Curricula - Knowledge - Navigation
Browsing Category

European Security Landscape

Upcoming European Cyber security events October 2019

October 2019 has already seen a number of cyber security events, like the Europol-Interpol Cybercrime Conference, from the 9th to the 11th of October. However, there are still a number of upcoming cyber security events in October 2019. Other than the Europol-Interpol conference they are open for all to attend. Thus, in case you have

The new Internet Organised Crime Threat Assessment (IOCTA) 2019

Europol´s report focuses on the cybercrime threat landscape, highlights the key developments, threats and trends, as seen by law enforcement authorities across Europe. The report can be downloaded from Europol´s website, which also provides the IOCTA reports of previous years as well as report and resources to related topics:      https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2019 The report is structured into

Police around the world learn to fight global-scale cybercrime

Police must join forces across international borders to take on modern cybercriminals. wutzkohphoto/Shutterstock.com Frank J. Cilluffo, George Washington University; Alec Nadeau, George Washington University, and Rob Wainwright, University of Exeter From 2009 to 2016, a cybercrime network called Avalanche grew into one of the world’s most sophisticated criminal syndicates. It resembled an international conglomerate, staffed

How social media are used for radicalisation

85% of European households have access to the internet from home, 79% of EU citizens use the internet on a regular basis and 71% even use it daily. Age plays an important role in this respect. The young are especially active online: 93% of those aged between 16 and 24 are regular users, whereas only

Trojan horse software

Trojan horses are a vital tool to ensure direct surveillance over a targeted user or networks. They are sophisticated enough to penetrate common security and encryption measures and therefore able to monitor everything of importance. Trojan horses are defined as malicious computer programs, which hide from the users they infect or mislead them regarding their

Perimeter Security Solutions

Protecting critical assets like government buildings, airports, penal institutions, power plants or industrial properties with high security requirements is a matter of great concern. Perimeter protection is the first line of defence in providing physical security and minimizing damage. The perimeter of a building is the area around the construction and the property. Perimeter protection