WP6 – Risk Analysis and Mitigation Strategies

 Coordinated by
RES (M01-M16)

Objective

This work package researches and develops a methodology for continuous risk assessment process on the ICT supply chain, such that the system is continuously analyzed for potential weaknesses, and corresponding mitigation strategies can be enacted using BIECO solutions.

This WP has the following concrete objectives:

  1. To identify in an automated fashion main threats, including those that could also derive in a physical hazard in a cyber-physical system.
  2. To compute the severity of the consequences of threats and hazards.
  3. To make the link between systems’ internal security causes and their possible safety hazards explicit, e.g. in failure logic models such as Component Fault Trees.
  4. To define mitigation strategies.
  5. Out of both design time risk assessment models and mitigation strategies, runtime risk management models shall be synthesized systematically that are suitable to support runtime resilience mechanisms defined in WP4.
  6. Design and develop security, privacy and accountability measures for all the entities involved in the supply chain.

Envisioned mitigations range from process-based to architecture-based as well as related to the introduction of new patches and error detectors. The WP will ultimately produce a methodology and supporting tools for the systematic and automated i) analysis of risks, and ii) identification of mitigations that shall be equipped in the BIECO framework.

Deliverables

Outcomes

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Security Testing Tool

GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).

Domain Specific Language

The domain specific language enables specification of digital twin behaviour in a manner that can enable a predicted evaluation of its trustworthy behaviour in a simulated environment

Fail-operation clock synchronization methodology

Synchronization loss can occur due to many reasons, either because of a device or link failure or due to a targeted attack on the reference node, which supplies the corrected time to the network’s nodes.

Time sensitive network simulation

Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This