About CS-AWARE

This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

Do you believe that the risk of becoming a victim of cybercrime is increasing?

Citizens all over the world are deeply concerned about the protection of their private life and their security. For example, 9 out of to 10 users consider that cyber-crime is a threat to their country, declaring that “it is a major challenge to national security”. Citizens are feeling threatened by cyber-crime and are very skeptic [...]

2019-02-18T08:59:41+00:00February 18th, 2019|Blog|

Applying Soft Systems Methodology to Complex Problem Situations in Critical Infrastructures: The CS-AWARE Case Study

Modern technology, in addition to all its benefits, creates new threats and attack vectors to individuals and organisations. In the past years the number of cyber attacks has increased drastically as has the extent of their effects. These circumstances clearly show that a different approach to cybersecurity is required: a holistic, collaborative strategy to [...]

2021-02-12T21:57:33+00:00February 7th, 2019|Papers|

Security-Driven Information Flow Modelling for Component Integration in Complex Environments

IAIT 2018 Proceedings of the 10th International Conference on Advances in Information Technology Conceptualising and developing a new software solution is always a daunting task, even more so when existing technologies of international partners are to be integrated into a unique and holistic product, as is the case in many international research and innovation projects. The individual [...]

2021-02-12T21:58:08+00:00February 7th, 2019|Papers|

Quality Assessment CTI

One of the latest CS-AWARE deliverables focused on generally identifying possible external information sources to be used for CS-AWARE that can help in analysing LPA cybersecurity incidents and help raise cybersecurity awareness. The main task was to find a way to assess the relevance and quality of those sources (and additional sources that have emerged [...]

2019-01-30T18:53:52+00:00January 30th, 2019|Blog|

Collaboration and Cybersecurity

What does cybersecurity have to do with collaboration? A simple answer would be that cybersecurity is not an issue for one individual to be handled, but for the entire organisation, or even at the national and international level. What is this collaboration then, and what can it be like? In our book (entitled “On Collaboration, [...]

2019-02-19T12:16:57+00:00January 11th, 2019|Blog|

Greek and Turkish in cyber-war tension

It was late afternoon, some months ago, when a Greek construction company’s employee, who is in charge of managing E.U. projects, had to deal with a strange situation. Instead of her homepage in the browser, the red flag of Turkey appeared. Firstly she tried to retype the correct address, but she was again redirected in [...]

2019-01-04T09:17:23+00:00January 4th, 2019|Blog|

Knowledge management and cybersecurity

There are many ways for defining knowledge management. One of the ways to see it is as the systematic procedures by which the flow of information and knowledge throughout an organization becomes a shared process, reaching the relevant persons. It should ensure that knowledge does not get lost when people leave or are absent. [...]

2019-02-19T12:10:46+00:00December 20th, 2018|Blog|

InnoSec presents CS-AWARE in the FOSSCOMM 2018 conference

InnoSec participated in the FOSSCOMM (Free and Open Source Software Communities Meeting) 2018 conference that took place on Crete island, Greece between the 13th and 14th of October 2018. FOSSCOMM is the Panhellenic conference of free and open source software communities, where several open-source software communities participated in it, including the Hellenic Linux User Group [...]

2019-01-09T12:12:28+00:00November 22nd, 2018|Blog|

Facebook Hack: 50 million Facebook users’ access stolen using zero-day flaw

According to a blog post published on September 28th, 2018 by Facebook (FB), their engineering team discovered that 50 million accounts were affected by a security issue. Practically, a vulnerability in FB code allowed hackers to steal FB access tokens. The full article can be read here. It is interesting to have a look at [...]

2019-10-03T14:02:11+00:00November 16th, 2018|Blog|

Raising a son in the era of social networks

Each day we share on the web a huge amount of data about us and our behaviours. This is a concern for the privacy and security of adult users but it becomes a huge problem where underage children are involved. According to the last report of the english Children Commissioner “Who knows what about [...]

2018-11-14T14:54:44+00:00November 14th, 2018|Blog|
Go to Top