Curricula - Knowledge - Navigation

Trojan horse software

Trojan horses are a vital tool to ensure direct surveillance over a targeted user or networks. They are sophisticated enough to penetrate common security and encryption measures and therefore able to monitor everything of importance. Trojan horses are defined as malicious computer programs, which hide from the users they infect or mislead them regarding their

Perimeter Security Solutions

Protecting critical assets like government buildings, airports, penal institutions, power plants or industrial properties with high security requirements is a matter of great concern. Perimeter protection is the first line of defence in providing physical security and minimizing damage. The perimeter of a building is the area around the construction and the property. Perimeter protection

Drone surveillance

Surveillance drones can be used for monitoring of individuals and groups as well as for reconnaissance. Drones can be classified by their size and, depending on the purpose, be equipped with different sensors. This article provides an overview of the latest technologies in the field of drones. In recent years, a strong trend can be

Access Control

Access control describes the selective control of entry or restriction to a certain area or resource and can therefore also encompass digital information and physical security. Individuals are being validated and authorized if they can confirm their true identity. Mechanisms that limit access and perform various forms of authorization verification, accountability and approval are generally

Perimeter Security

Perimeter security can either be achieved with constructional measures or via aerial surveillance, depending on the area or building that needs to be protected. Perimeter protection is the first line of defence and it is primarily used for surveillance to prevent intrusion attempts into this outermost protection zone and to maximize intervention time. Perimeter security

Overview of the European Agenda on Security

Modern threats have many faces. Among those are organised crime, cybercrime and terrorism, border security and foreign fighters, international smuggling, trafficking, propaganda, and radicalization. The European Agenda on Security was established to replace the previous internal security strategy to unite Member States in their quest for peace. Guidelines, key principles, tools and agencies will set