#Cybersecurity

https://editorialia.com/wp-content/uploads/2020/04/e74ee944-e7de-480c-9b60-665e97c78261.png

Encrypted Traffic Analysis

This report explores the current state of affairs in Encrypted Traffic Analysis and in particular discusses research and methods in 6 key use cases; viz. application identification, network analytics, user information identification, detection of encrypted malware, file/device/website/location fingerprinting and DNS tunnelling detection.

https://editorialia.com/wp-content/uploads/2020/04/logo_cyber_security.png

Free Cybersecurity Training

Provides instruction in the basic of network security in depth. Includes security objectives, security architecture, security models and security layers; risk management, network security policy, and security training. Includes the give security keys, confidentiality integrity, availability, accountability and auditability. Lecture 3 hours per week.

https://editorialia.com/wp-content/uploads/2020/06/standardisation-in-support-of-the-cybersecurity-certification.jpg

Standardisation in support of the Cybersecurity Certification

The document presents the value of the cybersecurity standardisation efforts for certification, the roles and responsibilities of Standards Developing Organisations (SDOs) in this context, and discusses various ways how standardisation can support efficiently the process of certification schemes creation by following a step by step methodology.

Cyber Europe 2020: Preparing healthcare sector to respond to cyber crises

In 2020, European countries and the EU Agency for Cybersecurity (ENISA) should have organised the 6th pan European cyber crisis exercise, Cyber Europe 2020 (CE2020). However, due to the current health crisis Cyber Europe will be shifted to a later date, yet to be announce. CE2020 is part of the bi-annual Cyber Europe series of exercises launched in 2010.

https://editorialia.com/wp-content/uploads/2020/04/pan-euhackathon.jpg

EUvsVirus, a pan-European hackathon: When? 24, 25 and 26 April

The European Commission, in close collaboration with EU member states, will host a pan-European hackathon to connect civil society, innovators, partners and buyers across Europe to develop innovative solutions to overcome coronavirus-related challenges.

https://arxiv.org/pdf/2001.06309.pdf

Cyber Attack Detection thanks to Machine Learning Algorithms

Cybersecurity attacks are growing both in frequency and sophistication over the years. This increasing sophistication and complexity call for more advancement and continuous innovation in defensive strategies. Traditional methods of intrusion detection and deep packet inspection, while still largely used
and recommended, are no longer sufficient to meet the demands of growing security threats.

Guía de diseño de COBIT 2019

Guía de diseño de COBIT 2019: el diseño de una solución de gobernanza de la información y la tecnología es una publicación innovadora para el marco de trabajo de COBIT.