- Page 1:
SEVENTH FRAMEWORK PROGRAMMETHERED B
- Page 4 and 5:
The Red Book. ©2013 The SysSec Con
- Page 7 and 8:
PrefaceAfter the completion of its
- Page 9 and 10:
Contents1 Executive Summary 32 Intr
- Page 11 and 12:
1 Executive SummaryBased on publish
- Page 13:
1.2. Grand Challenges4. will have t
- Page 16 and 17:
2. Introductionwho want to get at t
- Page 18 and 19:
2. Introduction• Although conside
- Page 20 and 21:
2. Introductionfuture, where each a
- Page 22 and 23:
2. Introductiondrones), such sensor
- Page 24 and 25:
2. Introductioncover our energy nee
- Page 27:
Part I: Threats Identified
- Page 30 and 31:
3. In Search of Lost Anonymity3.2 W
- Page 32 and 33:
3. In Search of Lost Anonymityguide
- Page 35 and 36:
4 Software VulnerabilitiesExtending
- Page 37 and 38:
4.1. What Is the Problem?infrastruc
- Page 39 and 40:
4.5. State of the Artparts of criti
- Page 41:
4.7. Example Problemstem mitigation
- Page 44 and 45:
5. Social Networks5.1 Who Is Going
- Page 46 and 47:
5. Social Networksby such an applic
- Page 48 and 49:
5. Social Networksdisasters. This r
- Page 50 and 51:
6. Critical Infrastructure Security
- Page 52 and 53:
6. Critical Infrastructure Security
- Page 54 and 55:
6. Critical Infrastructure Security
- Page 56 and 57:
6. Critical Infrastructure Security
- Page 59 and 60:
7 Authentication and AuthorizationH
- Page 61 and 62:
7.2. Who Is Going to Be Affected?so
- Page 63 and 64:
7.5. State of the ArtFinally, ident
- Page 65 and 66:
7.6. Research Gapshashes and evalua
- Page 67 and 68:
8 Security of Mobile DevicesIn an e
- Page 69 and 70:
8.3. What Is the Worst That Can Hap
- Page 71 and 72:
8.4. State of the ArtAll the other
- Page 73:
8.6. Example Problemserated anomaly
- Page 76 and 77:
9. Legacy Systemsthe execution of a
- Page 78 and 79:
9. Legacy Systemsparts of the progr
- Page 81 and 82:
10 Usable SecurityKeys, locks, and
- Page 83 and 84: 10.4. What Is the Worst That Can Ha
- Page 85 and 86: 10.6. Research Gaps10.6 Research Ga
- Page 87: 10.7. Example Problemsof value for
- Page 90 and 91: 11. The Botnet that Would not DieNu
- Page 92 and 93: 11. The Botnet that Would not Diefa
- Page 94 and 95: 11. The Botnet that Would not Dieti
- Page 96 and 97: 12. Malwarethan 128 million malware
- Page 98 and 99: 12. Malwareequipped with auto-updat
- Page 100 and 101: 12. Malwarethe introduction of App
- Page 102 and 103: 13. Social Engineering and Phishing
- Page 104 and 105: 13. Social Engineering and Phishing
- Page 106 and 107: 13. Social Engineering and Phishing
- Page 108 and 109: 13. Social Engineering and Phishing
- Page 111 and 112: 14 Grand ChallengesOne of the most
- Page 113: Part II: Related Work
- Page 116 and 117: 15. A Crisis of Prioritization•
- Page 118 and 119: 16. Forwardare accessible from the
- Page 120 and 121: 16. ForwardRecommendation 4: “The
- Page 122 and 123: 17. Federal Plan for Cyber Security
- Page 124 and 125: 17. Federal Plan for Cyber Security
- Page 126 and 127: 18. EffectsPlus18.1 Roadmap Structu
- Page 128 and 129: 18. EffectsPlus18.6 Identified Prio
- Page 130 and 131: 19. Digital GovernmentThe roadmap o
- Page 132 and 133: 20. Horizon2020• “Making cyber
- Page 136 and 137: 21. RISEPTIS Report• Taking advan
- Page 139 and 140: 22 ENISA Threat Landscape and Indus
- Page 141 and 142: 22.2. Emerging Issues per Area9. Id
- Page 143 and 144: 22.4. Industrial Reportsrepresent t
- Page 145 and 146: 23 Cyber Security and InformationIn
- Page 147: 23.3. Recommendationsflexible, dist
- Page 150 and 151: 24. Cyber Security Strategy• All
- Page 152 and 153: 24. Cyber Security Strategydinate t
- Page 154 and 155: 25. The Dutch National Cyber Securi
- Page 156 and 157: 25. The Dutch National Cyber Securi
- Page 158 and 159: 25. The Dutch National Cyber Securi
- Page 160 and 161: 25. The Dutch National Cyber Securi
- Page 162 and 163: 25. The Dutch National Cyber Securi
- Page 164 and 165: 25. The Dutch National Cyber Securi
- Page 166 and 167: A. Methodologiessummarized document
- Page 168 and 169: B. SysSec Threats Landscape Evoluti
- Page 170 and 171: B. SysSec Threats Landscape Evoluti
- Page 172 and 173: B. SysSec Threats Landscape Evoluti
- Page 174 and 175: Bibliography[22] Google Accounts Au
- Page 176 and 177: Bibliography[69] Obama Order Sped U
- Page 178 and 179: Bibliography[108] J. Bonneau, C. He
- Page 180 and 181: Bibliography[150] D. Desai. Malware
- Page 182 and 183: Bibliography[194] V. George, T. Pia
- Page 184 and 185:
Bibliography[233] G. S. Kc, A. D. K
- Page 186 and 187:
Bibliography[272] G. McDonald, L. O
- Page 188 and 189:
Bibliography[309] E. Passerini, R.
- Page 190 and 191:
Bibliography[350] S. Sidiroglou and
- Page 192 and 193:
Bibliography[387] D. Wagner, J. S.
- Page 194:
SEVENTH FRAMEWORK PROGRAMMEInformat