Galleta

Cookies

The UCLM website uses its own and third-party cookies for technical and analysis purposes.

Cookie Notice

Security in Cyberphysical systems and IoT

Security in any device that integrates computing, storage and communication capabilities to control and interact with a physical process.

Contact


Big Data Security

From the skills of professionals, system protection, and the implications of vulnerabilities or attacks.

Contact


Risk Analysis and Management

Identification of information assets, their vulnerabilities and threats to which they are exposed, probability of occurrence and their impact.

Contact


Security Architectures and Patterns

Identification of information assets, their vulnerabilities and threats to which they are exposed, probability of occurrence and their impact.

Contact


Security Management and Evaluation

Our professionals are able to determine, analyze, evaluate and classify this level of threat to maintain system security.

Contact


Security Metrics

They are an advantage for security, allowing you to see and understand where you are, what you need, and how to protect yourself.

Contact


Security Ontologies

Security in everyday situations, which generates a feeling of trust in others for self-assurance.

Contact


Database and Data Warehouse Security

It is an essential aspect of IT in organizations of any size and type.

Contact


Cloud Computing Security

This includes protecting critical information against theft, data leakage and elimination.

Contact


Security in Requirements Engineering for Software Product Lines

This includes protecting critical information against theft, data leakage.

Contact


Security in Software Engineering

This includes protecting critical information against theft, data leakage and elimination.

Contact


Security in MDA

This includes protecting critical information against theft, data leakage and elimination.

Contact


Security in Business Processes

How much sensitive information is handled outside a company’s central information systems...?

Contact


Security in Web Services-Based Systems

How much sensitive information is handled outside a company’s central information systems...?

Contact


Security in Mobile Grid Systems

How much sensitive information is handled outside a company’s central information systems...?

Contact