Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:

News

Home / News
/
The point of view: ever more cybersecurity is an essential component of a digitised single market

The point of view: ever more cybersecurity is an essential component of a digitised single market

The digital transformation is radically and rapidly changing the world, bringing with it a profound and irreversible change in the modes of communication and the exchange of data and information. New threats concern citizens, consumers, suppliers who are exposed to ever more numerous and sophisticated computer crimes. The players of the Digital Single Market, although with different purposes, share the common purpose of a secure digital environment, indispensable to support an ethical change that brings benefits to all.

New modalities of distribution of the services and new informative architectures are functional to the fast changes in act. You can think of the explosion of the Cloud model and all the related organisational, compliance and security implications, the diffusion of biometric devices, grapometers, artificial intelligence, big data analysis, to profiling, often incorporated into website development. These models need to be well understood, evaluating each time the adoption, balancing the potential real benefits of which are carriers with risks of security and privacy violations related to their use. Ensuring data security and its circulation is vital in the Digital Single Market.

Communication has been the foundation of human evolution and over the centuries the sharing of information has increased many changes in the ways in which it was carried out: Ever more sophisticated instruments have taken the place of the only primordial instruments available, voices and structure.

New instruments and new modes of communication, thanks to fast, low-latency and high-density connections, characterize the digital age as it sees an ever-increasing number of connected people and network-connected devices, leaving the course of the tumultuous development of IoT, which second the most prudent estimates will interconnect between more than 50 milliars of devices by 2025.

In the infosphere it is imperative to require protocols that define which characteristics the new generation of data transmission has to respect if privacy is to be prevented from being compromised and/or each connected device is potentially vulnerable to attack illicit activities.

The problem was obvious, not so much its solution due to the large number of interventions that it needs to have in order for an organization to adapt its own systems to the most current provisions, however, the relative intrinsic dynamism.

It is necessary that the debate in action be able to decline the vision of security and privacy at the level of operational practice, identifying all the interventions that are important to implement to design and implement a systemic approach to the complex issue of data security, with priority respect for individuals and with particular attention to informational self-determination and non-discrimination. For a quality side, in the broad sense. Still, the need to quickly reach the market with a new product or service often harms quality.

In order to acquire an advantage in the market area with respect to competitors, it is preferred to comply with the only functional requirements of the Product/Service (P/S) with respect to non-functional components, whose full implementation will be sacrificed, because it is very costly in terms of time and expense. This approach is followed by the producer in the other life-cycle phases of the P/S: the resolution of software malfunctions is frequently carried out by partially or totally omitting the tests on the fulfilment of important but non-functional requirements (reliability, application, legislation), relating to all taxonomy classes proposed from Ian Sommerville.

We observe the progressive increase in the number of critical systems in which software plays a key role. Many complex systems, from medical systems to transport and telecommunications control infrastructures, rely on software that is reliable and of high quality. Malfunctions of these software, due to design/implementation/use errors or caused from cybercrime, can damage, also serious and lethal. Cybersecurity insurance is increasingly used to cover economic damage, identity theft, attacks on personal security, attacks on reputation, to cite the most frequent violations that can result from cybercrime.

Cybersecurity is increasingly an essential component of a digitised single market, as it ensures confidence in digital technologies and the digital transformation process.

SOURCE: FEDERPRIVACY

Recommended to you

Advanced Research