Security measures (defence)
Research Topic
Language: English
This is a research topic created to provide authors with a place to attach new problem publications.
Research problems linked to this topic
- How can different actors (e.g. Governments, tech companies, social media platforms, individuals etc.) mitigate these harms?
- What is the most effective method for incentivising responsible technology design, in terms of cyber security? What are the barriers or blockers for using secure by design principles for cyber security of emerging connected technologies? Where have we seen successes in adopting secure by design principles for connected technologies? Is there a gold-standard or case study where security of a product has been considered during early inception? Has led to greater security of the product and fewer breaches?
- What risk is there that generative AI evolves such that the content it generates can avoid detection faster than tools can be developed to detect it? How can international and industry collaboration limit this risk?
- What are the connectivity performance and protection requirements in ports and on sea? Can there be specific international connectivity corridors?
- How can the quality assurance of security systems and processes be improved?
- How can connected technologies can be secured when liability and responsibility of product security is unclear, due to convergence of technologies and systems. I.e., taking a system-of-systems approach, how can holistic and robust cyber security be ensured? What is the series of measures required to safeguard the whole system? For example, taxonomy of cyber security risks and threats from the research phase through to product development, deployment and embedding with other technologies and systems. How could the UK produce a world-leading approach to securing emerging technologies through an end-to-end process?
- How can public messaging on transport systems be used to best effect to safeguard transport users following a security incident or natural hazard disruption?
- What cyber interventions that DSIT or NCSC runs are the most effective at reducing cyber incidents and improving cyber resilience? How effective are the NIS Regulations at securing operators of essential services in the UK? How effective is carrying out each of the 10 Steps to Cyber Security at reducing cyber risk?
- Are there different hierarchies, professional groups or user types and behaviours that aid or block cyber security implementation? How do we best understand this both quantitatively and qualitatively?
- What are the most relevant potential changes in the external security and resilience risk environment?
- What measures and prioritisation tools can be used to better evaluate and target cyber risks with government interventions?
- How inclusive is the evolving digital identity ecosystem? What are the barriers to inclusion within the system? What are the benefits of digital identity to individuals and businesses? How can we ensure the UK’s digital identity ecosystem is secure? Within the current market which groups are disproportionately affected or are more likely to become left behind as digital identity solutions become more widespread? What are some of the consequences of having excluded groups? Are there differences across different sectors or use cases? How can we build trust in digital identity solutions?
- In what ways do security interventions (under the Telecommunications (Security) Act 2021) in the telecoms market have an impact on investment within the sector? How is this broken down, in a quantitative manner, by fixed and mobile infrastructure?
- Where are the opportunities for international collaboration to increase the UK’s role and influence over the development of next generation telecommunications technologies - including advanced 5G and beyond?
- Does the cyber security of AI models need to follow any novel principles that aren’t set out under existing policy and technology security principles? If so, what are these measures and how do the differ from what exists? How do the vulnerabilities/risk of AI model security differ from existing cyber threats?
- In security applications, how can we rely on AI to show us all the possible threats (not seeing what we are not shown)?
- How can we best communicate and understand the public’s perception of autonomous vehicles and drone usage in policing?
- How can new approaches and technologies be applied to enhance the detection of threat materials and items that could harm transport systems?
- How can throughput of goods and people be increased cost-effectively through transport security systems?
- Evaluate current growth barriers or opportunities, understand where action is needed (by the Government or others) to address these barriers, and understand the impact of any interventions.