WP6 – Risk Analysis and Mitigation Strategies
Coordinated by
RES (M01-M16)
Objective
This work package researches and develops a methodology for continuous risk assessment process on the ICT supply chain, such that the system is continuously analyzed for potential weaknesses, and corresponding mitigation strategies can be enacted using BIECO solutions.
This WP has the following concrete objectives:
- To identify in an automated fashion main threats, including those that could also derive in a physical hazard in a cyber-physical system.
- To compute the severity of the consequences of threats and hazards.
- To make the link between systems’ internal security causes and their possible safety hazards explicit, e.g. in failure logic models such as Component Fault Trees.
- To define mitigation strategies.
- Out of both design time risk assessment models and mitigation strategies, runtime risk management models shall be synthesized systematically that are suitable to support runtime resilience mechanisms defined in WP4.
- Design and develop security, privacy and accountability measures for all the entities involved in the supply chain.
Envisioned mitigations range from process-based to architecture-based as well as related to the introduction of new patches and error detectors. The WP will ultimately produce a methodology and supporting tools for the systematic and automated i) analysis of risks, and ii) identification of mitigations that shall be equipped in the BIECO framework.
Deliverables
- D6.1 Blockly4SoS model and simulator WP6 (7 – RESILTECH) Report Public M10
- D6.2 Blockly4SoS user guide WP6 (7 – RESILTECH) Report Public M12
- D6.3 Risk Assessment and additional requirements WP6 (10 – 7BULLS) Report Public M24
- D6.4 Mitigations identification and their design WP6 (2 – Fraunhofer) Report Public M16
Outcomes
REVIEW MEETING M18 – 29th April, 2022
Friday 29th April 2022 - 13.00 – 17.00 CET AGENDA Overview 13:00 - 13:10 Project Overview 13:10 - 15:10 WP2 - WP9 Presentations 15:10 - 15:20 Break 15:20 - 15:50 BIECO Demo 15:50 - 16:00 BIECO Use Cases 16:00 - 16:15 Project Coordination and Management 16:15 -...
The Need for IoT Security Standards & Certification Global IoT Day Roundtable – Recording available
If you missed the chance to attend to the Global IoT Roundtable about the need for IoT security standards and certification, you can watch the recording of the sessions in YouTube. Session 1: Organizations (DG CNECT, ENISA, ETSI, ECSO, GlobalPlatform, AIOTI, E&Y,...
The BIECO video presentation M18
The BIECO video presentation M18The BIECO presentation In the light of fast development of cyber threats, the complexity of heterogenous ICT ecosystems raise major security concerns. In this regard, BIECO provides a set of tools and methodologies for building...
The need for IoT security standards & certification
IoT Day Roundtable – 8. April 2022 WHAT SHOULD YOU KNOW ABOUT PROSPECTIVE EUROPEAN IOT SECURITY STANDARDS AND CERTIFICATION? ARE YOU PREPARED FOR A NEW ERA?To celebrate Global IoT Day, we are organizing an online roundtable with the participation...
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity) Author: Eda Marchetti Document type: Other Publisher: Italian newspaper “il sole 24 ore” special insert “SCENARI” daily (published 28th of February 2022)
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities Authors: Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings Publication: Proceedings of the 8th International Conference on Information Systems...