Search results for "cyber-security"

showing 5 items of 5 documents

Una strategia nazionale a difesa del Cyberspazio

2023

L’articolo intende proporre un’analisi circa lo stato dell’arte della sicurezza ci- bernetica in Italia, prestando particolare attenzione alle principali novità conte- nute all’interno della Strategia Nazionale di Cybersicurezza 2022-2026. Nello specifico, dopo aver offerto un inquadramento giuridico del fenomeno degli at- tacchi informatici, il contributo intende approfondire con una visione critica le future sfide che vedranno l’Italia e l’Europa protagoniste nella difesa del pro- prio “dominio cibernetico”. The article intends to propose an analysis about the state of the art of cyber security in Italy, paying particular attention to the main innovations contained in the National Cyberse…

Cyber-security National StrategyNIS DirectiveSettore IUS/10 - Diritto Amministrativocyber-security laworganization of cyber-securitylaw of cyber-attacksicurezza cibernetica – Strategia Nazionale di Cybersicurezza – Direttiva NIS – attacchi cibernetici – organizzazione della sicurezza cibernetica
researchProduct

The Law of Service Robots

2014

Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…

Robots drones remotely piloted aerial systems ENAC liability privacy data protection commons intellectual property digital forensics cyber-security criminal liabilitySettore IUS/01 - Diritto Privato
researchProduct

System for Executing Encrypted Native Programs

2017

An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system …

cyber-securitytrusted computinghypervisorattestation
researchProduct

Strategic Communication for Cyber-security Leadership

2013

The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of cyber security and presents the physical world and the cyber world framework. The paper refers to a system model of a society and uses that model to analyze the results of two limited media surveys about cyber-related newspaper articles. The media surveys indicate a strong need to organize the cyber world. peerReviewed

johtaminenjulkinen keskustelulehdistökirjoittelucyber-securitygovernanceinformation securitytietohallintokyberturvallisuussysteemiajattelucyber security theory
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct