WP2 – Architecture, Requirements, and Use Case Definition
Coordinated by
UNINOVA (M01-M12)
Objective
The main objectives for this WP are:
- Detailing the requirements of the project together with its Key Performance Indicators
- Defining and detailing the use cases that will validate the work to be developed
Designing the architecture that supports all the objectives identified in the excellence part
Deliverables
- D2.1 Project Requirements WP2 (11 – IFEVS) Report Public M4
- D2.2 Use Case Definition WP2 (7 – RESILTECH) Report Confidential, only for members of the consortium (including the Commission Services) M12
- D2.3 Overall framework architecture design (1st Draft) WP2 (1 – UNINOVA) Report Public M6
- D2.4 Overall system architecture Update (Final) WP2 (1 – UNINOVA) Report Public M18
Outcomes
Fuzzing Tool
Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding outputs.
ResilBlockly
This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.
Security tools for AI Investments platform
Secured AI Investments platform using the outcome of the BIECO project.
Log Forgery Blocker
Log Forgery Blocker – a brand new product on the market.
Security evaluation methodology
Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…
Extended MUD file
The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…