Security SOTA

The breadth of cyber security and privacy challenges within wider technology, policy, and economic perspectives is vast in scope, and has been described as extraordinary [LAN12]. In aiming to build systems with as few security flaws as possible, strong demands are placed on software architecture, software engineering, system engineering and overall computing technology generally. Security and privacy implementations are often perceived as an optional engineering cost, often unrecoverable, meaning that economic decisions have to be made around who should pay for such costs. Should governments do so via in increased defence and policing budgets, or in less direct forms such as subsidy support? Should manufacturers pay in order to build more robust software or hardware? Or should the more prominent status quo prevail, in that end-users continue to increase investment in available security risk reduction solutions while simultaneously absorbing losses to crime? Hence policy makers are interested in how best to introduce the right economic incentives that fairly balance those costs across the various actors in the security value chain. End-users are interested in achieving (and exceeding) PACs best practices relative to their target peers. Researchers are interested in achieving technological and scientific excellence, ideally translating to commercial impact. PACs solution providers need to ensure that the innovation bleeding edge is reflected in their proposed solution roadmaps, both in the short term and longer term. 

Key PACs Technology Silo Areas
Such challenges influence the security and privacy research agendas identified to date across a broad range of PACs technology silos. Various technology silo categorisations exist, one example being the ITU National Cybersecurity Strategy Guide (Annex 2) Technical Solutions [ITU11], which in turn has been used to leverage various NIS WG3 research activities into existing Secure ICT state of the art [NIS14 ]. Priority technology silos identified from these analysis efforts in particular are summarised as follows and summarised below:

(CLICK THROUGH FOR MORE ON EACH AREA)

1. Audit and Monitoring
2. Authentication, Authorisation and Access Control (AAA)
3. Cryptology
4. Forensics and Incident Response
5. Privacy and Security Metrics
6. Malware and Offensive Technologies
7. Mobile Security
8. Network Security and Management
9. Security Information Sharing
10. Secure Software Development and Assurance
11. Security Management Support

References:

[LAN12] Landwehr, C., Boneh, D., Mitchell, J. C., Bellovin, S. M., Landau, S., & Lesk, M. E. (2012). Privacy and cybersecurity: The next 100 years. Proceedings of the IEEE, 100(Special Centennial Issue), 1659-1673.

[ITU11] ITU National Cybersecurity Strategy Guide (Annex 2) Technical Solutions, published September 2011, http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf

[NIS14] State of the Art of Secure ICT Landscape, NIS Platform WG3, submitted July 2014.

 

Theme Overview

This theme provides a broad analysis of the Privacy and Cyber Security Market and Technological landscape from a number of key commercial, research-oriented, and policymaking perspectives that impact and characterise the domain.

Scope

This theme is decomposed further into four subthemes covering different perspectives on the PACs market domain:

  1. “Trends and Challenges” - theme provides a summary of quantatitive statistics from key market analysis sources, as well as a detailed qualitative summary of trends impacting the PACs market
  2. “Market Overview” -  analysis of key horizontal and vertical breakdowns within the PACs market, covering both supply and demand-side considerations
  3. “Science and Technology” – analysis of key scientific and technology activities within PACs research and innovation communities, with particular attention on the EU perspective
  4. “Policy Framework and Legislation” – summary of key bodies and initiatives from policy, legislation and standards perspectives

The Market Analysis theme complements the “Market” Theme also

What you will learn

Analysis in this module will help privacy and cyber security researchers and innovators gain a comprehensive 360 degree understanding of IT/cyber security and privacy marketplace across all key perspectives - providing a strong knowledgebase input for participating effectively in the domain.

The report will provide readers with a comprehensive baseline understanding of the PACS market and wider domain. From there, innovators will likely have further specific market questions relating to their specific context – finding answers to these specific questions will be supported by other templates and modules in the  with IPACSO framework.[SG1] 

Potential Uses Uses and applications of content in this module will vary depending on end-user perspective. Examples include:
  • Product development professionals seeking to clarify direction and identify opportunities in security, privacy or broader ICT markets
  • Researchers and research management personnel seeking to extend their understanding of key perspectives influencing the security and privacy commercial and research domain
  • Policymakers looking to understand market landscape and needs of security/privacy innovators and impact on wider ICT space
  • CISOs and IT Decision-makers seeking greater understanding of security and privacy domain from an innovation perspective and potential impacts
  • Investors in security, privacy and ICT areas seeking to identify key trends and opportunities

 [SG1]Reference these when data becomes available

 

MARKET SCHEME 

 

 

This theme provides a broad analysis of the Privacy and Cyber Security Market and Economic landscape. Analysis is split into two sections: (1) Market Analysis and Economics

The “Market Analysis” section is split into four areas as follows:
1. “Trends and Challenges” - theme provides a summary of quantatitive statistics from key market analysis sources, as well as a detailed qualitative summary of trends impacting the PACs market
2. “Market Overview” - analysis of key horizontal and vertical breakdowns within the PACs market, covering both supply and demand-side considerations
3. “Science and Technology” – analysis of key scientific and technology activities within PACs research and innovation communities, with particular attention on the EU perspective
4. “Policy Framework and Legislation” – summary of key bodies and initiatives from policy, legislation and standards perspectives

 

 

NOTE
Use of the terms “PACs” and “cyber security” throughout - the term “PACs” (Privacy and Cyber Security) is used frequently throughout this content, with “cyber security” officially defined by ISO as the ‘preservation of confidentiality, integrity and availability of information in the Cyberspace‘. While other terms can have separate nuanced definitions for related terms such as “IT Security”, “ICT Security”, “network security”, “internet security” and so on, use of the terms “PACs” and “cyber security” are both used liberally here to encompass one or all of these overlapping terms depending on context. Hence when a term such as “the PACs marketplace” is used, it may also imply related terms, e.g. “the ICT Security marketplace” or the “network security marketplace” depending on the precise context.

Getting Started

Which type of company are you? Choose one of the options below and get a head-start.

Framework Overview

Navigate through the different parts of the Framework

leeg

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries