Searched for: subject%3A%22Cybersecurity%22
(1 - 20 of 23)

Pages

document
van der Kleij, R. (author), Schraagen, J.M. (author), Cadet, B. (author), Young, H. (author)
Cybersecurity threat and incident managers in large organizations, especially in the financial sector, are confronted more and more with an increase in volume and complexity of threats and incidents. At the same time, these managers have to deal with many internal processes and criteria, in addition to requirements from external parties, such as...
article 2022
document
Ylönen, M. (author), Tugnoli, A. (author), Oliva, G. (author), Heikkilä, J. (author), Nissilä, M. (author), Iaiani, M. (author), Cozzani, V. (author), Setola, R. (author), Assenza, G. (author), van der Beek, D. (author), Steijn, W. (author), Gotcheva, N. (author), Del Prete, E. (author)
The call for integrated management of safety and security (IMSS) derives from intensification of digitalisation development and the increased reliance on information communication technologies (ICT) in high-risk industries, such as the chemical and process industry. This development means tightened interconnectedness between industrial...
article 2022
document
van der Meer, S.J. (author)
This article explores the response options available to states experiencing a large-scale cyberattack from abroad, as well as the potential benefits and risks of these policy tools. The aim is to develop a toolbox for policymakers searching for effective responses. The policy options are split into two groups: those aimed at attacks by state...
article 2022
document
Bijmans, H.L.J. (author), Booij, T.M. (author), Schwedersky1, A. (author), Nedgabat, A.B. (author), van Wegberg, R. (author)
Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking victims into disclosing these on fraudulent websites. But, how do these kits impact the phishing landscape? And, how often are they used? We leverage the use...
conference paper 2021
document
Ylönen, M. (author), Nissilä, M. (author), Heikkilä, J. (author), Gotcheva, N. (author), Tugnoli, A. (author), Iaiani, M. (author), Cozzani, V. (author), Oliva, G. (author), Setola, R. (author), Assenza, G. (author), van der Beek, D. (author), Steijn, W. (author), Young, H. (author), Roelofs, M. (author)
This is the final report summarises the main results of the research project on Integrated Management of Safety and Security Synergies in Seveso plants (SAF€RA 4STER). The objectives of the research project were the following: 1) To gain insights into synergies and tensions related to the management of safety and security in Seveso plants. 2) To...
report 2021
document
Heikkilä, J. (author), Nissilä, M. (author), Ylönen, M. (author), Gotcheva, N. (author), Tugnoli, A. (author), Iaiani, M. (author), Cozzani, V. (author), Oliva, G. (author), Setola, R. (author), Assenza, G. (author), van der Beek, D. (author), Steijn, W. (author), Young, H. (author), Roelofs, M. (author)
The digitalisation trend in the process-industries bring with new safety and security challenges. Modern plants are constantly investing in automation, allowing plant to operate autonomously, to different degrees. For a long time, chemical plants were not connected to networks, and thus they were not designed with cybersecurity in mind. However,...
report 2021
document
Marksteiner, S. (author), Marko, N. (author), Smulders, A. (author), Karagiannis, S. (author), Stahl, F. (author), Hamazaryan, H. (author), Schlick, R. (author), Kraxberger, S. (author), Vasenev, A. (author)
Modern vehicles become increasingly digitalized with advanced information technology-based solutions like advanced driving assistance systems and vehicle-to-x communications. These systems are complex and interconnected. Rising complexity and increasing outside exposure has created a steadily rising demand for more cyber-secure systems. Thus,...
conference paper 2021
document
Buningh, M. (author)
This TNO paper provides insight into the growing importance of cybersecurity in the supply chain and offers a handling perspective for companies that want to make themselves more resilient. Improving cyber resilience not only helps an organization to mitigate its security risk but also reduces the potential impact for others within the supply...
other 2021
document
Hendriks, T. (author)
conference paper 2021
document
Nair, V.V. (author), van Staalduinen, M. (author), Oosterman, D.T. (author)
The rapid rise of the Dark Web and supportive technologies has served as the backbone facilitating online illegal activity worldwide. These illegal activities supported by anonymisation technologies such as Tor has made it increasingly elusive to law enforcement agencies. Despite several successful law enforcement operations, illegal activity on...
conference paper 2021
document
Gijsen, B. (author), Montalto, R. (author), Panneman, J. (author), Falconieri, F. (author), Wiper, P. (author), Zuraniewski, P. (author)
autonomic computing long since holds the promise to achieve properties including self-healing IT. The self-healing property provides a new perspective in the continuous battle between cyber attackers and defenders. Emerging containerization technology, and accompanying monitoring and deployment tools, can boost the state-of-the-art regarding...
conference paper 2021
document
Aliman, N.M. (author), Kester, L.J.H.M. (author), Yampolskiy, R. (author)
In the last years, artificial intelligence (AI) safety gained international recognition in the light of heterogeneous safety-critical and ethical issues that risk overshadowing the broad beneficial impacts of AI. In this context, the implementation of AI observatory endeavors represents one key research direction. This paper motivates the need...
article 2021
document
Vos, J. (author), van den Brink, P.E. (author), van Schie, T.C.C. (author)
report 2019
document
Wolthuis, R. (author), Phillipson, F. (author), Rochat, P. (author), van Ingen, B. (author), Zeijlemaker, S. (author), Gorter, D. (author)
conference paper 2019
document
Jansen-Ferdinandus, G.R. (author), Buiel, E.F.T. (author), Meiler, P.P. (author), Verburgh, T. (author)
The increasing labour shortage of skilled ICT personnel forces SOC and CSIRT organisations to prioritize the services they offer and optimise their workforce development strategies. Our review of currently available frameworks shows that there is no single framework that provides a complete solution to identify the required competencies of SOC...
report 2018
document
Zielstra, A. (author)
Digitale bedrijvigheid zorgde de afgelopen 25 jaar voor ruim een derde van alle economische groei. Meer dan 5 procent van ons bnp verdienen we met ICT. Nederland heeft een toppositie in de wereld als het gaat om de digitale economie. Maar het is niet vanzelfsprekend dat we die behouden. Volgens Harvard Business Review behoort Nederland zelfs tot...
other 2017
document
Luiijf, H.A.M. (author), Steijn, W.M.P. (author)
De Arbeidsomstandighedenwet 1998 (*1) legt de werkgever en ook de werknemers een aantal eisen en verplichtingen op inzake de veiligheid van het werk en de zorg voor de gezondheid van de medewerkers. Maar is er wel rekening mee gehouden dat onbevoegden of malware digitaal gestuurde processen kunnen overnemen of verstoren en dat daarmee de...
article 2016
document
Luiijf, H.A.M. (author)
Nederland heeft drie handreikingen overhandigd aan de deelnemende landen en private partijen die deelnamen aan de Global Conference on GlobalSpace 2015. Hieronder een korte beschrijving en verwijzingen naar de handreikingen
article 2015
document
Luiijf, H.A.M. (author)
Bij ontwikkelaars en gebruikers in de |CT-wereld staat veiligheid zelden bovenaan als het gaat om de belangrijkste producteigenschappen. Op de eerste plaats moet het gewoon werken.Vervolgens moet het zoveel mogelijk kunnen. En het mag natuurlijk niet te ingewikkeld zijn. Of het ook veilig is? Dat zaltoch wel? Nu tegenwoordig zo ongeveer alles en...
article 2014
document
Luiijf, H.A.M. (author), Smulders, A.C.M. (author), Kamphuis, P. (author)
In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.
article 2013
Searched for: subject%3A%22Cybersecurity%22
(1 - 20 of 23)

Pages