To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.

More information about cookies
Arriba

Search form

Research Map in cybersecurity
Go back

KET DE CIBERSEGURIDAD Y BLOCKCHAIN

España
TECNALIA
País Vasco
Address: Astodo Bidea, Edificio 700
Contact person
Oscar Lage Serrano

Investigation areas
Areas of interest Data processing Reliable and upgradeable systems Privacy Attack and defense against threats Other Critical infrastructures Identity management Promotion and awareness of safety Evaluation of systems and cyber risk
Lines of investigation
Big data analysis focussed on privacy Large-scale data analysis Statistical and predictive risk analysis Risk management and analysis Architecture of protection Cloud and web application architecture Resilient architectures Cryptographic authentication Authentication of transactions at global level Blockchain and other DLTs Search for the origin of the threat Cyber risks Forensic science Lattice-based homomorphic encryption Smart cities and safe cities Cloud Computing Compliance&Certification Computation of relevant metadata Secure multipart computing Verifiable computing Confidence and reliable big data Access control and authentication Access control based on behaviour CPSs Creation of barriers to entry Creation of information repositories Cryptography Post-quantum encryption Risk quantification Regulatory security compliance Development of threat detection tools Development of data harvesting mechanisms Development of methodologies for increased reliability and updating of systems Threat detection Anomaly detection Detection of malicious software Early detection of cyber risks Detection and monitoring of attacks Design of security requirements Preparation of mechanisms to respond to attacks Scalability and interoperability of identity management solutions Dynamic evaluation and management of risks System entry and exit filters Reliable global-level identity generation Digital Rights Management Electronic evidence management Decision-making management tools Attacker identification and location Security intelligence Internet of Things Interoperability of systems Legacy systems management Mechanisms for data harvesting Improved security in technological standards Improvement of security protocols and standards Methodology for the adoption of best practice and reduction of barriers in relation to risks Methods for reducing and managing complex systems Methods and development of protection tools Integrated risk metrics and indicators System modelling and system attacks Monitoring and profiling Network monitoring and security PET for organizations and infrastructures Privacy Privacy in the cloud IoT privacy Privacy of consultations Secure processing of encrypted data and signals Secure data processing Data protection (confidentiality) Data protection (integrity and availability) Physical data protection Encryption protocols for preserving privacy Detection protocols, system programming and prevention programmes Harvesting of information on threats Data sanitization and anonymization Security / privacy through design Network security Big data security Security in critical systems (aeronautics, rail, automotive) Security support services Threat and attack simulation Simulation of dangerous environments Communication systems resistant to programmed attacks Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.) Systems Compliance Privacy-aware security technologies
Download file
Downloadable agent file
pdf
877.07 KB
Download

Do you want to participate in the Network?

Join the Network of Excellence: Become part of this community of research teams to get involved in joint initiatives and projects.
Request admission