- Page 1:
SEVENTH FRAMEWORK PROGRAMMETHERED B
- Page 4 and 5:
The Red Book. ©2013 The SysSec Con
- Page 7 and 8:
PrefaceAfter the completion of its
- Page 9 and 10:
Contents1 Executive Summary 32 Intr
- Page 11 and 12:
1 Executive SummaryBased on publish
- Page 13:
1.2. Grand Challenges4. will have t
- Page 16 and 17:
2. Introductionwho want to get at t
- Page 18 and 19:
2. Introduction• Although conside
- Page 20 and 21:
2. Introductionfuture, where each a
- Page 22 and 23:
2. Introductiondrones), such sensor
- Page 24 and 25:
2. Introductioncover our energy nee
- Page 27:
Part I: Threats Identified
- Page 30 and 31:
3. In Search of Lost Anonymity3.2 W
- Page 32 and 33:
3. In Search of Lost Anonymityguide
- Page 35 and 36:
4 Software VulnerabilitiesExtending
- Page 37 and 38:
4.1. What Is the Problem?infrastruc
- Page 39 and 40:
4.5. State of the Artparts of criti
- Page 41:
4.7. Example Problemstem mitigation
- Page 44 and 45:
5. Social Networks5.1 Who Is Going
- Page 46 and 47:
5. Social Networksby such an applic
- Page 48 and 49:
5. Social Networksdisasters. This r
- Page 50 and 51:
6. Critical Infrastructure Security
- Page 52 and 53:
6. Critical Infrastructure Security
- Page 54 and 55:
6. Critical Infrastructure Security
- Page 56 and 57:
6. Critical Infrastructure Security
- Page 59 and 60:
7 Authentication and AuthorizationH
- Page 61 and 62:
7.2. Who Is Going to Be Affected?so
- Page 63 and 64: 7.5. State of the ArtFinally, ident
- Page 65 and 66: 7.6. Research Gapshashes and evalua
- Page 67 and 68: 8 Security of Mobile DevicesIn an e
- Page 69 and 70: 8.3. What Is the Worst That Can Hap
- Page 71 and 72: 8.4. State of the ArtAll the other
- Page 73: 8.6. Example Problemserated anomaly
- Page 76 and 77: 9. Legacy Systemsthe execution of a
- Page 78 and 79: 9. Legacy Systemsparts of the progr
- Page 81 and 82: 10 Usable SecurityKeys, locks, and
- Page 83 and 84: 10.4. What Is the Worst That Can Ha
- Page 85 and 86: 10.6. Research Gaps10.6 Research Ga
- Page 87: 10.7. Example Problemsof value for
- Page 90 and 91: 11. The Botnet that Would not DieNu
- Page 92 and 93: 11. The Botnet that Would not Diefa
- Page 94 and 95: 11. The Botnet that Would not Dieti
- Page 96 and 97: 12. Malwarethan 128 million malware
- Page 98 and 99: 12. Malwareequipped with auto-updat
- Page 100 and 101: 12. Malwarethe introduction of App
- Page 102 and 103: 13. Social Engineering and Phishing
- Page 104 and 105: 13. Social Engineering and Phishing
- Page 106 and 107: 13. Social Engineering and Phishing
- Page 108 and 109: 13. Social Engineering and Phishing
- Page 111 and 112: 14 Grand ChallengesOne of the most
- Page 113: Part II: Related Work
- Page 117 and 118: 16 Forward: Managing Threats inICT
- Page 119 and 120: 16.2. Recommendationsoperating on)
- Page 121 and 122: 17 Federal Plan for Cyber Security
- Page 123 and 124: 17.2. Recommendations“Make cyber
- Page 125 and 126: 18 EffectsPlus Trust and SecurityRe
- Page 127 and 128: 18.3. Vision18.2.3 Changes in Socie
- Page 129 and 130: 19 Digital Government: Building a 2
- Page 131 and 132: 20 H2020: The Challenge of Providin
- Page 133: 20.2. Societal Perspective• “En
- Page 136 and 137: 21. RISEPTIS Report• Taking advan
- Page 139 and 140: 22 ENISA Threat Landscape and Indus
- Page 141 and 142: 22.2. Emerging Issues per Area9. Id
- Page 143 and 144: 22.4. Industrial Reportsrepresent t
- Page 145 and 146: 23 Cyber Security and InformationIn
- Page 147: 23.3. Recommendationsflexible, dist
- Page 150 and 151: 24. Cyber Security Strategy• All
- Page 152 and 153: 24. Cyber Security Strategydinate t
- Page 154 and 155: 25. The Dutch National Cyber Securi
- Page 156 and 157: 25. The Dutch National Cyber Securi
- Page 158 and 159: 25. The Dutch National Cyber Securi
- Page 160 and 161: 25. The Dutch National Cyber Securi
- Page 162 and 163: 25. The Dutch National Cyber Securi
- Page 164 and 165:
25. The Dutch National Cyber Securi
- Page 166 and 167:
A. Methodologiessummarized document
- Page 168 and 169:
B. SysSec Threats Landscape Evoluti
- Page 170 and 171:
B. SysSec Threats Landscape Evoluti
- Page 172 and 173:
B. SysSec Threats Landscape Evoluti
- Page 174 and 175:
Bibliography[22] Google Accounts Au
- Page 176 and 177:
Bibliography[69] Obama Order Sped U
- Page 178 and 179:
Bibliography[108] J. Bonneau, C. He
- Page 180 and 181:
Bibliography[150] D. Desai. Malware
- Page 182 and 183:
Bibliography[194] V. George, T. Pia
- Page 184 and 185:
Bibliography[233] G. S. Kc, A. D. K
- Page 186 and 187:
Bibliography[272] G. McDonald, L. O
- Page 188 and 189:
Bibliography[309] E. Passerini, R.
- Page 190 and 191:
Bibliography[350] S. Sidiroglou and
- Page 192 and 193:
Bibliography[387] D. Wagner, J. S.
- Page 194:
SEVENTH FRAMEWORK PROGRAMMEInformat