11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

B.4. SysSec 2013 Threats LandscapeSystem Security Aspects of PrivacyLikelihoodCertainQuite UnlikelySimple SolutionTechnologicalDifficultyVery HardTargetsFew EverybodyLowImpact (damage)HighWell studiedStill Unexplo<strong>red</strong>Need for ResearchIn 5 yearsTimeNowCollection, Detection and Prevention of Targeted AttacksQuite UnlikelyLikelihoodCertainLowImpact (damage)HighVery HardTechnologicalDifficultySimple SolutionWell studiedStill Unexplo<strong>red</strong>Need for ResearchTargetsFew EverybodyIn 5 yearsTimeNowSecurity of New and Emerging TechnologiesQuite UnlikelyLikelihoodCertainLowImpact (damage)HighVery HardTechnologicalDifficultySimple SolutionWell studiedStill Unexplo<strong>red</strong>Need for ResearchTargetsFew EverybodyIn 5 yearsTimeNowFigure B.3: Generalized results from D4.2: Second Report on Threats on theFuture Internet and Research Roadmap about System Security Aspects of Privacy,Collection, Detection and Prevention of Targeted Attacks and Security of New andEmerging Technologies trends.163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!