Cybersecurity or Cyber Security for IPaCSO is the domain of ICT security that focuses on challenges and threats related to the cyber world, or internet. Typically, it refers to the protection of networks, systems, applications and data being used on the internet by individuals, companies and technologies. The major causes of challenge can be attributed to cyber crime (including malware, eavesdropping, industrial espionage, ...), insider threats, terrorism and human error. Typically Cyber Security is associated with the aim to protect against data theft or data loss, or to prevent malicious activities due to the exploitation of known and unknown vulnerabilities in the system architectures or human interactions involved. 

Reliable communication networks and services are a critical element for public and economic stability; disruptions (e.g. malicious attacks, denial of services etc) have huge impacts and clearly reveal societies  increased dependency on such networks and services.Cyber security and privacy are at the hearth of these issues and authenticity, integrity and confidentiality of cyberspace data is vital. 

The EU Cyber Security Strategy, announced in February 2013 as by DG Justice, DG CONNECT and the EEAS, tries to address some of these challenges in a coordinated manner. This indicates the importance the European Commission addresses to Cyber Security and proposes a coordinated action to the Member States.  

For more information on the EU Cyber Security Strategy, please visit : http://www.eeas.europa.eu/policies/eu-cyber-security/

The strategy risks and challenges not only to technical implications, but also related economic and geopolitical opportunities, preparedness in case of incidents, the need for coordinated actions and also highlighting the areas where more EU action is needed. 



Getting Started

Which type of company are you? Choose one of the options below and get a head-start.

Framework Overview

Navigate through the different parts of the Framework

leeg

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries