WP4 – Development of Resilient Systems
Coordinated by
IESE (M01-M36)
Objective
In this WP, tools and methods will be developed for supporting creation of resilient systems w.r.t security attacks and vulnerabilities. The scope is to develop systems that can cope with behavior disturbances caused by malicious attacks, that manifest into a loss of control and can bring a system into hazardous situations. A resilient system shall be able to compensate for interruptions and get back into a safe state in case of emergency situations caused by malicious attacks. In this regard the system shall be able to autonomously and automatically construct awareness of its security in a dynamic environment, to recognize critical situations and to identify the right operational mode for remaining into a secure and trusted operational state.
Concretely, this work package has the following objectives:
- To develop methods and tools that enable runtime evaluation of system operational state in dynamic environments.
- To enhance existing tools that can predict failure propagation caused by malicious attacks and support the transition of an ICT system into a resilient state. Prediction is performed in a simulated environment by counteracting the capabilities of the system under evaluation to detect that it is under evaluation.
- To develop methods that during runtime bring a system into a safe, trusted state, making it resilient to malicious attacks.
Deliverables
- D4.1 Report on Self-checking of vulnerabilities and failures WP4 (7 – RESILTECH) Report Confidential, only for members of the consortium (including the Commission Services) M30
- D4.2 Report on methods and tools for the failure prediction WP4 (2 – Fraunhofer) Report Confidential, only for members of the consortium (including the Commission Services) M24
- D4.3 Report on Method development for resilient systems WP4 (2 – Fraunhofer) Report Confidential, only for members of the consortium (including the Commission Services) M30
Outcomes
REVIEW MEETING M18 – 29th April, 2022
Friday 29th April 2022 - 13.00 – 17.00 CET AGENDA Overview 13:00 - 13:10 Project Overview 13:10 - 15:10 WP2 - WP9 Presentations 15:10 - 15:20 Break 15:20 - 15:50 BIECO Demo 15:50 - 16:00 BIECO Use Cases 16:00 - 16:15 Project Coordination and Management 16:15 -...
The Need for IoT Security Standards & Certification Global IoT Day Roundtable – Recording available
If you missed the chance to attend to the Global IoT Roundtable about the need for IoT security standards and certification, you can watch the recording of the sessions in YouTube. Session 1: Organizations (DG CNECT, ENISA, ETSI, ECSO, GlobalPlatform, AIOTI, E&Y,...
The BIECO video presentation M18
The BIECO video presentation M18The BIECO presentation In the light of fast development of cyber threats, the complexity of heterogenous ICT ecosystems raise major security concerns. In this regard, BIECO provides a set of tools and methodologies for building...
The need for IoT security standards & certification
IoT Day Roundtable – 8. April 2022 WHAT SHOULD YOU KNOW ABOUT PROSPECTIVE EUROPEAN IOT SECURITY STANDARDS AND CERTIFICATION? ARE YOU PREPARED FOR A NEW ERA?To celebrate Global IoT Day, we are organizing an online roundtable with the participation...
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity) Author: Eda Marchetti Document type: Other Publisher: Italian newspaper “il sole 24 ore” special insert “SCENARI” daily (published 28th of February 2022)
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities Authors: Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings Publication: Proceedings of the 8th International Conference on Information Systems...