SlideShare a Scribd company logo
1 of 9
SHEVCHENKO IRINA
EuropeanCybercrimeCentre
EuropeanCybercrimeCentre
 “The Cybercrime Centre will
give a strong boost to the EU’s
capacity to fight cybercrime
and defend an internet that is
free, open and secure.
Cybercriminals are smart and
quick in using new
technologies for criminal
purposes; the EC3 will help us
become even smarter and
quicker to help prevent and
fight their crimes“,
Troels Oerting, Head of the
European Cybercrime Centre
The center was established on the basis
of Europol. Its main activities are:
 Cyborg - help member states in combating
cyber attacks directed at critical
infrastructure and information systems;
 Twins - the fight against cybercrime, cause
serious harm, such as using the Internet to
make contact with children for sexual
exploitation and sexual abuse;
 Terminal's area - combating all types of
fraud on the Internet.
The European Centre for the fight against cybercrime (The
European Cybercrime Centre - EC3) in collaboration with the
Spanish police, opened one of the largest and most complex
networks of cybercrime, based in Russia, and which has
infected millions of computers with a virus program «police
ransomware».
European Network and Information Security
Agency (ENISA), is an agency of the
European Union. ENISA was created in 2004.
It has its seat in Heraklion, Crete (Greece).
The objective of ENISA is to improve
network and information security in the
European Union. The agency has to
contribute to the development of a culture
of network and information security for
the benefit of the citizens, consumers,
enterprises and public sector
organizations of the European Union, and
consequently will contribute to the
smooth functioning of the EU Internal
Market.
STONESOFT
Corporation Stonesoft - a world leader in developing innovative solutions in
the field of network security and business continuity.
Stonesoft Corporation was a public company that developed and sold network
security solutions based in Helsinki, Finland.
In July, 2013 McAfee, a part of Intel Security, completed a tender offer to acquire
all Stonesoft products and technologies. Stonesoft became a part of the McAfee
Network Security Business Unit. Stonesoft firewall products were renamed
McAfee Next Generation Firewall.
http://www.stonesoft.com/en/
 " Unified Security Platform Stonesoft enables
any desired degree of protection, instantly
adapt to rapidly changing threats and promptly
respond to unexpected situations. And most
importantly, that improve security and stability
in the shortest time possible and without
further adjustment of the license agreements,
or purchase expensive additional functionality
"
 - Michael Romanov, Director of Business
Development Stonesoft Corporation in Russia, CIS
and Baltic countries.

More Related Content

Viewers also liked (8)

Kent Wessinger: Advice for Writing Better Emails
Kent Wessinger: Advice for Writing Better EmailsKent Wessinger: Advice for Writing Better Emails
Kent Wessinger: Advice for Writing Better Emails
 
Oxford Anniversary Book Sample Pages
Oxford Anniversary Book Sample PagesOxford Anniversary Book Sample Pages
Oxford Anniversary Book Sample Pages
 
Crash Course in Academic Writing for Essays and Research Papers
Crash Course in Academic Writing for Essays and Research PapersCrash Course in Academic Writing for Essays and Research Papers
Crash Course in Academic Writing for Essays and Research Papers
 
Jørn har set bedre dage
Jørn har set bedre dageJørn har set bedre dage
Jørn har set bedre dage
 
My routine
My routineMy routine
My routine
 
Kent Wessinger presents Quotes From Writers About Writing
Kent Wessinger presents Quotes From Writers About WritingKent Wessinger presents Quotes From Writers About Writing
Kent Wessinger presents Quotes From Writers About Writing
 
The Power of Persuasion
The Power of PersuasionThe Power of Persuasion
The Power of Persuasion
 
Workplace Culture and Employer Branding
Workplace Culture and Employer BrandingWorkplace Culture and Employer Branding
Workplace Culture and Employer Branding
 

Similar to Cyber security

Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
Yury Chemerkin
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Dr Rachel O'Connell
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
pteromys_volans
 

Similar to Cyber security (20)

Protecting Europe's Network Infrastructure
 Protecting Europe's Network Infrastructure Protecting Europe's Network Infrastructure
Protecting Europe's Network Infrastructure
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
The red book
The red book  The red book
The red book
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
European priorities in information security
European priorities in information securityEuropean priorities in information security
European priorities in information security
 
Cybersecurity nl
Cybersecurity nlCybersecurity nl
Cybersecurity nl
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
Global 2-2016-en
Global 2-2016-enGlobal 2-2016-en
Global 2-2016-en
 
Gunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo Global Customer Magazine
Gunnebo Global Customer Magazine
 

Cyber security

  • 3. EuropeanCybercrimeCentre  “The Cybercrime Centre will give a strong boost to the EU’s capacity to fight cybercrime and defend an internet that is free, open and secure. Cybercriminals are smart and quick in using new technologies for criminal purposes; the EC3 will help us become even smarter and quicker to help prevent and fight their crimes“, Troels Oerting, Head of the European Cybercrime Centre
  • 4. The center was established on the basis of Europol. Its main activities are:  Cyborg - help member states in combating cyber attacks directed at critical infrastructure and information systems;  Twins - the fight against cybercrime, cause serious harm, such as using the Internet to make contact with children for sexual exploitation and sexual abuse;  Terminal's area - combating all types of fraud on the Internet.
  • 5. The European Centre for the fight against cybercrime (The European Cybercrime Centre - EC3) in collaboration with the Spanish police, opened one of the largest and most complex networks of cybercrime, based in Russia, and which has infected millions of computers with a virus program «police ransomware».
  • 6.
  • 7. European Network and Information Security Agency (ENISA), is an agency of the European Union. ENISA was created in 2004. It has its seat in Heraklion, Crete (Greece). The objective of ENISA is to improve network and information security in the European Union. The agency has to contribute to the development of a culture of network and information security for the benefit of the citizens, consumers, enterprises and public sector organizations of the European Union, and consequently will contribute to the smooth functioning of the EU Internal Market.
  • 8. STONESOFT Corporation Stonesoft - a world leader in developing innovative solutions in the field of network security and business continuity. Stonesoft Corporation was a public company that developed and sold network security solutions based in Helsinki, Finland. In July, 2013 McAfee, a part of Intel Security, completed a tender offer to acquire all Stonesoft products and technologies. Stonesoft became a part of the McAfee Network Security Business Unit. Stonesoft firewall products were renamed McAfee Next Generation Firewall. http://www.stonesoft.com/en/
  • 9.  " Unified Security Platform Stonesoft enables any desired degree of protection, instantly adapt to rapidly changing threats and promptly respond to unexpected situations. And most importantly, that improve security and stability in the shortest time possible and without further adjustment of the license agreements, or purchase expensive additional functionality "  - Michael Romanov, Director of Business Development Stonesoft Corporation in Russia, CIS and Baltic countries.