Activeer hoog contrast
Ga naar hoofdcontent
Home van TU Delft
Focus Areas
Developing a Science of Cybersecurity
Verification and Validation
Secure Hardware
Network Security
Cyber Physical Systems
Security and Privacy by Design
Education
Cybersecurity People at TU Delft
Alumni
Events
Archive
News
Interviews
Zoeken
Focus Areas
Menu openen
Developing a Science of Cybersecurity
Verification and Validation
Secure Hardware
Network Security
Cyber Physical Systems
Security and Privacy by Design
Education
Cybersecurity People at TU Delft
Menu openen
Alumni
Events
Menu openen
Archive
News
Menu openen
Interviews
Dit is het social media blok
facebook
twitter
instagram
youtube
linkedin
whatsapp
whatsapp
English
Activeer hoog contrast
Sluit menu
Zoeken
Sluit zoek
Cybersecurity@TUDelft
Focus Areas
Developing a Science of Cybersecurity
It took scientists millennia to develop an official system of measurement (i.e. the metric system) for the physical world. We are still at the very beginning of developing a “metric system” for cyber space. We develop methods and tools and analyse data to help stakeholders answer the question how secure is secure enough.
Verification and Validation
Almost every IT system that we use is complex. Nobody really understands in detail how it works. And every system contains many mistakes. Every single mistake looks like a wide open door to an attacker trying to hack into the system. Humans cannot deal with this complexity, so we are working on automated tools that can.
Cyber Physical Systems
Cyber and physical spaces are becoming more intertwined, and you can now control your home appliances and even your car from your smart phone. If you can, then your neighbour can also... and so can a cyber attacker! It might just be annoying if this happened. But it would be catastrophic if the attacker targets all home appliances of an entire city, or the power grid, or the water distribution system. We are developing methods to understand and manage these risks, and keep your physical world secure against cyber attackers.
Secure Hardware
Hardware, like software is complex, and full of mistakes that attackers can exploit. However, unlike software, the electronics may leak data for example through electro-magnetic radiation. We are working on designs that reduce the leakage.
Network Security
Networks connect almost all 6 billion inhabitants of planet earth. You can phone, chat or mail friends and family wherever they are, at almost no cost. But an attacker can reach you too with the same ease. We are tracking down attackers by collecting and sifting through massive amounts of data, without jeopardising the privacy of law-abiding citizens.
Security and Privacy by Design
Engineers now know how to build strong, but affordable bridges. They have learned from their mistakes over thousands of years. Cyber space is considerably more complex than even the most sophisticated bridge. We have hardly had the time to learn from our mistakes. We are on the road of trial and error now, hoping that we will eventually be able to design security and privacy in the same rigorous way that engineers design bridges.
Home van TU Delft
Activeer hoog contrast
Focus Areas
Developing a Science of Cybersecurity
Verification and Validation
Secure Hardware
Network Security
Cyber Physical Systems
Security and Privacy by Design
Education
Cybersecurity People at TU Delft
Alumni
Events
Archive
News
Interviews
Zoeken