WP6 – Risk Analysis and Mitigation Strategies
Coordinated by
RES (M01-M16)
Objective
This work package researches and develops a methodology for continuous risk assessment process on the ICT supply chain, such that the system is continuously analyzed for potential weaknesses, and corresponding mitigation strategies can be enacted using BIECO solutions.
This WP has the following concrete objectives:
- To identify in an automated fashion main threats, including those that could also derive in a physical hazard in a cyber-physical system.
- To compute the severity of the consequences of threats and hazards.
- To make the link between systems’ internal security causes and their possible safety hazards explicit, e.g. in failure logic models such as Component Fault Trees.
- To define mitigation strategies.
- Out of both design time risk assessment models and mitigation strategies, runtime risk management models shall be synthesized systematically that are suitable to support runtime resilience mechanisms defined in WP4.
- Design and develop security, privacy and accountability measures for all the entities involved in the supply chain.
Envisioned mitigations range from process-based to architecture-based as well as related to the introduction of new patches and error detectors. The WP will ultimately produce a methodology and supporting tools for the systematic and automated i) analysis of risks, and ii) identification of mitigations that shall be equipped in the BIECO framework.
Deliverables
- D6.1 Blockly4SoS model and simulator WP6 (7 – RESILTECH) Report Public M10
- D6.2 Blockly4SoS user guide WP6 (7 – RESILTECH) Report Public M12
- D6.3 Risk Assessment and additional requirements WP6 (10 – 7BULLS) Report Public M24
- D6.4 Mitigations identification and their design WP6 (2 – Fraunhofer) Report Public M16
Outcomes
BIECO Project – Methodology for Security Evaluation
We happily announce that BIECO has been presented at @YavaConf 2022! The session entitled "BIECO Project - Methodology for Security Evaluation" has been presented on Tuesday - September 27th, by Marcin Byra, @7bulls.com. The presentation is available here....
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond – Video
Dis you miss the opportunity to attend to the 2nd Workshop on Accountability, Liability, and Trust for 5G and Beyond (WALT5G+)? Don't worry! You can still see the video that D. Sara Matheu presented about the BIECO work performed within WP6. Abstract: While the...
WP3 Monthly meeting July 2022
After the face-to-face meeting of BIECO in June in Lisbon, where useful ideas for the correct development of the tools have been clarified and secured, the regular WP3 monthly meetings have been taken up. In the July meeting, the evolution of the different detection,...
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond
1st International Conference on 6G Networking BIECO participates this Friday 8th july in the 2nd Workshop on Accountability, Liability, and Trust for 5G and Beyond (WALT5G+). This conference provides an interdisciplinary forum to exchange innovative research ideas,...
BIECO first F2F meeting
BIECO Progress Meeting Agenda 7-9th June 2022, 09:00- 17:00 WET Location: UNINOVA – Building 1 – Campus da FCT-UNL, Quinta da Torre, 2829-516 Caparica Meeting Objectives: 1. Analysing the Review Meeting 2. Align the view of the...
GROOT: GdpR-based cOmbinatOrial Testing strategy (BIECO Version)
Short description In this video, the CNR presents GROOT, a generic combinatorial testing methodology specifically conceived for assessing compliance with the GDPR and its contextualization in the context of the access control domain, considering the peculiarity of the...