SlideShare a Scribd company logo
1 of 1
Download to read offline
Research Areas
The research expertise of InnoSec lies within the
wider area of information security and more spe-
cifically it targets the following areas:
 Cloud Security: The research activity in this
field involves the various models and technol-
ogies for offering secure cloud services that
incorporate adaptive access control models,
suitable for collaborative environments.
 Big Data Security: Research on this topic fo-
cuses on the utilisation of existing big data, in
order to develop more effective models for
identifying large-scale attacks.
 Wireless Sensor Networks Security: Research
on WSN security involves the establishment of
secure communication channels among sen-
sors, so as to enable their secure monitoring,
remote configuration and their participation
in the Internet of Things (IoT).
 eHealth Security: Research in the field of
eHealth security involves developing suitable
models and frameworks for protecting indi-
viduals’ privacy and securing any information
transmissions in mobile and cloud environ-
ments that may contain sensitive and personal
data.
Innovative Secure Technologies
InnoSec is a spin-off company, founded in 2014 in
Thessaloniki and is related to the Alexander Techno-
logical Educational Institute (A.TEI) of Thessaloniki. In
addition, the company itself pursues participation in
both national and international research projects, so
as to produce state-of-the-art research in the field of
information security.
Business Activity
The main business activity of InnoSec – Innovative
Secure Technologies is the provision of innovative
and smart information security services for other
companies (e.g. security policies, security audits, pen-
etration tests, early-warning systems).
Applied Research & Innovation
InnoSec is a start-up company staffed by personnel
and collaborators with significant experience on
state-of-the-art research areas, obtained through
participation in research projects and related publi-
cations in scientific journals and conference pro-
ceedings.
Contact Info
Address: 90 Giannitson St., Thessaloniki
54627, Greece
Tel: +30 2310-590162
e-mail: info@innosec.gr
Web: www.innosec.gr
Business Activities
InnoSec also provides the following services relat-
ed to information systems security for businesses
and organisations:
 Development of security plan
 Penetration testing
 Deployment of security mechanisms
 Digital forensics services
 Web application security testing
 Training and educational services
 Consulting on information systems security

More Related Content

What's hot

International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
It8073 information security syllabus
It8073  information security syllabusIt8073  information security syllabus
It8073 information security syllabusssuserb2f734
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 

What's hot (17)

International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
It8073 information security syllabus
It8073  information security syllabusIt8073  information security syllabus
It8073 information security syllabus
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Ijwns
IjwnsIjwns
Ijwns
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Ijwns
IjwnsIjwns
Ijwns
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Ijwns
IjwnsIjwns
Ijwns
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 

Similar to InnoSec_leaflet

Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Modern Office Space Ideas................
Modern Office Space Ideas................Modern Office Space Ideas................
Modern Office Space Ideas................siriajadhav28
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docxHAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docxshericehewat
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia Randhawa
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...GQ Research
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfMax Secure Ltd
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxjeffreye3
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptxSEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptxprasanna212623
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxstudywriters
 

Similar to InnoSec_leaflet (20)

Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Modern Office Space Ideas................
Modern Office Space Ideas................Modern Office Space Ideas................
Modern Office Space Ideas................
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docxHAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptxSEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 

InnoSec_leaflet

  • 1. Research Areas The research expertise of InnoSec lies within the wider area of information security and more spe- cifically it targets the following areas:  Cloud Security: The research activity in this field involves the various models and technol- ogies for offering secure cloud services that incorporate adaptive access control models, suitable for collaborative environments.  Big Data Security: Research on this topic fo- cuses on the utilisation of existing big data, in order to develop more effective models for identifying large-scale attacks.  Wireless Sensor Networks Security: Research on WSN security involves the establishment of secure communication channels among sen- sors, so as to enable their secure monitoring, remote configuration and their participation in the Internet of Things (IoT).  eHealth Security: Research in the field of eHealth security involves developing suitable models and frameworks for protecting indi- viduals’ privacy and securing any information transmissions in mobile and cloud environ- ments that may contain sensitive and personal data. Innovative Secure Technologies InnoSec is a spin-off company, founded in 2014 in Thessaloniki and is related to the Alexander Techno- logical Educational Institute (A.TEI) of Thessaloniki. In addition, the company itself pursues participation in both national and international research projects, so as to produce state-of-the-art research in the field of information security. Business Activity The main business activity of InnoSec – Innovative Secure Technologies is the provision of innovative and smart information security services for other companies (e.g. security policies, security audits, pen- etration tests, early-warning systems). Applied Research & Innovation InnoSec is a start-up company staffed by personnel and collaborators with significant experience on state-of-the-art research areas, obtained through participation in research projects and related publi- cations in scientific journals and conference pro- ceedings. Contact Info Address: 90 Giannitson St., Thessaloniki 54627, Greece Tel: +30 2310-590162 e-mail: info@innosec.gr Web: www.innosec.gr Business Activities InnoSec also provides the following services relat- ed to information systems security for businesses and organisations:  Development of security plan  Penetration testing  Deployment of security mechanisms  Digital forensics services  Web application security testing  Training and educational services  Consulting on information systems security