Abstract
In this paper we present the discussion about the future ideas, needs and trends for cyber security technologies. Our focus is on the future technologies which should be developed in order to further enhance the protection of the cyberspace. Similarly to our work in the FP7 CAMINO project, we follow the comprehensive approach looking at broad range of possible technologies and problems. We termed our approach as THOR since we considered the following dimensions: Technical, Human, Organisational and Regulatory. In this paper we also discuss the idea of the comprehensive approach, since we believe only holistic view on cyber security can improve protection from the cyber threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Batz, D., et al.: Roadmap to achieve energy delivery systems cybersecurity, Technical report, Department of Homeland Security, Cyber Security R&D Center (2011)
Berenson, J.: The Roadmap to Secure Control System in the Transportation Sector, The Roadmap to Secure Control Systems in the Transportation Sector Working Group (2012)
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303–336 (2014)
Choraś, M.: Comprehensive approach to information sharing for increased network security and survivability. Cybern. Syst. 44(6–7), 550–568 (2013)
Choraś, M., et al.: Comprehensive approach to increase cyber security and resilience. In: Proceedings of ARES (International Conference on Availability, Reliability and Security), Touluse, pp. 686–692 (2015)
Choraś, M., Kozik, R., Renk, R., Holubowicz, W.: A practical framework and guidelines to enhance cyber security and privacy. In: Herrero, A., Baruque, B., Sedano, J., Quintan, H., Corchado, E. (eds.) International Joint Conference CISIS 2015 and ICEUTE 2015. AISC, vol. 369, pp. 485–496. Springer, Heidelberg (2015)
Eisenhauer, J., Donnelly, P., Ellis, M., OBrien, M.: Roadmap to Secure Control Systems in the Energy Sector, U.S. Department of Energy, U.S. Department of Homeland Security (2006)
EU NIS Platform Working Group 3, Secure ICT Research Landscape Deliverable. https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/state-of-the-art-of-the-secure-ict-landscape/at_download/file
European Union Agency for Network and Information Security (ENISA), National Cyber Security Strategies in the World. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-in-the-world
Johnson, S., Larson, B., Edwards, D., Morley, K.: Roadmap to Secure Control Systems in the Water Sector, Water Sector Coordinating Council Cyber Security Working Group (WSCCCWG) (2008)
Markatos, E., Balzarotti, D.: A Roadmap for Systems Security Research, SysSec, FP7 NoE Project
National Institute of Standards and Technology (NIST) 2014, NIST Roadmap for Improving Critical Infrastructure Cybersecurity
Pederson, P., Roxey, T., Gray, J.: Cross-sector Roadmap for Cybersecurity of Control Systems. Industrial Control Systems Joint Working Group (ICSJWG) (2011)
U.S. Department of Homeland Security 2009, A Roadmap for Cybersecurity Research
U.S. Department of Homeland Security 2010, Dams Sector Roadmap to Secure Control Systems
Betterley, R.S.: The Betterley Report: Cyber/privacy insurance market survey (2014). http://betterley.com/samples/cpims14_nt.pdf. Accessed 22 Apr 2016
Jones, S.: Lloyds CEO Sees Cyber Insurance to Surge After Attacks, Bloomberg Business (2014). http://www.bloomberg.com/news/articles/2014-10-08/lloyd-s-ceo-sees-cyber-insurance-to-surge-after-attacks. Accessed 22 Apr 2016
Marotta, A., Martinelli, F., Nanni, S., Yautsiukhin, A.: A Survey on Cyber-Insurance, Consiglio Nazionale delle Ricerche, IIT TR-17/2015. Technical report (2015)
Acknowledgement
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the CAMINO project under grant agreement no 607406.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Choraś, M., Kozik, R., Churchill, A., Yautsiukhin, A. (2016). Are We Doing All the Right Things to Counter Cybercrime?. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-38930-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38929-5
Online ISBN: 978-3-319-38930-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)