• Guidance
  • Interesting shortcuts
  • EFFRA Members' Perspectives
  • News Dashboard
  • Structured Wiki
    • Search
    • FoF and Made in Europe Partnership
    • Demonstrators, pilots, prototypes
    • Exploitable result(s)
    • Significant innovations and lessons learned, training aspects
    • Report - Video - Presentation - Publication....?
    • Project clusters
    • EFFRA member perspectives
    • Manufacturing future products
    • Manufacturing performance characteristics
    • Technologies and enablers
    • ICT performance characteristics
    • Standards, technical committees and working groups
    • Contribution of R&I projects to standardisation
    • Regulatory and policy aspects
    • Standards - other classifications
    • Business model aspects
    • Pathways
    • MiE SRIA R&I Priorities
    • MiE WP26-27 Consultation - Potential Research Topics only
    • MiE WP26-27 Consultation and context pointers
    • MiE WP26-27 Consultation with pointers to WP25-27 consultation
    • MiE KPIs
    • Relevant (future) calls
    • EU-Programme-Call
    • NACE code
    • EFFRA Organisations - members
    • EFFRA WG pointers
  • Pathways
    • Pathways
  • Projects
    • Projects
  • Resources
    • Resources
  • Project ideas
    • Project ideas
  • People & organisations
    • People
    • Organisations
  • portal@effra.eu
  • Visit the EFFRA website
    • Login
  • Structured Wiki
  • Pathways
  • Cybersecurity Pathway

Cybersecurity Pathway

  • Security level 1
    • (Systemic) Penetration Testing
    • Physical and logical password
    • Malware (including Ransomware, APT, Virus, ...) protection
    • Logging and monitoring, machine learning and AI - Cybersecurity Controls
  • Security level 2
    • Password policy
    • Transmission data protection
    • Multi-factor authentication
    • Physical security
  • Security level 3
    • Security training and awareness
    • Token management
    • User account management
    • Personnel vetting procedures
  • Security level 4
    • Database integrity
    • Software integrity
    • Back Office data flow security
    • Intrusion detection
    • Privileged account control
  • Security level 5
    • Digital platform environment segregation
    • CyberSecurity incident response capability - CSIRT
    • User session integrity
    • Critical activity outsourcing
    • Transaction controls
Powered by Chris Decubber BV