{"id":13527,"date":"2022-01-26T10:55:20","date_gmt":"2022-01-26T09:55:20","guid":{"rendered":"https:\/\/nr.stage.dekodes.no\/en\/?post_type=bc_area&#038;p=13527"},"modified":"2025-10-16T10:42:27","modified_gmt":"2025-10-16T08:42:27","slug":"digital-security","status":"publish","type":"bc_area","link":"https:\/\/nr.stage.dekodes.no\/en\/areas\/ict\/digital-security\/","title":{"rendered":"Digital security and privacy"},"content":{"rendered":"\n<p class=\"has-sizing-medium\"><\/p>\n\n\n\n<p class=\"has-sizing-medium\"><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-sizing-large\">At NR, we have more than 20 years of experience in applied research and industrial development of digital security. We have developed several methods and tools that help system owners identify, design, operate and evaluate cost-effective technologies for this area, and offer services such as training, consulting, development and analysis.<\/p>\n\n\n\n<p class=\"has-sizing-medium\">Our specific competence fields cover:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adaptive security<\/li>\n<\/ul>\n\n\n\n<p class=\"has-sizing-medium\">We research adaptive security to enable organizations to continuously assess risk and automatically plan for mitigation measures in the past and in the right context, thus improving their ability to respond to current and future security risks.<\/p>\n\n\n\n<p class=\"has-sizing-medium\">Adaptive Security continuously collects and analyzes security-related data and incidents to protect against and adapt to known and unknown security incidents before they occur. It learns and adapts to changing environments while driving in the face of changing threats, anticipates threats before they occur, and<br>dynamically reconfigures the protection mechanisms.<br><\/p>\n\n\n\n<p class=\"has-sizing-medium\">NR has expertise in the development of adaptive techniques and algorithms that will predict and measure the risk of injury and adapt their decisions to these predictions.<\/p>\n\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<h3 class=\"wp-block-heading\">Data security<\/h3>\n\n\n\n<p>Data security is a large and comprehensive field addressing protection of sensitive data, where confidentiality, integrity, and authenticity are the most common security goals. Data security affects several elements of society and requires knowledge and expertise from different disciplines such as security management, cryptography, information and communication technology, and mathematics. Our research covers various aspects of data security, and we conduct security and privacy assessment, as well as risk and vulnerability assessment, on different levels, including methods, information systems, and organizations.\u00a0Requirements specification, impact assessment, design and verification.<\/p>\n\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<h3 class=\"wp-block-heading\"><strong>Privacy<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Rules and regulation for handling personal data are addressed by the Norwegian Personal Data Act and the EU\u2019s Personal Data Protection Regulation (GDPR), which ensures privacy in several areas, such as the right to access, delete and restrict personal data. These regulations emphasise protection of sensitive personal data. Preserving privacy of personal data is relevant in many areas, such as healthcare, finance, banking, insurance, police, etc. Personally identifiable information can point to specific individuals. To meet the privacy requirements when analysing such data, anonymization techniques can be employed for identification and protection of personally identifiable information. However, this may not be a trivial task. As such, we have expertise in methods for privacy-preservation and data anonymization.&nbsp;<\/p>\n\n\n\n<p>Machine learning and artificial intelligence are central to data analytics. Using confidential computing methods, such as homomorphic encryption, we can analyse the encrypted data and produce meaningful inferences while preserving data privacy<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><strong>To learn more about our work in digital security and privacy, please contact:<\/strong><\/p>\n\n\n\t\t<div id=\"post-type-multi-block_7b20604e6425db56fa9417bb260265b6\" class=\"wp-block-post-type-multi type-manual style-card-bc_employee t2-grid\">\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-6\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/employees\/habtamu-abie\/\" class='card-employee'>\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2024\/05\/habtamu-abie-11.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-employee__content\">\n\t\t\t<p class=\"card-employee__name\">Habtamu Abie<\/p>\n\t\t\t\t\t\t\t<p class=\"card-employee__position\">Chief Research Scientist<\/p>\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon t2-icon-arrowforward\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.9 4.259a1.438 1.438 0 0 1-.147.037c-.139.031-.339.201-.421.359-.084.161-.084.529-.001.685.035.066 1.361 1.416 2.947 3l2.882 2.88-10.19.02c-8.543.017-10.206.029-10.29.075-.282.155-.413.372-.413.685 0 .313.131.53.413.685.084.046 1.747.058 10.29.075l10.19.02-2.882 2.88c-1.586 1.584-2.912 2.934-2.947 3-.077.145-.085.521-.013.66a.849.849 0 0 0 .342.35c.156.082.526.081.68-.001.066-.035 1.735-1.681 3.709-3.656 2.526-2.53 3.606-3.637 3.65-3.742A.892.892 0 0 0 23.76 12a.892.892 0 0 0-.061-.271c-.044-.105-1.124-1.212-3.65-3.742-1.974-1.975-3.634-3.616-3.689-3.645-.105-.055-.392-.107-.46-.083\"\/><\/svg>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-6\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/employees\/svetlana-boudko\/\" class='card-employee'>\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2024\/12\/svetlana-boudko.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-employee__content\">\n\t\t\t<p class=\"card-employee__name\">Svetlana Boudko<\/p>\n\t\t\t\t\t\t\t<p class=\"card-employee__position\">Senior Research Scientist<\/p>\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon t2-icon-arrowforward\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.9 4.259a1.438 1.438 0 0 1-.147.037c-.139.031-.339.201-.421.359-.084.161-.084.529-.001.685.035.066 1.361 1.416 2.947 3l2.882 2.88-10.19.02c-8.543.017-10.206.029-10.29.075-.282.155-.413.372-.413.685 0 .313.131.53.413.685.084.046 1.747.058 10.29.075l10.19.02-2.882 2.88c-1.586 1.584-2.912 2.934-2.947 3-.077.145-.085.521-.013.66a.849.849 0 0 0 .342.35c.156.082.526.081.68-.001.066-.035 1.735-1.681 3.709-3.656 2.526-2.53 3.606-3.637 3.65-3.742A.892.892 0 0 0 23.76 12a.892.892 0 0 0-.061-.271c-.044-.105-1.124-1.212-3.65-3.742-1.974-1.975-3.634-3.616-3.689-3.645-.105-.055-.392-.107-.46-.083\"\/><\/svg>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-6\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/employees\/sandeep\/\" class='card-employee'>\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2024\/05\/sandeep-pirbhulal-7.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-employee__content\">\n\t\t\t<p class=\"card-employee__name\">Sandeep Pirbhulal<\/p>\n\t\t\t\t\t\t\t<p class=\"card-employee__position\">Senior Research Scientist<\/p>\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon t2-icon-arrowforward\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.9 4.259a1.438 1.438 0 0 1-.147.037c-.139.031-.339.201-.421.359-.084.161-.084.529-.001.685.035.066 1.361 1.416 2.947 3l2.882 2.88-10.19.02c-8.543.017-10.206.029-10.29.075-.282.155-.413.372-.413.685 0 .313.131.53.413.685.084.046 1.747.058 10.29.075l10.19.02-2.882 2.88c-1.586 1.584-2.912 2.934-2.947 3-.077.145-.085.521-.013.66a.849.849 0 0 0 .342.35c.156.082.526.081.68-.001.066-.035 1.735-1.681 3.709-3.656 2.526-2.53 3.606-3.637 3.65-3.742A.892.892 0 0 0 23.76 12a.892.892 0 0 0-.061-.271c-.044-.105-1.124-1.212-3.65-3.742-1.974-1.975-3.634-3.616-3.689-3.645-.105-.055-.392-.107-.46-.083\"\/><\/svg>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<div class=\"wp-block-group has-nr-light-grey-background-color has-background\">\n<p><strong>Research Centres<\/strong><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ntnu.edu\/norcics\/\" target=\"_blank\">SFI NORCICS<\/a> (Norwegian Centre for Cybersecurity in Critical Sectors)<\/p>\n\n\n\n<p>We are a part of the European Lighthouse centre <a rel=\"noreferrer noopener\" href=\"https:\/\/www.enfield-project.eu\/\" target=\"_blank\">ENFIELD<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"433\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2025\/03\/Enfield_logo2-1-2048x865-1-1024x433.png\" alt=\"Logo ENFIELD\" class=\"wp-image-34238\" style=\"aspect-ratio:2.3648960739030023;width:158px;height:auto\" srcset=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2025\/03\/Enfield_logo2-1-2048x865-1-1024x433.png 1024w, https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2025\/03\/Enfield_logo2-1-2048x865-1-300x127.png 300w, https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2025\/03\/Enfield_logo2-1-2048x865-1-768x324.png 768w, https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2025\/03\/Enfield_logo2-1-2048x865-1-1536x649.png 1536w, https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2025\/03\/Enfield_logo2-1-2048x865-1.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<\/div>\n<\/div>\n\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<p class=\"has-text-align-center\"><strong>Selected projects<\/strong><\/p>\n\n\n\t\t<div id=\"post-type-multi-block_e9206f7e8888d7988867b2562e98542d\" class=\"wp-block-post-type-multi type-manual style-card-bc_project-sm t2-grid\">\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-3\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/projects\/kompetanseheving-for-okt-digital-sikkerhet-i-helsevesenet\/\" class=\"card-post card-project\">\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2023\/04\/national-cancer-institute-L8tWZT4CcVQ-unsplash-1.jpg\" alt=\"Strengthening Cybersecurity and Privacy in Healthcare\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-post__content\">\n\t\t\t\t\t\t\t<ul class=\"card-post__categories\">\n\t\t\t\t\t\t\t\t\t\t\t<li>Digital security and privacy<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<h3 class=\"card-post__title\">Strengthening Cybersecurity and Privacy in Healthcare<\/h3>\n\t\t<\/div>\n\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-3\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/projects\/testbed-for-critical-infrastructure-protection\/\" class=\"card-post card-project\">\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2022\/11\/austin-poon-4isP1Te-lhE-unsplash-scaled.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-post__content\">\n\t\t\t\t\t\t\t<ul class=\"card-post__categories\">\n\t\t\t\t\t\t\t\t\t\t\t<li>Digital security and privacy<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<h3 class=\"card-post__title\">Testbed for Critical In\u00adfra\u00adstruc\u00adture Protection<\/h3>\n\t\t<\/div>\n\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-3\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/projects\/decentralized-digital-marketplace\/\" class=\"card-post card-project\">\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2023\/03\/lisheng-chang-M2524ncJQ40-unsplash.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-post__content\">\n\t\t\t\t\t\t\t<ul class=\"card-post__categories\">\n\t\t\t\t\t\t\t\t\t\t\t<li>Digital security and privacy<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<h3 class=\"card-post__title\">Decentralized digital marketplace<\/h3>\n\t\t<\/div>\n\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-3\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/projects\/ai-based-scenario-management-for-cyber-range-training\/\" class=\"card-post card-project\">\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2020\/05\/adi-goldstein-EUsVwEOsblE-unsplash.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-post__content\">\n\t\t\t\t\t\t\t<ul class=\"card-post__categories\">\n\t\t\t\t\t\t\t\t\t\t\t<li>Digital transformation<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<h3 class=\"card-post__title\">AI-based scenario management for cyber range training (ASCERT)<\/h3>\n\t\t<\/div>\n\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-3\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.stage.dekodes.no\/en\/projects\/mindid\/\" class=\"card-post card-project\">\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.stage.dekodes.no\/content\/uploads\/sites\/2\/2024\/02\/kaitlyn-baker-vZJdYl5JVXY-unsplash-scaled.jpg\" alt=\"The image shows a closeup of a person sat at a laptop. The only part of the person visible are their hands which appear to be typing.\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-post__content\">\n\t\t\t\t\t\t\t<ul class=\"card-post__categories\">\n\t\t\t\t\t\t\t\t\t\t\t<li>Information and communication technology<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>Digital security and privacy<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<h3 class=\"card-post__title\">A framework for decentralised identity and consent management<\/h3>\n\t\t<\/div>\n\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"parent":6895,"menu_order":27,"template":"","meta":{"_acf_changed":false,"_trash_the_other_posts":false,"editor_notices":[],"footnotes":""},"class_list":["post-13527","bc_area","type-bc_area","status-publish"],"acf":[],"_links":{"self":[{"href":"https:\/\/nr.stage.dekodes.no\/en\/wp-json\/wp\/v2\/bc_area\/13527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nr.stage.dekodes.no\/en\/wp-json\/wp\/v2\/bc_area"}],"about":[{"href":"https:\/\/nr.stage.dekodes.no\/en\/wp-json\/wp\/v2\/types\/bc_area"}],"version-history":[{"count":5,"href":"https:\/\/nr.stage.dekodes.no\/en\/wp-json\/wp\/v2\/bc_area\/13527\/revisions"}],"predecessor-version":[{"id":38992,"href":"https:\/\/nr.stage.dekodes.no\/en\/wp-json\/wp\/v2\/bc_area\/13527\/revisions\/38992"}],"up":[{"embeddable":true,"href":"https:\/\/nr.stage.dekodes.no\/en\/wp-json\/wp\/v2\/bc_area\/6895"}],"wp:attachment":[{"href":"https:\/\/nr.stage.dekodes.no\/en\/wp-json\/wp\/v2\/media?parent=13527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}