Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Velma

This system retrieves information on specific vulnerabilities (CVEs) from various sources. This information is used to generate summaries for different audiences. The summaries are then used to create brief descriptions and reports, which are shared on NCSC's public platforms.

Last change on 19th of December 2024, at 13:10 (CET) | Publication Standard 1.0
Publication category
Other algorithms
Impact assessment
Field not filled in.
Status
In development

General information

Theme

Public Order and Safety

Begin date

2024-04

Contact information

info@ncsc.nl

Link to publication website

https://vulnerabilities.ncsc.nl/

Responsible use

Goal and impact

The system is designed to make the collection and processing of information on cybersecurity vulnerabilities faster and more efficient.

Considerations

Field not filled in.

Human intervention

NCSC staff are involved in evaluating the quality of the summaries generated. They check whether the information is correct.

Risk management

The system is continuously evaluated for various risks, including ethical aspects, legal implications and cyber security. This risk assessment is regularly updated to stay in line with the evolution of the system. Proactive measures are taken to identify and mitigate potential risks.

Operations

Data

Field not filled in.

External provider

Developed in-house

Similar algorithm descriptions

  • The algorithm calculates which absence reports made by schools can be assigned to which compulsory attendance officer.

    Last change on 5th of July 2024, at 10:32 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The various algorithms and calculation rules within LVMA work together so that information from video images can be converted to interpretable census data as decision-supporting information for public space steering and policy.

    Last change on 25th of April 2024, at 12:27 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm helps the ACM find price announcements in messages that might say something about tacit or explicit alignment. This information by itself does not trigger action, but it can be a reason for inspectors to further investigate a possible infringement.

    Last change on 4th of October 2024, at 13:36 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The Operational Readiness Dashboard provides insight into the current operational readiness and deployability of the armed forces. Specifically, the dashboard provides insight into personnel readiness, materiel readiness and exercise readiness per unit. This dashboard runs in BI/VEST, which stands for Business Intelligence/Improved Steering Information.

    Last change on 28th of November 2024, at 12:30 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA
    Status
    In use
  • The algorithm underlines personal data in documents. An employee has to review all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government Act.

    Last change on 4th of July 2024, at 10:21 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    DPIA, ...
    Status
    In use