![Internal security](https://cdn.statically.io/img/home-affairs.ec.europa.eu/sites/default/files/styles/oe_theme_ratio_3_2_medium/public/2021-07/internal_security_2.jpg?itok=fXdBvKaC)
Discover the European Commission’s latest policy initiatives on internal security.
![Child abuse](https://cdn.statically.io/img/home-affairs.ec.europa.eu/sites/default/files/styles/oe_theme_ratio_3_2_medium/public/2021-07/child_abuse.jpg?itok=VGcleui5)
Discover EU’s legal framework to protect children and prevent child sexual abuse.
![Corruption](https://cdn.statically.io/img/home-affairs.ec.europa.eu/sites/default/files/styles/oe_theme_ratio_3_2_medium/public/2021-07/corruption%20%28Photo%20by%20Markus%20Spiske%20on%20Unsplash%29.jpg?itok=9cIKNDAJ)
It is in the common interest to ensure that all EU countries have effective anti-corruption policies and the EU supports the Member States in pursuing this work.
![Counter terrorism](https://cdn.statically.io/img/home-affairs.ec.europa.eu/sites/default/files/styles/oe_theme_ratio_3_2_medium/public/2021-07/counter_terrorism.jpg?itok=vg5c-W_f)
Learn how the EU is combatting terrorism and protecting citizens against terrorist attacks.
![Hacker](https://cdn.statically.io/img/home-affairs.ec.europa.eu/sites/default/files/styles/oe_theme_ratio_3_2_medium/public/2021-07/hacker.jpg?itok=FWWggDMQ)
It is important to develop a common European policy on cyberattacks, online fraud and forgery, and removing illegal online content.
![Human trafficking](https://cdn.statically.io/img/home-affairs.ec.europa.eu/sites/default/files/styles/oe_theme_ratio_3_2_medium/public/2021-07/human_trafficking.jpg?itok=1fomkXOG)
The EU encourages its countries to cooperate and fight trafficking in human beings and firearms, corruption, counterfeiting, and to develop a common policy on drugs.
![Security research](https://cdn.statically.io/img/home-affairs.ec.europa.eu/sites/default/files/styles/oe_theme_ratio_3_2_medium/public/2021-07/security_research.jpg?itok=tNN603Hw)
EU security research supports innovation and knowledge crucial for developing capabilities to address security challenges.