E-CRIME has developed synergy exchanges with other EU projects. We liaise with, identify opportunities to present/exchange information with,  and our work relates to the project listed below:

 

EKSISTENZ – Protecting against identity theft

eksistenz-logo-200px

The major objective of EKSISTENZ is to protect EU citizens’ identities from all current threats but also to foresee what the future threats would be. The project will study in depth the identity theft phenomenon in Europe, revealing the flaws in the different “paper-based” procedures but also in the new dematerialized processes, assess the threat for the citizen and consequently, will develop technological components, backward compatible with different existing Member State (MS) frameworks. EKSISTENZ will also focus on an “identity-as-a-service” approach, to allow MS interoperability, leading to a more global system to provide secure and strong identity for all MS. To achieve this, the consortium will bring together different types of users involved in the identity chain (authorities, industrials, stakeholders, businesses), specialized technology providers and of course, data protection and privacy experts. EKSISTENZ will recommend updates to EU regulations in order to clearly inform, protect, propose responses and increase its resilience following an attempt. Knowing this, identity theft will become, if not impossible, much harder to carry out.

TSI – Trustworthy Software Initiative

TSI

TSI was formally established on 1 July 2011. Untrustworthy software has a major impact on organisations and countries, from a financial, economic, political and security perspective. Over the years a number of different UK groups investigated the challenges around producing secure, dependable and resilient software. The Trustworthy Software Initiative (TSI) was established to draw together the activity and provide a one-stop shop for guidance and information about trustworthy software development. TSI aims to collect, organise and share the wealth of knowledge, experience and capabilities that already exist in the UK public and private sectors and in academia about trustworthy software to give people a joined-up, curated view of the information that is available.

TSI Report State of the art of secure ICT landscape

ETTIS: European Security Trends and Threats in Society

ETTIS

European Security Trends and Threats In Society( ETTIS), is a EU FP7 collaborative research project focused on identifying and assessing opportunities for enhancing societal security, improving situation awareness and informing investment options for societal security. ETTIS aims to construct  a comprehensive  framework  which  can  be  used  in the  formulation of  future  decisions  and  security policies. The project runs for 36 months from 1 January 2012 to 31 December 2014. ETTIS has ten partners, of which one, Trilateral Research and Consulting (TRI), is also involved in ETTIS. TRI will work towards bridging relevant lessons learned between the projects.

UK Cyber Essential Scheme

cyber essential

Recognising that not all organisations have the necessary resources to address the business-critical issue of cyber security, the UK Government’s Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.

The government has worked with the Information Assurance for Small and Medium Enterprises (IASME) consortium and the Information Security Forum (ISF) to develop Cyber Essentials, a set of basic technical controls for organisations to use. The full scheme, launched on 5 June 2014, enables organisations to gain 1 of 2 new Cyber Essentials badges. It is backed by industry including the Federation of Small Businesses, the CBI and a number of insurance organisations which are offering incentives for businesses.

Get Safe Online 

get safe online logo

Get Safe Online is the UK’s leading source of unbiased, factual and easy-to-understand information on online safety.

Get Safe Online website is a unique resource providing practical advice on how to protect yourself, your computers and mobiles device and your business against fraud, identity theft, viruses and many other problems encountered online. It contains guidance on many other related subjects too – including performing backups and how to avoid theft or loss of your computer, smartphone or tablet. Every conceivable topic is included on the site – including safe online shopping, gaming and dating … so now you really can stay safe with everything you do online.

Cyber Champions 

cyber champions

Cyber Champions is a not-for-profit organisation delivering an exciting community giveback initiative to promote best practices in digital literacy and online safety awareness to schools, youth organisations and interest groups across the UK. The programme is being driven by networks of Cyber Champions, young professional volunteers, supported by a growing number of private and public sector organisations motivated to make a difference to their local communities and up-skill future generations.

Cyber Security Challenges  

cyber security challenges

Cyber Security Challenge is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more EU citizens resident in the UK to become cyber security professionals.

Established to bolster the national pool of cyber skills, it offers a unique programme of activities to introduce sufficient numbers of appropriately skilled individuals to learning and career opportunities in the profession.

 Action Fraud   

action fraud

Action Fraud is the UK’s national fraud and internet crime reporting centre. It provides a central point of contact for information about fraud and financially motivated internet crime. If you’ve been scammed, ripped off or conned, there is something you can do about it. Report fraud to Action Fraud and receive a police crime reference number.

The Centre for the Protection of National Infrastructure (CPNI)

cpni_logo   

The Centre for the Protection of National Infrastructure (CPNI) protects national security by providing protective security advice. Protective security is ‘putting in place, or building into design, security measures or protocols such that threats may be deterred, detected, or the consequences of an attack minimised’.

CPNI’s cyber security advice

 CESG

logo-cesg

CESG is the Information Security arm of GCHQ, and the National Technical Authority for Information Assurance within the UK. This means that we are the definitive voice on the technical aspects of Information Security in Government. It  provides tailored advice to Government on the security risks of new and existing IT systems, and providing ideas and designs to protect those risks; it builds capability through the provision of standards and guidance, working with industry to ensure that appropriately assured products, services and people are available, and to build a pool of world class Information Assurance and Cyber; it offers security professionals that organisations can draw upon; and it provides operational support to existing systems by alerting to specific threats and vulnerabilities, providing incident response, and technical solutions such as cryptographic keys to protect the most sensitive information.

CESG’s policy and guidance

EVIDENCE

logo-evidence

EVIDENCE is an European project aims at realising the following objectives: Tracing EVIDENCE Road Map for the realization of a Common European Legal Framework for using, collecting and exchanging electronic evidence including a research agenda identifying issues, policies and actions to be undertaken in future programs and plans; Developing a common and shared understanding on what electronic evidence is and which are the relevant concepts of electronic evidence in involved domains and related fields (digital forensic, criminal law, criminal procedure, criminal international cooperation);Detecting which are rules and criteria utilized for processing electronic evidence in EU Member States, and eventually how is the exchange of evidence regulated; Detecting of the existence of criteria and standards for guaranteeing reliability, integrity and chain of custody requirement of electronic evidence in the EU Member States and eventually in the exchange of it; Defining operational and ethical implications for Law Enforcement Agencies all over Europe; Identifying and developing technological functionalities for a Common European Framework in gathering and exchanging electronic evidence; and Seizing the EVIDENCE market.

MAPPING

mapping

MAPPING is an European project whose goal is to create an all-round and “joined-up” understanding of the many and varied economic, social, legal and ethical aspects of the recent developments on the Internet, and their consequences for individuals and society at large. It specifically capitalises upon and debates the existing innovation policies, business models and legal frameworks related to the implementation of the Digital Agenda for Europe, as well as the changes needed to set up an improved governance structure for the EU innovation ecosystem.

The key to MAPPING’s success is in its mobilisation of and mutual learning for a wide spectrum of ICT-related stakeholders and social actors. These include for example, academics, law and policy makers, Internet Service Providers, international and EU Internet governance bodies, NGOs and civil society organisations.

DENSEK

densek_logo_transp

DENSEK aims to improve the security and resilience of smart energy grids against cyber threats. Our energy grids are rapidly becoming smart through the implementation of software and IT components in the grid. Examples of such components are sensors, SCADA systems and smart meters. The consequence of this are more connections between the energy grid and the Internet resulting in vulnerability for cybercrime. Protection of our grids against these threats is not moving as quickly as required. DENSEK’s goals are to improve the sense of urgency amongst the target group and to improve the resilience of the whole European energy infrastructure against cyber threats.

SOES

SOES

SOES is designed to answer to the pressing demand of knowledge and best practices on the cyber security aspects in the Energy Smart Grids. It is conceived to raise the know-how of government bodies and operators by providing a multi-layered knowledge base on the ICT security matters grouping together information related to reference architectures, international standards, vulnerabilities and countermeasures of the Smart Grids. The analysis is developed along a three dimensional plan covering the technical issues, the policy aspects and inter-national/inter-organizational priorities.

SICH

logo-sich-footer

 

 

The SICH project specific objective is to discover illegal content on the Internet through use of semantic analysis on pages’ textual content. At present, LEA, research institutions, the media and international organizations active in the knowledge of the illegal content online may encounter great difficulties in collecting and managing the mass of documents / contents related to a specific topic and / or crime. For these reasons, tools to support the analysts in the identification, selection and analysis of illegal online content can drastically improve the learning curve of a phenomenon; tools that can, ie, “hunt”, illegal content hidden within the plethora of textual content on the Web. Using a strategic tool as SICH offers its users the possibility to achieve a better and faster understanding on Internet crime, to provide prompt responses in investigations, to analyze trends and support cooperation between experts, LEAs and private actors.

CAMINO

The major goal of the project is to provide a realistic roadmap for improving resilience against cybercrime and cyber terrorism. Roadmap will address the following questions. Where should taxpayer money be invested for research purposes? What are the challenges? What approach should be taken to tackle these challenges? Once the possible solutions are found, how should the results be tested and evaluated to demonstrate effectiveness?

 

Cyber ROAD

The project is aimed to identify current and future issues in the fight against cyber-crime and cyber-terrorism in order to draw a strategic roadmap for cyber security research. A detailed snapshot of the technological, social, economic, political, and legal scenario on which cyber crime and cyber terrorism do develop will be first provided. Then, cyber-crime and cyber-terrorism will be analyzed in order to indentify research gaps and priorities.

 

DOGANA

DoganaThe advent of Social Networks has made both companies and public bodies tremendously exposed to the so-called Social Engineering 2.0, and thus prone to targeted cyber-attacks. Unfortunately, there is currently no solution available on the market that allows neither the comprehensive assessment of Social Vulnerabilities nor the management and reduction of the associated risk. DOGANA aims to fill this gap by developing a framework that delivers “aDvanced sOcial enGineering And vulNerability…”

 

Open Colleges Cyber Safety Guide

The Centre for the Protection of National Infrastructure (CPNI) protects national security by providing protective security advice. Protective security is ‘putting in place, or building into design, security measures or protocols such that threats may be deterred, detected, or the consequences of an attack minimised’. – See more at: http://www.cpni.gov.uk/about/#sthash.GYkbrr4b.dpuf
The Centre for the Protection of National Infrastructure (CPNI) protects national security by providing protective security advice. Protective security is ‘putting in place, or building into design, security measures or protocols such that threats may be deterred, detected, or the consequences of an attack minimised’. – See more at: http://www.cpni.gov.uk/about/#sthash.GYkbrr4b.dpuf
The Centre for the Protection of National Infrastructure (CPNI) protects national security by providing protective security advice. Protective security is ‘putting in place, or building into design, security measures or protocols such that threats may be deterred, detected, or the consequences of an attack minimised’. – See more at: http://www.cpni.gov.uk/about/#sthash.GYkbrr4b.dpuf
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.