ari.org.uk
Home
Questions
Organisations
Topics
Research fields
About the data
Question group
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
Questions in this group:
Include archived/expired questions
1 -11 of 11 results
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
What measures and prioritisation tools can be used to better evaluate and target cyber risks with government interventions?
Department for Science, Innovation & Technology, 2024
cyber security
risk evaluation
government interventions
prioritisation tools
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
What do we foresee as future risks in this space and how might we best futureproof the UK?
Department for Science, Innovation & Technology, 2024
cyber security
digital identity
technology
risk assessment
policy-making
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
How can we build agility into software policy to ensure policy remains dynamic?
Department for Science, Innovation & Technology, 2024
software policy
agility
policy-making
cyber security
digital identity
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
What could the government and/or industry do to help improve the cybermedicine of software supply chains?
Department for Science, Innovation & Technology, 2024
cybersecurity
software supply chains
government policy
industry collaboration
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
Where are the biggest risks from - developers, vendors, customers? Where could government intervention help to improve the cyber resilience of software supply chains? Explore case studies of different contexts, for example: (i) most recent significant attacks, incidents and exploited vulnerabilities and their causes and (ii) statistics on attacks, breaches and prevalence of software vulnerabilities. What are the biggest/most urgent software supply chain risks to the UK economy (that companies face)?
Department for Science, Innovation & Technology, 2024
cyber security
software supply chains
government intervention
cyber resilience
case studies
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
Does deploying AI models in an existing process or system increase the attack surface of the host system? If so, how can this be mitigated? Who would be the owners for securing against those vulnerabilities and, where this is unclear, should organisations be sharing knowledge and security ownership, across the technology stack and system of deployment? Analyse and examine the full extent and range of cyber security risks to the UK economy in software development, distribution and supply chains. Identify what risks to the UK’s cyber resilience are introduced through software supply chains by software vendors and users? Which are the highest profile risks? We are interested in B2B/enterprise software rather than consumer software but including: operational technology, IT and cloud and on-premise.
Department for Science, Innovation & Technology, 2024
cyber security
AI models
software development
supply chains
B2B software
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
Does the cyber security of AI models need to follow any novel principles that aren’t set out under existing policy and technology security principles? If so, what are these measures and how do the differ from what exists? How do the vulnerabilities/risk of AI model security differ from existing cyber threats?
Department for Science, Innovation & Technology, 2024
cyber security
AI models
technology security
vulnerabilities
cyber threats
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
What are the most common connected technology convergence points we will see realised in the UK in the next 5-10 years? What are the applications of these converged connected technologies? Which sectors will be most impacted? Will there be an increased cyber attack surface for converged technologies? How can the cyber security of converged technologies be managed?
Department for Science, Innovation & Technology, 2024
connected technology
convergence points
cyber security
sectors
applications
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
How can connected technologies can be secured when liability and responsibility of product security is unclear, due to convergence of technologies and systems. I.e., taking a system-of-systems approach, how can holistic and robust cyber security be ensured? What is the series of measures required to safeguard the whole system? For example, taxonomy of cyber security risks and threats from the research phase through to product development, deployment and embedding with other technologies and systems. How could the UK produce a world-leading approach to securing emerging technologies through an end-to-end process?
Department for Science, Innovation & Technology, 2024
cyber security
connected technologies
product security
emerging technologies
system-of-systems approach
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
What is the most effective method for incentivising responsible technology design, in terms of cyber security? What are the barriers or blockers for using secure by design principles for cyber security of emerging connected technologies? Where have we seen successes in adopting secure by design principles for connected technologies? Is there a gold-standard or case study where security of a product has been considered during early inception? Has led to greater security of the product and fewer breaches?
Department for Science, Innovation & Technology, 2024
technology design
cyber security
secure by design principles
emerging technologies
case study
See details
Cyber Security and Digital Identity (CSDI) - Cyber security of technologies and services
What are the critical emerging technologies on the 5, 10, and 15-year horizon which have the potential to change cyberspace or impact on the UK’s cyber-power and strategic advantage? What novel critical applications of existing technologies could have the potential to transform cyberspace? How should emerging technologies be prioritised for cyber security research?
Department for Science, Innovation & Technology, 2024
emerging technologies
cyberspace
cyber-power
strategic advantage
cyber security research
See details
1