The ILLBuster Experience: preventing and fighting digital crimes-Final event 2016.01.29

The ILLBuster experience represents a perfect example of a winning European collaboration around a burning issue: the Prevention of and Fight Against Crime. ILLBuster is a project funded by the  European Commission (DG-HOME), which final results were presented during the ILLBuster Final Workshop and Networking Event (January 29, Cagliari, TISCALI Auditorium premises). The event, to […]

Internet of Things

The term Internet of Things (IoT) indicates the interconnection of virtually any entity of the physical world, ranging from home or industrial appliances such as fridges, washing machines, assembly line manufacturing to wearable accessories such as watches, sensors, or medical devices. The revolutionary aspect is that an IoT bridges the physical world to the digital […]

Robotics and Drones

Robotics is a branch of engineering that involves the conception, design and operation of robots. This field overlaps with computer science, electronics, nanotechnology, artificial intelligence, and bioengineering. The concept of creating machines that can work autonomously dates back to classical times. Science-fiction author Isaac Asimov is often given credit for being the first person to […]

Privacy

Privacy is a fundamental human right recognized in the UN Declaration of Human Rights and in many other international and regional treaties. Privacy has become one of the most important human rights issues of the modern age, but it first appeared in legal history since the eighteenth century. We could call it “opaque” freedom, because […]

Digital Forensics and Digital Evidence

Until recently, it was commonplace for authoritative commentators to refer to the field as “computer forensics”, a term coined in 1984 when the FBI drew up the Magnetic Media Program, that subsequently led to the setting up of Computer Analysis and Response Teams (CART). Almost thirty years later, Ken Zatyko, adjunct professor with Johns Hopkins […]

Cyberwar and Cyberterrorism

Terms such as “cyberwar” and “cyberterrorism” have been extensively used in the media, in the official governamental reports and amongst academics. Even if they have been often hyped, experts agree that it is unlikely that cyberwar will occur in the future (Thomas Rid and Bruce Scheneier; on the contrary, Jeffrey Carr). Nonetheless, they do acknowledge […]

Cybersecurity

Cyberspace touches nearly every part of our daily lives. It’s the broadband networks beneath us and the wireless signals around us, the local networks in our schools and hospitals and businesses, and the massive grids that power our nation. Another significant aspect of the computer/network worldwide diffusion is the rise of an interdependent world made […]

Cybercrime

Most reports, guides or publications on cybercrime begin by defining the term “cybercrime”. One common definition describes cybercrime as any activity in which computers or networks are a tool, a target or a place of criminal activity. Its is difficult to develop a typology or classification system for cybercrime. Even if not exhaustive, the Council […]

Cloud computing

Technology experts and stakeholders say they expect they will ‘live mostly in the cloud’ in 2020, working mostly through cyberspace-based applications accessed through networked devices. As defined by NIST: “Cloud computing is a model for enabling convenient, on- demand network access to a shared pool of configurable resources (eg, networks, servers, storage, applications, and services) […]