challenges in cyber security an academic vie · malicious hardware use of cots components . why to...
TRANSCRIPT
![Page 1: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/1.jpg)
![Page 2: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/2.jpg)
![Page 3: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/3.jpg)
http://www.ict-forward.eu/
![Page 4: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/4.jpg)
![Page 5: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/5.jpg)
![Page 6: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/6.jpg)
![Page 7: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/7.jpg)
![Page 8: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/8.jpg)
![Page 9: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/9.jpg)
”…The Web will be understood not as
screenfulls of text and graphics but as
a transport mechanism, the ether
through which interactivity happens…”
DiNucci, 1999
![Page 10: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/10.jpg)
![Page 11: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/11.jpg)
A map of the World,
showing the most
popular social
networks by country,
according to Alexa &
Google Trends for
Websites traffic data
(June, 2010).
![Page 12: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/12.jpg)
Intuitive entity-relationship notation;
Details’ consideration in I-SCIP*;
Familiar to the scientific world for more
then half a century.
![Page 13: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/13.jpg)
The Universe
of Physical
Realities
Decision
Verification
Discretization
Errors
Validation
Observ.
Errors Modelling
Errors
Computational
Models
Theory/
Mathematical
Models Observations
Knowledge
![Page 14: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/14.jpg)
![Page 15: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/15.jpg)
![Page 16: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/16.jpg)
http://www.syssec-project.eu/
![Page 17: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/17.jpg)
SysSec
Community
Industry
Other Stakeholders
Center of Academic Excellence (Education)
Center of Research
Excellence
Academia
![Page 18: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/18.jpg)
SysSec Europe
Italy
Nether-land
France
Austria
Bulgaria
Sweden
Turkey
Greece
SysSec Europe
AT&T
Microsoft
Panda
Hispasec
Orange
F-Secure
Symantec
![Page 19: Challenges in cyber security An academic vie · Malicious hardware Use of COTS components . Why to Address Social Networks? Parti cipation Usability AJAX Web 2.0 esign Convergence](https://reader033.vdocuments.mx/reader033/viewer/2022041422/5e1f99c69cc6e531f93a837c/html5/thumbnails/19.jpg)