

zz In the area of information security, we are working closely together with representatives at all government

IT SECURITY research microelectronics and service research zz We are increasing innovation support for the area of big

digitalen Welt) will deal with the IT SECURITY of new technologies and the protection of data in tomorrow†s

improve their IT SECURITY. Small and medium-sized enterprises (SMES), in particular, often do not have the

zz High standards of data protection and data security are essential to maintain trust in digital services and

IT SECURITY is an important driver of innovation and growth in Germany. We are committed to ensuring that our country remains one of the most secure

zz We are improving IT SECURITY by developing partner -ships with operators of critical infrastructures; through

introducing mandatory reporting for serious IT SECURITY incidents as part of an IT SECURITY law zz We support

and demand the use of trustworthy IT secu -rity technologies, especially the use of more and better

lead to a more robust market for IT SECURITY solutions zz We investing greater efforts into the certification and

realignment of the cyber security architecture and better resources for security authorities in terms of technology and staffing

cyber crime, cyber espionage and cyber security. This means that we will expand the Cyber crime Centre which analyses and investigates incidents in these areas

IT SECURITY and research funding involve not just German but also important European considerations. We therefore act as advocates for the Digital Agenda for Germany on

peaceful alignment of international cyber security policy We will continue to actively follow discussions on the sub

sense, cyber security capacity building zz Expanding the digital aspect of the Federal Government†s Africa strategy.


Digital Opportunities_ Innovative ICT solutions for youth employment.pdf.txt

•data security and management 6. 2 Mentoring and networking ICT entrepreneurs identify their greatest needs as start-up capital and opportunities to network with


DIGITAL SOCIAL INNOVATION Collective Awareness Platforms for Sustainability and Social Innovation.pdf.txt

Another important area of analysis is related to data security, protection and data sharing in the use of online social networks and the value proposition and business models that

which puts users in control of their data security and was touted by the media as a'Facebook killer


DIGITAL SOCIAL INNOVATION Growning a Digital Social Innovation Ecosystem for Europe.pdf.txt

freedom of information, hacktivism and data security. The CCC is based in Germany and other German-speaking countries


dsi-report-complete-EU.pdf.txt

such as surveillance, Â privacy, freedom of information, hacktivism, data security etc. The CCC is based in Germany and otherâ German-speaking countries and currently has over 4, 000 members.

verified by Geotrust, a world leader on Internet security verification The Avaaz donation pages have addresses beginning with https://rather

upgrade their IT SECURITY in the event of similar future attacks. Avaaz consequently launched a campaign (the first of its kind in over 5 years


dsi-report-complete-lr.pdf.txt

such as surveillance, Â privacy, freedom of information, hacktivism, data security etc. The CCC is based in Germany and otherâ German-speaking countries and currently has over 4, 000 members.

verified by Geotrust, a world leader on Internet security verification The Avaaz donation pages have addresses beginning with https://rather

upgrade their IT SECURITY in the event of similar future attacks. Avaaz consequently launched a campaign (the first of its kind in over 5 years


E-commerce Action plan 2012-2015.pdf.txt

in 2012, propose an overall strategy on internet security in Europe aimed at better protection against cyber attacks in the EU. The

Security policy adopted a comprehensive Cybersecurity Strategy of the European Union entitled â€oean open, safe and secure cyberspaceâ€.

cooperation, and awareness in the field of Network and Information security for the public and private sectors both at national and EU level

•Fostering industrial and technological resources for cybersecurity: stimulate the emergence of a European industry and market for secure ICT and contribute to

to improve cybersecurity and combat cybercrime and cyber terrorism •Establishing a coherent international cyberspace policy for the European union

outside the EU in building cybersecurity capacity In parallel to the Strategy, the Commission has proposed a legislative initiative

on a high level of network and information security across the Union 21 3. 5 DEPLOY HIGH-SPEED NETWORKS AND ADVANCED TECHNOLOGICAL SOLUTIONS

appropriate IT SECURITY and data protection measures, as well as technical and organisational measures and the appropriate safeguards for data transfers


Economist Intelligence Unit_Reaping the benefits of ICT_2004.pdf.txt

enforced standards of network security as well as trust in payment systems, digital identities and digital contracts is vital to encourage more business leaders


Education - technology and connectedness.pdf.txt

††â€, Cybersecurity, Brussels: European commission, 2012b Eurofound, Third European Quality of life Survey-Quality of life in Europe:


Entrepreneurship and SMEs Innovation in Romania - Nelu Eugen Popescu.pdf.txt

Top benefits of IT application for their business processes in the Romanian SMES vision are data security

Data security Access to company data anytime, anywhere Regulatory compliance Ease of team-working Better internal control

data security, data access from anywhere and at anytime, regulatory compliance, team-working possibilities and better internal control


Entrepreneurship, SMEs and Local Development in Andalusia.pdf.txt

The main IT solutions offered were antivirus (to 29%of clients business management software (to 28%)and web and email (to 19


Forfas_South_East_Action_Plan_Publication.pdf.txt

Aspects such as data protection and information security become increasingly important †Ireland is positioned well with regard to Data protection legislation and neutrality, and the

Data security, IP leakage Target Economies of scale Domain expertise Depth not size Challenges Attrition, wage inflation Skills availability, regulatory limitations


Grids Initiatives in Europe _2011.pdf.txt

Data security, Protocols Infrastructure, System security &-arcitecture Balancing price flexible demand DK: National thematic focus


Growing a digital social innovation ecosystem for Europe.pdf.txt

freedom of information, hacktivism and data security. The CCC is based in Germany and other German-speaking countries


H2020_societal_challenges.pdf.txt

or man-made disasters, providing effective cybersecurity and protecting borders against illegal trafficking. But while ensuring

About EU-funded research into cyber security and online privacy The digital and online economy are central to the EU€ s economic

through research into cyber security and online privacy. â 350 million were invested in this field over 2007-2013, through the


ICT and e-Business Impact in the Transport and Logistics Services Industry.pdf.txt

90 American Bar Association Section of Science and Technology Information security Committee E-business in the transport & logistics industry

Open systems, by retaining a high degree of information security, even for information sent over open, insecure,

The centralised information system has also a positive impact on data security. It is now possible to make backup copies of all the relevant data from the central servers


ICT for Societal Challenges.pdf.txt

The forthcoming European Strategy on Cybersecurity will 34 set out ways to strengthen network and information security across the EU

It will protect the public and private sectors from intrusion and fraud, by strengthening cross-border cooperation and information exchange

Commission will propose the EU€ s Strategy for Cyber security. It has also created a Task force Legislation Team (eidas) to deliver a predictable

•promote cyber security education and to engage a think-tank in discovering the threats and vulnerabilities of the Current and Future Internet

https://ec. europa. eu/digital-agenda/en/telecoms-internet/cybersecurity http://www. enisa. europa. eu


Impact of ICT on Home Healthcare 2012.pdf.txt

Standard Internet security techniques provide authentication and encryption of the communication with a service provider. However, they do not provide the user with means to control

Proceedings of the 17th IEEE Workshop on Computer security Founda -tions, IEEE (2004) 139†154 28.


Improving Health Sector Efficiency - the role of ICT - OECD 2010.pdf.txt

IT SECURITY) setting the conditions for the development of interoperable EHR systems across Canada. In British columbia, interoperability is being

convenience and data security. Instead of making security concerns the main feature of the patient brochures, the MAEHC placed these issues in a familiar context,


Innovation driven growth in Regions The role of Smart specialisation.pdf.txt

the world market (e g. electron microscopes, cyber security SW. In the second step, the problems within such narrowly defined innovation systems (incl. external linkages) must be


Intelligent transport systems in action.pdf.txt

Data security and protection, and liability issues...pp. 26†27 Action area 6: European ITS cooperation and coordination...

Data security and protection, and liability issues The handling of data †notably personal and financial â€

study launched in 2011, addressing the specific data security and data protection issues related to ITS applications and

Data security and data protection DGMOVE brochure ITS A4 indd 26 11/05/11 15: 16t105146 cee. pdf 28t105146 cee. pdf 28 20/06/11 13: 5020/06/11 13:50

Data security and data protection Legal framework: Directive 2010/40/EU For further information


Intelligent transport systems.pdf.txt

STUDIES AND REPORTS Transport E u R O P E A n COMMISSION European Research Area Intelligent

•data security and protection, and liability issues •European ITS cooperation and coordination The ITS Directive is aâ seven-year legal framework for aâ coordinated deployment of ITS, intended


ITIF_Raising European Productivity_2014.pdf.txt

to implement, †according to the European Network and Information security Agency rendering the attempt not only damaging to commerce but wasteful as well. 188 And as


JRC95227_Mapping_Smart_Specialisation_Priorities.pdf.txt

ICT trust, cyber security and network security Intelligent inter-modal and sustainable urban areas (e g. smart cities New media and easier access to cultural contents (e g. heritage


Management of patient information - trenda and challenges in member states - WHO 2012.pdf.txt

ehealth bodies to provide guidance in policy and strategy, data security, legal and ethical issues, interoperability, cultural and linguistic issues, infrastructure, funding


MIS2014_without_Annex_4.pdf.txt

Cybersecurity readiness should be improved by 40%by 2020d Target 3. 2: Volume of redundant e-waste to be reduced by 50%by 2020

d Data being compiled by the Global Cybersecurity Index (GCI Source: ITU 29 Measuring the Information Society Report 2014

registration Information security imperatives have prompted increasingly governments to require registration information, even for prepaid customers (GSMA, 2013b), but even with


National Strategy on Digital Agenda for Romania.pdf.txt

2 Field of Action I-egovernment, Interoperability, Cyber security, Cloud computing, Open Data, Big Data and Social media...

2. 2 Cyber security †Information systems and networks Security...45 2. 2. 1 Introduction...45 2. 2. 2 European context...

ï Field of action 1-egovernment, Interoperability, Cyber security, Cloud computing, Open Data Big data and Social media †increase efficiency and reduce the public sector costs in Romania by

ï Field of Action 1. 2 †Cyber security †Romania†s Cyber security Strategy ï Field of Action 1. 5 †Open Data †National Anticorruption Strategy 2014 †2016

Cyber security Cloud Computing Open Data, Big Data and Social Media 1. 1. Increasing the transparency of public

Cyber security Cloud computing Open Data, Big Data and Social Media Define the Informational Perimeter of Public services

the national cyber security system Operative Council for Cyber security (COSC responsible All Ministries offering public services Ministry of Interior

Cyber security #of cyberattacks/threats registered by the Government on private data Target: To be defined based on Appendix 5

Methodology Achieve a Cluster 3 rating for Maturity based on EU NIS Market Maturity Target: To be defined

regarding cyber security Target: To be defined based on Appendix 5 Methodology Improve legislation Operative Council for Cyber security (COSC

responsible All Ministries offering public services Ministry of Interior Strengthening the partnership between public & private sector

Cyber security (COSC responsible All Ministries offering public services Ministry of Interior Data base Consolidation of Knowledge Operative Council for

Cyber security (COSC responsible All Ministries offering public services Ministry of Interior Boost the Research & development capabilities in cyber security

Operative Council for Cyber security (COSC responsible Page 15 of 170 All Ministries offering public services Ministry of Interior

Cyber security Infrastructure Operative Council for Cyber security (COSC responsible All Ministries offering public services Ministry of Interior

CERT-RO Operative Council for Cyber security (COSC responsible All Ministries offering public services Ministry of Interior

Implementing security standards Operative Council for Cyber security (COSC responsible All Ministries offering public services Ministry of Interior

Inter-institutional cooperation Operative Council for Cyber security (COSC responsible All Ministries offering public services Ministry of Interior

Development of public awareness programs in public administration and the private sector Operative Council for Cyber security (COSC

responsible All Ministries offering public services Development of educational programs Operative Council for Cyber security (COSC responsible

All Ministries offering Page 16 of 170 public services Training Operative Council for Cyber security (COSC responsible

All Ministries offering public services Concluding agreements of international cooperation for improving the response capacity in

the event of major cyber attacks Operative Council for Cyber security (COSC responsible All Ministries offering public services

Ministry of Interior Participation in international programs and exercises in the cyber security field Operative Council for

Cyber security (COSC responsible All Ministries offering public services Ministry of Interior Promote the national security interests in the international

Cyber security (COSC responsible All Ministries offering public services Ministry of Interior Consolidation of the Acquisition Process for the Public Institutions IT

Establish the National Cyber security System Boost R&d in cyber security Define Governmental Cloud Capacity Data center Consolidation

Establish key principles for Social media Promote public debates Support for Open Government and Big Data Common infrastructure

related to data security All public bodies will adhere to this Line Action Portal Operational Implementation of the web portals goes

2. 2 CYBER SECURITY †INFORMATION SYSTEMS AND NETWORKS SECURITY 2. 2. 1 Introduction Preamble Trust and security in public services is national priority for the Romanian government

Cyber security Definition Cyber security is defined as"the state of normality that results after provisioning proactive and reactive

measures that ensure confidentiality, integrity, availability, authenticity and non-repudiation of electronic information, of private and public resources and services in the cybernetic environment.

network and information security across the Union A new Cyber security Strategy was developed by the European commission which comprises internal

market, justice and home affairs and foreign policy angles of the cyberspace issues. The Strategy is accompanied by the technical legislative proposal by the European commission's Directorate General

ï Developing cyber security capacity building ï Fostering international cooperation in cyberspace issues To respond to EU cyber strategy,

to address cyber security in a comprehensive manner, the activity should be spread over three sub-key pillars-NIS network and information security †law enforcement †defense

sub-pillars that already operate in various institutions in Romania horizontally and vertically as in the

European commission Strategy http://ec. europa. eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet

-and-online-freedom-and-opportunity-cybersecurity In its Pillar III"Security and Trust",the Digital Agenda for Europe defines a series of cyber security

initiatives at European level to ensure cyber security incident response capabilities and the protection of personal data

In this context, the responsibility of the national cyber infrastructure protection, whose compromise would undermine national security

companies that own such facilities, primarily the state institutions constituting the Cyber security Operations Council in accordance with the Cyber security Strategy of Romania

In order to achieve a strengthened network and information security policy, cooperation is needed between EU governments, public institutions and private companies to improve the exchange of

information and to ensure that security issues will be addressed effectively and solved. ENISA will provide the exchange and collaboration.

cyber security incidents either in an automated manner or secured through direct communication as appropriate. It will also identify,

development of cyber security infrastructure that provides public utility functionality or information society services. It will also continue to develop the partnership with ENISA on combating cyber incidents

necessary to improve the EU-US relations for the application of the European commission's cyber security

Cyber security Approach in Romania Risks of cyber incidents occurrence are caused by human or procedural reasons.

A positive development in the field of cyber security is the setting up of CERT-RO (http://www. cert-ro. eu

Also, Romania's cyber security strategy adopted by Decision no. 271/2013 sets out the objectives

vulnerabilities and cyber security risks and promotes Romania's interests, values and national objectives in cyberspace.

The strategy and action plan aim at setting targets for cyber security and lines of action for

The topic"Network Information security"is a real priority of both the European commission and national structures.

Raising cybersecurity awareness, issues such as viruses and malware, how to use passwords social engineering-blogging, how to use your computer at home,

The National Cyber security System (NSCC) is the general framework for cooperation that brings together public authorities and institutions with responsibilities and capabilities in the field, in order to coordinate

The National Center for Response to Cyber security Incidents-CERT-RO is a structure of expertise and

analyze, identify and respond to cyber security incidents of information systems Developing cooperation between the public and private sectors in order to ensure cyber security

represents a priority for action at the national level, given that cyberspace include cyber infrastructure

Currently, institutions within the National Cyber security System creates, at the level of public institutions the technical and operational framework in order to ensure interoperability between computer security

components in order to protect the cyber infrastructure within the public and increase the availability and level of confidence in the specialized public services provided to citizens, businesses and government

Romanian Indicators pertaining to Cyber security According to a Eurostat survey on ICT3 usage by individuals and households

Strategic Lines of Development for Cyber security in Romania Strategic Lines of Development Lines of Actions Description

framework for cyber security Establishing and operationalization of the national cyber security system Strategic Setting up the platform for

cooperation and harmonization of the existing CERT capabilities at national level that should capitalize the tools, will work to strengthen

plans on cyber security (military and civil, public-private, government non-government Responsible: Operative Council for

Cyber security (COSC 3 http://ec. europa. eu/public opinion/archives/ebs/ebs 404 en. pdf Page 49 of 170

Cyber security (COSC Strengthening the partnership between public & private sector Operational Developing cooperation between the

Cyber security (COSC Developing national capacities for risk management in cyber security and cyber incident response under a

national program Construction of Data base with relevant information Operational Consolidating, at the level of the

Cyber security (COSC Boost the Research & development capabilities in cyber security Enabler Fostering national R & D capabilities

and innovation in cyber security Responsible: Operative Council for Cyber security (COSC Cyber security Infrastructure Enabler Increasing the resilience of cyber

infrastructure Responsible: Operative Council for Cyber security (COSC CERT-RO Strategic Developing CERT entities, in both

public sector and private sector Responsible: Operative Council for Cyber security (COSC Implementing security standards Strategic Increase cyber security by reducing

vulnerabilities and implement minimum procedural and security standards for cyber public and private infrastructures Responsible:

Operative Council for Page 50 of 170 Cyber security (COSC Inter-institutional cooperation Operational Coordination of inter-institutional

response in case of cyber security incidents Responsible: Operative Council for Cyber security (COSC Promoting and consolidating the

security culture in cyber field Development of public awareness programs in public administration and the private sector

Operational Development of public awareness programs related with threats vulnerabilities and risks of using cyberspace

Responsible: Operative Council for Cyber security (COSC Development of educational programs Enabler Educational programs in the forms of

compulsory education on the safe use of the Internet and computing equipment Responsible: Operative Council for

Cyber security (COSC Training Operational Appropriate training to people working in cyber security and promoting widespread professional certifications in the field

Responsible: Operative Council for Cyber security (COSC Developing international cooperation in the field of cyber security

Concluding agreements of international cooperation for improving the response capacity in the event of major cyber attacks

Strategic Responsible: Operative Council for Cyber security (COSC Participation in international programs and exercises in the cyber

security field Operational Responsible: Operative Council for Cyber security (COSC Promote the national security interests in the international

cooperation formats in which Romania is a member Enabler Responsible: Operative Council for Cyber security (COSC

Page 51 of 170 2. 3 CLOUD COMPUTING 2. 3. 1 Introduction Preamble Cloud computing is offering several potential benefits to public bodies,

cyber security indirect indirect indirect indirect indirect indirect indirect indirect indirect indirect indirect #of applications performed based


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011