WP5 – Methods and Tools for Auditing complex systems
Coordinated by
CNR (M04-M30)
Objective
This work package will focus on the development of techniques, methods and tools supporting the audit activity in the BIECO framework. Auditing includes retrieval of data from the field, such as data regarding the usage mode of an ICT system subject to runtime adaptation through the delivery of software updates. The main goal is to provide ecosystem trustworthiness’s evaluation leveraging executable simulation environments and runtime monitoring facilities. The monitoring results aim to provide useful feedback for setting up the simulation environment.
This work package has the following objectives:
- Definition of the executable simulation models and of the parameters against which the behavior of the ICT systems and their interacting actors within an ecosystem is judged as being trustworthy or not.
- Definition of monitoring methodologies and tools detecting malicious behaviors of ICT systems and interacting actors within the ecosystems and assessing the validity of the simulation models.
- Developing monitoring tools able to validate through real-time data of systems sensors and actuators the validity of simulation decisions.
Deliverables
- D5.1 Definition of the simulation model and monitoring methodologies WP5 (3 – CNR) Report Confidential, only for members of the consortium (including the Commission Services) M12
- D5.2 First version of the simulation environment and monitoring solutions WP5 (3 – CNR) Report Public M24
- D5.3 Final version of the simulation environment and monitoring tools WP5 (2 – Fraunhofer) Report Public M30
Outcomes
REVIEW MEETING M18 – 29th April, 2022
Friday 29th April 2022 - 13.00 – 17.00 CET AGENDA Overview 13:00 - 13:10 Project Overview 13:10 - 15:10 WP2 - WP9 Presentations 15:10 - 15:20 Break 15:20 - 15:50 BIECO Demo 15:50 - 16:00 BIECO Use Cases 16:00 - 16:15 Project Coordination and Management 16:15 -...
The Need for IoT Security Standards & Certification Global IoT Day Roundtable – Recording available
If you missed the chance to attend to the Global IoT Roundtable about the need for IoT security standards and certification, you can watch the recording of the sessions in YouTube. Session 1: Organizations (DG CNECT, ENISA, ETSI, ECSO, GlobalPlatform, AIOTI, E&Y,...
The BIECO video presentation M18
The BIECO video presentation M18The BIECO presentation In the light of fast development of cyber threats, the complexity of heterogenous ICT ecosystems raise major security concerns. In this regard, BIECO provides a set of tools and methodologies for building...
The need for IoT security standards & certification
IoT Day Roundtable – 8. April 2022 WHAT SHOULD YOU KNOW ABOUT PROSPECTIVE EUROPEAN IOT SECURITY STANDARDS AND CERTIFICATION? ARE YOU PREPARED FOR A NEW ERA?To celebrate Global IoT Day, we are organizing an online roundtable with the participation...
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity) Author: Eda Marchetti Document type: Other Publisher: Italian newspaper “il sole 24 ore” special insert “SCENARI” daily (published 28th of February 2022)
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities Authors: Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings Publication: Proceedings of the 8th International Conference on Information Systems...