TECHNOLOGICAL CAPABILITIES


PRIVACY AND DATA PROTECTION

  • Privacy
  • Personal data management
  • Protection of copyright and digital content distribution rights
    • Suitable codes for fingerprinting and/or watermarking
    • Tracing codes
  • Cryptographic protocols for a Secure Digital Society:
    • Cryptographic key generation and management systems
    • Encryption and digital signature schemes with advanced features
    • Post-quantum cryptography
    • Distributed cryptography and computation outsourcing
  • Data protection/applications for mobile phones
    • Secure storage
    • Secure elements
    • Trusted execution environments

CONSULTANCY, AUDITING AND SECURITY ANALYSIS

  • Consultancy
  • Auditing
    • OWASP methodology
    • OSStMM methodology
  • Computer, mobile and network forensics
    • Chain of custody
    • Search for digital evidence
    • Expert inspections
  • Penetration test
  • Incident response
  • Implementation and adaptation
  • GUAITA platform: management of software vulnerabilities

CLOUD AND BIG DATA

  • Cloud computing security
  • Big data protection
  • Security for SMEs
  • Security in networks and services
CYBERSECURITY COMPLIANCE AND BUSINESS CONTINUITY

  • Compliance and security policies
  • Cybersecurity risk assessment
  • Business continuity plan to protect and to recover

INFRASTRUCTURE SECURITY

  • Critical infrastructure
  • Internet of Things
  • Smart transport 
  • Cybersecurity for smart infrastructure

TRAINING AND EDUCATION


TRUST AND SECURITY SERVICES

  • Identity, authentication and authorization
    • Secure identity
    • Anonymity
    • Reputation systems
    • Optimization and decentralization of PKI
    • Delegated and federated authorizations
    • Biometrics
  • Payment and finance services
  • Electronic society
    • e-Payment
    • e-Commerce
    • e-Democracy
    • e-Governance
    • e-Health
  • Blockchain
    • Distributed ledgers
    • Creation, management and auditing of smart contracts
    • Self-sovereign identity
    • v