The Evolution of Digital Security by Design Using Temporal Network Analysis
Abstract
:1. Introduction
- A collection of online narratives and documents referencing DSbD between 2019 and 2024, including their metadata such as URLs, document titles, publication dates, and content.
- By combining large-scale data collection, entity extraction, relationship analysis, and temporal tracking, we provide insights into the evolution of DSbD. Our findings reveal how the landscape of digital security has transformed over time, the growing importance of certain entities, and the emergence of new technologies and collaborations. This knowledge is crucial for stakeholders looking to understand the key drivers of digital security innovation, anticipate future trends, and guide strategic decision-making.
- The pipeline developed in this study is designed to be scalable and dynamic. As more data is collected over time, the system can seamlessly ingest and process new information, allowing for continuous updates to the network visualisation. This ensures that the framework remains adaptable to ongoing developments in the DSbD landscape. Whether new entities emerge, relationships shift, or additional data sources become available, the pipeline can dynamically integrate these inputs, making it a tool for long-term monitoring and analysis of digital security trends.
- To enable interactive exploration and deeper understanding of the DSbD network, a dynamic, browser-based visualisation of the network is available. Such visualisations allow users to navigate through the network, hover over nodes to explore relationships, and filter by specific criteria to focus on particular entities or timeframes. The interactive nature of this interface allows stakeholders to gain deeper insights into how different organisations, individuals, and technologies are connected within the DSbD ecosystem, further making it a valuable tool for decision-making and research.
2. Related Work
3. Data Collection, Preparation, and Visualisation
3.1. Textual Corpus Formation
3.2. Textual Data Processing
3.3. Network Formation and Visualisation
4. Results and Discussion
- 1.
- AI’s Continued Dominance: AI will remain at the forefront of DSbD. As AI tools continue to evolve and become more sophisticated, their role in automating security processes, improving threat detection, and mitigating risks will likely expand. AI’s integration into both offensive and defensive cyber capabilities is expected to grow, leading to an increase in research and development focused on AI-driven security solutions. We also anticipate further advancements in explainable AI and trust frameworks that ensure AI’s decisions are transparent and reliable.
- 2.
- Emergence of Quantum Computing as a Central Player: Given the current rapid developments in quantum computing, we expect quantum technologies to become a more prominent node in the DSbD landscape. With the potential for quantum computers to break current encryption methods, there will be significant attention on post-quantum cryptography and new hardware security mechanisms to safeguard data and communications. This may also prompt an increase in collaboration between research institutions, industry, and government bodies to develop quantum-resistant solutions.
- 3.
- Strengthening of Regulatory and Compliance Frameworks: In 2025, the role of regulatory bodies like the EU and national cybersecurity agencies such as “NCSC” will continue to grow as new policies and guidelines are introduced to govern AI, quantum technologies, and digital security innovations. We anticipate an increased focus on global standards and cross-border collaborations to ensure the secure deployment of these emerging technologies.
- 4.
- Growth of Secure Hardware Solutions: The prominence of “CHERI” in 2024 suggests that secure hardware will remain a critical area of focus. In 2025, we predict more widespread deployment of hardware-based security solutions, particularly in critical infrastructure sectors such as defence, finance, and healthcare. Innovations like Morello and other hardware security projects will likely see increased adoption as organisations look for robust defences against sophisticated cyber threats that target hardware vulnerabilities.
- 5.
- Greater Collaboration Amongst Diverse Stakeholders: As the DSbD network grows more complex, we anticipate increased collaboration among government agencies, industry leaders, academia, and international bodies. This will be necessary to address the multifaceted challenges posed by emerging technologies, such as AI, quantum computing, and secure hardware. Research funding from bodies like “UKRI” and “EPSRC” will continue to play a pivotal role in fostering interdisciplinary approaches and innovative solutions.
- 6.
- Rise of New Ethical and Privacy Concerns: As digital security technologies advance, ethical and privacy concerns are expected to take centre stage in 2025. The increased use of AI, combined with the growing adoption of surveillance technologies and biometric security measures, will spark debates on user rights, data privacy, and the ethical use of technology. Trust frameworks will need to evolve to ensure that security solutions remain aligned with societal values and legal requirements.
5. Conclusions
6. Future Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Boot, A.W.; Thakor, A.V. Security design. J. Financ. 1993, 48, 1349–1378. [Google Scholar] [CrossRef]
- Saltzer, J.H.; Schroeder, M.D. The protection of information in computer systems. Proc. IEEE 1975, 63, 1278–1308. [Google Scholar] [CrossRef]
- Microsoft. The Security Development Lifecycle; Microsoft Press: Redmond, WA, USA, 2006. [Google Scholar]
- Digital Security by Design. 2024. Available online: https://www.dsbd.tech/ (accessed on 18 October 2024).
- Department for Digital, Culture, Media, and Sport. Digital Security by Design: Overview of Programme and Projects. 2021. Available online: https://www.nao.org.uk/wp-content/uploads/2023/03/dcms-departmental-overview.pdf (accessed on 18 October 2024).
- Arm Limited. Digital Security by Design (DSbD): Transforming Digital Infrastructure Security Through Secure Hardware. 2020. Available online: https://www.arm.com/ (accessed on 18 October 2024).
- Shrobe, H.; Laddaga, R.; Balzer, R. Awareness: The building blocks of security. IEEE Secur. Priv. 2009, 7, 74–77. [Google Scholar]
- Bhattacharya, S.; Kaabouch, N. A survey on security and privacy issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 2011, 15, 1–24. [Google Scholar]
- Sarker, I.H.; Furhad, M.H.; Nowrozy, R. AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. J. Big Data 2021, 8, 1–29. [Google Scholar] [CrossRef]
- UK Research and Innovation (UKRI). 2024. Available online: https://www.ukri.org/ (accessed on 1 November 2024).
- The National Cyber Security Centre (NCSC). 2024. Available online: https://www.ncsc.gov.uk/ (accessed on 1 November 2024).
- Watson, R.; Moore, S.; Sewell, P.; Davis, B.; Neumann, P. Capability Hardware Enhanced RISC Instructions (CHERI). 2024. Available online: https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/ (accessed on 18 October 2024).
- Wang, Z.; Hu, Y. Towards a High-performance and Secure Memory System and Architecture for Emerging Applications. arXiv 2022, arXiv:2205.04002. [Google Scholar]
- He, Z.; Elizarov, M.S.; Li, N.; Xiang, F.; Fratalocchi, A. Quantum-activated neural reservoirs on-chip open up large hardware security models for resilient authentication. arXiv 2024, arXiv:2403.14188. [Google Scholar]
- Malatji, M.; Tolah, A. Artificial intelligence (AI) cybersecurity dimensions: A comprehensive framework for understanding adversarial and offensive AI. AI Ethics 2024, 1–28. [Google Scholar] [CrossRef]
- Hashmi, E.; Yamin, M.M.; Yayilgan, S.Y. Securing tomorrow: A comprehensive survey on the synergy of Artificial Intelligence and information security. AI Ethics 2024, 1–19. [Google Scholar] [CrossRef]
- Sarker, I.H. Introduction to AI-Driven Cybersecurity and Threat Intelligence. In AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability; Springer: Berlin/Heidelberg, Germany, 2024; pp. 3–19. [Google Scholar]
- de Azambuja, A.J.G.; Plesker, C.; Schützer, K.; Anderl, R.; Schleich, B.; Almeida, V.R. Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics 2023, 12, 1920. [Google Scholar] [CrossRef]
- Wahyuningsih, T.; Sembiring, I.; Setiawan, A.; Setyawan, I. Exploring network security threats through text mining techniques: A comprehensive analysis. Comput. Sci. Inf. Technol. 2023, 4, 258–267. [Google Scholar] [CrossRef]
- Mukhopadhyay, A.; Sharma, K. A Text-Mining Approach to Cyberrisk Management. 2021. Available online: https://www.isaca.org/resources/isaca-journal/issues/2021/volume-6/a-text-mining-approach-to-cyberrisk-management (accessed on 18 October 2024).
- Ignaczak, L.; Goldschmidt, G.; Costa, C.A.D.; Righi, R.D.R. Text mining in cybersecurity: A systematic literature review. ACM Comput. Surv. (CSUR) 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Barik, K.; Misra, S.; Konar, K.; Kaushik, M.; Ahuja, R. A comparative study on the application of text mining in cybersecurity. Recent Adv. Comput. Sci. Commun. (Formerly Recent Patents Comput. Sci. 2023, 16, 80–93. [Google Scholar] [CrossRef]
- Radanliev, P. Digital security by Design. Secur. J. 2024, 37, 1640–1679. [Google Scholar] [CrossRef]
- Saqr, M. Temporal Network Analysis: Introduction, Methods and Analysis with R. In Learning Analytics Methods and Tutorials: A Practical Guide Using R; Springer: Berlin/Heidelberg, Germany, 2024; pp. 541–567. [Google Scholar]
- Gelardi, V.; Le Bail, D.; Barrat, A.; Claidiere, N. From temporal network data to the dynamics of social relationships. Proc. R. Soc. B 2021, 288, 20211164. [Google Scholar] [CrossRef] [PubMed]
- Mishra, M.; Vishwakarma, S.K.; Malviya, L.; Anjana, S. Temporal analysis of computational economics: A topic modeling approach. Int. J. Data Sci. Anal. 2024, 1–15. [Google Scholar] [CrossRef]
- Huang, L.; Chen, X.; Zhang, Y.; Wang, C.; Cao, X.; Liu, J. Identification of topic evolution: Network analytics with piecewise linear representation and word embedding. Scientometrics 2022, 127, 5353–5383. [Google Scholar] [CrossRef]
- Zhang, D.C.; Lauw, H. Dynamic topic models for temporal document networks. In Proceedings of the International Conference on Machine Learning, Baltimore, MD, USA, 17–23 July 2022; pp. 26281–26292. [Google Scholar]
- Jing, X.; Hu, Q.; Zhang, Y.; Rayz, J.T. Tracing topic transitions with temporal graph clusters. arXiv 2021, arXiv:2104.07836. [Google Scholar] [CrossRef]
- Scrapy. 2024. Available online: https://scrapy.org (accessed on 18 October 2024).
- Pandas. 2024. Available online: https://pandas.pydata.org/ (accessed on 8 October 2024).
- SpaCy. 2024. Available online: https://spacy.io/ (accessed on 18 October 2024).
- Zhong, Z.; Chen, D. A frustratingly easy approach for entity and relation extraction. arXiv 2020, arXiv:2010.12812. [Google Scholar]
Year | No. of Nodes | No. of Unique Edges |
---|---|---|
2019 | 1403 | 2237 |
2020 | 1759 | 2408 |
2021 | 1650 | 1916 |
2022 | 2106 | 2763 |
2023 | 2772 | 3576 |
2024 | 5284 | 7199 |
Node | Closeness Centrality | Node | Degree Centrality |
---|---|---|---|
Digital | 0.211 | Trust | 0.046 |
AI | 0.210 | NCSC | 0.015 |
NCSC | 0.208 | Williams | 0.014 |
Cyber Security | 0.208 | NHS | 0.014 |
University | 0.206 | AI | 0.014 |
UKRI | 0.204 | CHERI | 0.013 |
0.204 | UKRI | 0.013 | |
Digital Security | 0.203 | Digital Security | 0.012 |
Trust | 0.203 | Morello | 0.010 |
Morello | 0.202 | Digital | 0.010 |
2019 | 2020 | ||
Node | Degree Centrality | Node | Degree Centrality |
Trust | 0.265 | Williams | 0.087 |
NHS | 0.057 | ESRC | 0.032 |
Board | 0.047 | EPSRC | 0.027 |
The Hillingdon Hospitals NHS Foundation Trust | 0.029 | Digital | 0.024 |
CQC | 0.024 | Cyber Security | 0.017 |
UKRI | 0.019 | NCSC | 0.017 |
Committee | 0.018 | Cardiff University | 0.016 |
NHS Foundation Trust | 0.016 | Manchester | 0.016 |
GP | 0.014 | University | 0.014 |
Hillingdon Hospital | 0.013 | 0.013 | |
2021 | 2022 | ||
Node | Degree Centrality | Node | Degree Centrality |
NCSC | 0.073 | NCSC | 0.027 |
UKRI | 0.055 | SU Repository | 0.020 |
National Cyber Strategy | 0.048 | SGN | 0.017 |
Innovation | 0.032 | Bada | 0.017 |
State | 0.032 | Morello | 0.015 |
UK Research and Innovation | 0.028 | NCA | 0.013 |
Department | 0.027 | 0.013 | |
NCA | 0.024 | NCF | 0.011 |
Industrial Strategy | 0.023 | Cyber Security | 0.010 |
NCF | 0.023 | DCMS | 0.009 |
2023 | 2024 | ||
Node | Degree Centrality | Node | Degree Centrality |
ITM | 0.022 | CHERI | 0.050 |
BT | 0.018 | Digital Security | 0.026 |
SGN | 0.013 | AI | 0.024 |
AI | 0.013 | DSS | 0.019 |
Lancaster University | 0.011 | Ofcom | 0.015 |
Microsoft | 0.011 | TechWorks | 0.014 |
NAV | 0.011 | UKRI | 0.014 |
EU | 0.009 | Bank | 0.013 |
Amazon | 0.009 | NHS | 0.013 |
UKRI | 0.009 | Morello | 0.012 |
2019 | 2020 | ||
Node | Closeness Centrality | Node | Closeness Centrality |
Trust | 0.271 | ESRC | 0.157 |
NHS | 0.242 | NCSC | 0.155 |
Digital | 0.239 | Williams | 0.154 |
The Hillingdon Hospitals NHS Foundation Trust | 0.239 | EPSRC | 0.153 |
CQC | 0.229 | AI | 0.152 |
RCA | 0.229 | Cyber Security | 0.152 |
NHS Foundation Trust | 0.227 | Oxford | 0.151 |
Board | 0.225 | Digital | 0.150 |
Richard Sumray | 0.224 | University | 0.150 |
Shane DeGaris | 0.224 | Morello | 0.148 |
2021 | 2022 | ||
Node | Closeness Centrality | Node | Closeness Centrality |
State | 0.189 | NCSC | 0.145 |
National Cyber Strategy | 0.187 | AI | 0.145 |
UKRI | 0.183 | Cyber Security | 0.144 |
Department | 0.178 | 0.143 | |
NCF | 0.178 | NCA | 0.141 |
NCSC | 0.176 | Computer Science | 0.140 |
NATO | 0.175 | SGN | 0.138 |
EU | 0.175 | Microsoft | 0.137 |
Industrial Strategy | 0.174 | Quantum | 0.137 |
DSbD | 0.173 | GCHQ | 0.137 |
2023 | 2024 | ||
Node | Closeness Centrality | Node | Closeness Centrality |
Lancaster University | 0.144 | CHERI | 0.170 |
NCSC | 0.142 | AI | 0.166 |
Cyber Security | 0.141 | Morello | 0.157 |
EPSRC | 0.139 | 0.157 | |
Microsoft | 0.139 | NCSC | 0.155 |
Thales | 0.138 | UKRI | 0.155 |
AI | 0.138 | Digital Security | 0.154 |
ARM | 0.138 | Microsoft | 0.153 |
Amazon | 0.136 | Rust | 0.152 |
BT | 0.135 | EDA | 0.152 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Williams, L.; Khan, H.; Burnap, P. The Evolution of Digital Security by Design Using Temporal Network Analysis. Informatics 2025, 12, 8. https://doi.org/10.3390/informatics12010008
Williams L, Khan H, Burnap P. The Evolution of Digital Security by Design Using Temporal Network Analysis. Informatics. 2025; 12(1):8. https://doi.org/10.3390/informatics12010008
Chicago/Turabian StyleWilliams, Lowri, Hamza Khan, and Pete Burnap. 2025. "The Evolution of Digital Security by Design Using Temporal Network Analysis" Informatics 12, no. 1: 8. https://doi.org/10.3390/informatics12010008
APA StyleWilliams, L., Khan, H., & Burnap, P. (2025). The Evolution of Digital Security by Design Using Temporal Network Analysis. Informatics, 12(1), 8. https://doi.org/10.3390/informatics12010008