Outcome of CSIT's Belfast 2011 Cyber Summit represents a global collective strategy for world's leading research institutes
Developing self-learning, self aware cyber security technologies, protecting smart utility grids and enhancing the security of mobile networks are among the top research priorities needed to safeguard the internet of tomorrow, according to a report released today.
Published by the UK's National Centre for Secure Information Technologies (CSIT), the report represents the outcome of discussions held during the inaugural World Cyber Security Technology Research Summit hosted by CSIT earlier this year.
The Belfast 2011 event attracted international cyber security experts from leading research institutes, government bodies and industry who gathered to discuss current cyber security threats, predict future threats and the necessary mitigation techniques, and to develop a collective strategy for next generation research.
The collective research strategy contained in the report identifies four research themes critical to the ongoing creation of cyber security defences:
Adaptive cyber security technologies - research objectives in this area will include the development of self-learning cyber security technologies; self-awareness in cyber systems; the establishment of feedback in cyber systems to learn from cyber attacks.
Protection of smart utility grids - research aims in this field will comprise: smart grid requirements gathering methodology; protection technologies for smart grid components; secure technologies for smart grid communications; smart grid and home area network integration that provides privacy and security of collected information; development of smart grid standards.
Security of the mobile platform and applications - research in this space will target not only malicious applications but also mobile cyber security problems introduced by the configuration and use of mobile networks, including network availability, mobile web browsers and caller authentication.
Multi-faceted approach to cyber security research - research will take into account social behavioural norms and societal desires in cyber space, cyber space policies, the impact of cyber and other legislation and the economics of cyber space and cyber security.
"Belfast 2011 brought together a diverse range of talent and knowledge in the cyber security field from which we have developed this strategy for next generation research," says Prof John McCanny CSIT's Principal Investigator.
"Our ambition is that this strategy will help to inform global cyber security research and act as a driver for cyber security roadmap definition over the coming year. We will hold future summits at which changes in cyber security will be discussed and the proposed collective research strategies will be reviewed and developed."
Notes to editors
Copies of the World Cyber Security Technology Research Summit Report – Belfast 2011 - are available from www.csit.qub.ac.uk
About Belfast 2011
Participants at the inaugural World Cyber Security Technology Research Summit included representatives of the UK Home Office, US Department of Commerce, US Cyber Consequences Unit, Stanford University, Carnegie Mellon University, BAE Systems, Thales and IBM.
The Centre for Secure Information Technologies (CSIT) is an innovation and knowledge centre based at Queen's University of Belfast's, Institute of Electronics, Communications and Information Technology (ECIT). Funded by EPSRC, TSB, Invest NI and industry collaborators, the Centre brings together research specialists in complementary fields such as data encryption, network security systems, wireless enabled security systems and intelligent surveillance technology.
CSIT is developing innovative and novel technology in both information and people security applications and is focused on key grand challenges (1) Secure Hyperconnected Networks (Smart Grid Security, Cloud Security, Cyber Security), (2) Secure Transport Corridors (Bus, Train, Airport Security) and (3) Security and Trust in the Financial Sector (e-Crime, Capital Market Security).
CSIT's member companies include: Altera, BAE Systems, Cisco, Q1Labs and Thales as well as government agencies with strong interests in this area. These include the Home Office, GCHQ, CESG, CPNI and DSTL.
Technologies being developed at CSIT include powerful computer processors that can detect and filter malware and cyber attacks within large networks in real-time, Physical Unclonable Functions that provide a lightweight and secure digital fingerprint for physical devices and an Intelligent Reasoning Algorithm that can take large volumes of multi-agent information from CCTV, RFID etc and rationalise and identify security events within transport networks.
For further information, please contact: Brian Arlow on +44 7860 289143
Brian Arlow | EurekAlert!
Fingerprints of quantum entanglement
16.02.2018 | University of Vienna
Simple in the Cloud: The digitalization of brownfield systems made easy
07.02.2018 | Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, DFKI
Breakthrough provides a new concept of the design of molecular motors, sensors and electricity generators at nanoscale
Researchers from the Institute of Organic Chemistry and Biochemistry of the CAS (IOCB Prague), Institute of Physics of the CAS (IP CAS) and Palacký University...
For photographers and scientists, lenses are lifesavers. They reflect and refract light, making possible the imaging systems that drive discovery through the microscope and preserve history through cameras.
But today's glass-based lenses are bulky and resist miniaturization. Next-generation technologies, such as ultrathin cameras or tiny microscopes, require...
Scientists from the University of Zurich have succeeded for the first time in tracking individual stem cells and their neuronal progeny over months within the intact adult brain. This study sheds light on how new neurons are produced throughout life.
The generation of new nerve cells was once thought to taper off at the end of embryonic development. However, recent research has shown that the adult brain...
Theoretical physicists propose to use negative interference to control heat flow in quantum devices. Study published in Physical Review Letters
Quantum computer parts are sensitive and need to be cooled to very low temperatures. Their tiny size makes them particularly susceptible to a temperature...
Let’s say the armrest is broken in your vintage car. As things stand, you would need a lot of luck and persistence to find the right spare part. But in the world of Industrie 4.0 and production with batch sizes of one, you can simply scan the armrest and print it out. This is made possible by the first ever 3D scanner capable of working autonomously and in real time. The autonomous scanning system will be on display at the Hannover Messe Preview on February 6 and at the Hannover Messe proper from April 23 to 27, 2018 (Hall 6, Booth A30).
Part of the charm of vintage cars is that they stopped making them long ago, so it is special when you do see one out on the roads. If something breaks or...
15.02.2018 | Event News
13.02.2018 | Event News
12.02.2018 | Event News
16.02.2018 | Information Technology
16.02.2018 | Health and Medicine
16.02.2018 | Physics and Astronomy