Description:
This sub-topic focuses on innovations that protect networks and devices against cyber-attack or protect data and user information against compromise.
Examples of relevant technical fields include (but are not limited to): cyber security (which covers many technical sub-fields); big data security; data/network analytics to detect cyber vulnerabilities and cyber-attacks; behavior analytics to assess people risk; mobile device security; device-cloud security infrastructure; cloud computing security; security/privacy policy compliance; security for BYOD (bring-your-own device) and BYOC (bring-your-own-cloud); security protocols for the internet-of-things; data loss prevention; information assurance; data integrity; encryption; key generation, key management and key distribution; quantum communications; random number generation and distribution; access authorization; identity management; and personal authentication (biometrics, multi-factor authentication).