ITEA is the Eureka Cluster on software innovation
ITEA is the Eureka Cluster on software innovation
Please note that the ITEA Office will be closed from 25 December 2024 to 1 January 2025 inclusive.

ITEA Challenge

Download PDF version

Safety and Security Safety and Security

Introduction

Digital literacy encounters the challenge of moving from searching, finding and understanding digital information to managing digital footprints, being aware of copyright issues and behaving ethically in crediting ownership, cognisant of the lasting imprint of information online and managing issues of privacy and constructive presence. Safety and security have become critical issues. In adopting cloud services, robust and efficient identity management is a key business necessity for both cloud service providers and cloud consumers. In the energy domain Europe is transforming a current traditional electricity network into an advanced, digitised and more efficient Smart Grid. However, both here and in the ever more connected automotive domain, massive data collection also creates new security challenges that have to be tackled. The digital transition is reshaping all of society, exercising control through data flows. Anything arising from these data flows (attacks, bugs) may generate significant damage to our society in the physical sense, too. For all the benefits the digital world brings, there are always threats, and there lies the challenge for Safety and Security.

Some facts and figures

  • In 2014, CSIS & McAfee estimated that the likely annual cost to the global economy from cybercrime is more than USD 400 billion. A conservative estimate would be USD 375 billion in losses, while the maximum could be as much as USD 575 billion. [26]
  • Businesses suffered nearly 43 million known security incidents in 2014. This increased by 48% compared with 2013 and equals some 117,000 attacks daily. [27]
  • In 2016, email posed a dangerous and efficient threat to users: one in 131 emails contained malware, the highest rate in five years. And Business Email Compromise (BEC) scams, relying on spear-phishing emails, targeted over 400 businesses every day, draining USD 3 billion over the last three years. [28]
  • Ransomware has escalated across the globe as a profit centre for criminals. In 2016, Symantec identified 100 new malware families released into the wild, more than triple the amount seen previously, and a 36% increase in ransomware attacks worldwide. [28]
  • It's only a matter of time until we see major industrial control system (ICS) attacks. Attacks on ecommerce stores, social media platforms and others have become so commonplace that we've almost grown cold to them. Bad guys will move onto bigger targets: dams, water treatment facilities and other critical systems to gain recognition. [29]

Imagine …

Imagine investing a huge amount of effort in the digital transition of society, a transformation that will generate huge quantities of data flows that contain everything you are doing and all the command & control signals of society worldwide. These data flows will be susceptible to thieves, terrorists and uninhibited businessman to spy on you, blackmail or intimidate you, or even to command & control the different systems such that they destroy the quality of lives or even lives themselves. The dream of developing some new engineering tools to reduce the number of breaches in the software, to protect access to the data flows for those who need to know and exclusively for them. To have dynamic agents continuously analysing how the data are used and detecting any misuse or bugs so that they can react in real time and adapt the software to protect the end users. Imagine keeping all your data digitally without having the worry of it being misused, stolen or monitored.

Imagine what is possible when we dare to dream, when we reach for the stars in a galaxy full of opportunities …


References

[26] Net Losses: Estimating the Global Cost of Cyber-Crime. Center for Strategic and International Studies & McAfee, June 2014.
[27] PwC Global State of Information Security Survey 2015. PwC, September 2014.
[28] Symantec 2017 Internet Security Threat Report. Symantec, Volume 22 – April 2017.
[29] 10 cyber security predictions for 2017. C. Cunningham. ITProPortal, January 2017.

Projects related to the challenge Safety and Security

ITEA Call 2022
Alt Alt Alt Alt Alt

FireBIM

Accounting for fire safety engineering using Building Information Modelling

ITEA Call 2022
Alt Alt Alt Alt Alt

NADIR

Natural Disaster Risk and Assessment Platform

ITEA Call 2022
Alt Alt Alt Alt

SINTRA

Security of Critical Infrastructure by Multi-Modal Dynamic Sensing and AI

ITEA Call 2022
Alt Alt Alt Alt Alt

Sa4CPS

Secure situational awareness for critical cyber-physical systems

ITEA Call 2021
Alt Alt Alt

VESTA

Proactive protection against phishing-based ransomware

AI Call 2020
Alt Alt Alt

IML4E

Industrial Machine Learning for Enterprises

AI Call 2020
Alt Alt

Spectralligence

Spectral Analysis in life sciences and materials sciences through Artificial Intelligence

ITEA 3 Call 7
Alt Alt Alt Alt Alt Alt

ENTA

Encrypted Network Traffic Analysis for Cyber Security

ITEA 3 Call 6
Alt Alt Alt

STACK

Smart, Attack-Resistant Internet of Things Networks

ITEA 3 Call 5
Alt Alt Alt Alt Alt

DEFRAUDify

Detect Fraudulent Activities in dark web and clear web to protect your business

ITEA 3 Call 4
Alt Alt Alt Alt Alt

SCRATCh

SeCuRe and Agile Connected Things

ITEA 3 Call 2
Alt Alt Alt Alt Alt Alt

HI-RISE

High Integrity RPAS by Innovative Software Engineering

ITEA 3 Call 2
Alt Alt Alt

PARFAIT

Personal dAta pRotection FrAmework for IoT

ITEA 3 Call 1
Alt Alt

SecureGrid

Security, fraud detection and encryption for smart grids based on AI

ITEA 2 Call 8
Alt Alt Alt Alt

APPS

Advancing Plug & Play Smart Surveillance

ITEA 2 Call 8
Alt Alt Alt

INSIST

Integrated service delivery for citizens' safety and comfort

ITEA 2 Call 8
Alt Alt

InCloudInG

Inter-cloud identity governance

ITEA 2 Call 7
Alt Alt
Winner ITEA Award of Excellence Innovation & Business impact 2018
project header

IDEA4SWIFT

Identity, Doc, Exchange, Authentication 4 Systems Worldwide Interconnections of Frequent Travelers

ITEA 2 Call 7
Alt Alt Alt

ViSCa

VIrtualization of Smart CArds

ITEA 2 Call 6
Alt Alt Alt Alt Alt

FedSS

Federated Security Shield

ITEA 2 Call 5
Alt Alt
Winner ITEA Award of Excellence Business Impact 2016
project header

ADAX

Attack Detection And Countermeasures Simulation

ITEA 2 Call 5
Alt Alt Alt Alt

DiCoMa

Disaster Control Management

ITEA 2 Call 5
Alt Alt Alt Alt

PREDYKOT

Policies REfined DYnamically and Kept On Track

ITEA 2 Call 5
Alt Alt Alt
Winner ITEA Award of Excellence Business impact and Standardisation 2015
project header

SAFE

Safe Automotive soFtware architEcture

ITEA 2 Call 4
Alt Alt Alt
Winner ITEA Award of Excellence User focus 2016
project header

RECONSURVE

A Reconfigurable Surveillance System with Smart Sensors and Communication

ITEA 2 Call 4
Alt Alt Alt Alt

SPY

Surveillance imProved sYstem

ITEA 2 Call 3
Alt Alt Alt Alt Alt Alt Alt Alt

Guarantee

A Guardian Angel for the Extended Home Environment

ITEA 2 Call 3
Alt Alt

ROLE-ID

Role-centric identity

ITEA 2 Call 2
Alt Alt
Winner Achievement Awards Gold 2011
project header

MULTIPOL

Security policies in multi-domain environments

ITEA 2 Call 1
Alt Alt Alt

TECOM

Trusted Embedded Computing