Skip to main content

A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis

Deliverables

CS-AWARE technical documentation and training material

This deliverable must be ready for the pilot, but may be enhanced during and after the pilots. Documentation will primarily be in electronic searchable form, and training material may comprise of different media types depending on the needs of the end-users. (written, video, computer animation and simulation exercises.)

Guidelines and procedures for system and dependency analysis in the context of local public administrations [

This deliverable contains the guidelines and procedures for system and dependency analysis in local public administrations that are defined in T2.4. This deliverable will be the basis for dissemination activities to relevant regulatory and standardisation bodies.

System and dependency analysis (third iteration) – Pilot scenario specification and self-healing strategies

This deliverable contains the final results of the system and dependency analysis based on the third iteration of general requirements analysis of T2.1 and pilot specific analysis of T2.2. This deliverable forms the final environment for tool deployment and also contains the results for defining self-healing strategies within the pilot scenarios.

Design CS-AWARE common cloud-based software architecture and API specification

This includes visualisations of the overall final CS-AWARE architecture and list of APIs available with the necessary description and examples of usage.

Commercial actions report 3

This deliverable will document the latest developments regarding commercial actions taken.

Pilot evaluation report

This deliverable will contain a detailed report of the results obtained from the pilot case studies carried out within this project, including an evaluation of the practical relevance of and end user experiences with the cybersecurity mechanisms provided by the CS-AWARE solution (cybersecurity situational awareness, cybersecurity information sharing and self-healing).

System and dependency analysis (first iteration) – Cybersecurity requirements for local public administrations

This deliverable contains the first iteration of analysis results, with the purpose of defining the cybersecurity requirements for local public administrations. This deliverable is based on the first iterations of general requirements analysis of T2.1 and pilot specific analysis of T2.2. This deliverable is a direct input for T2.3.

CS-AWARE solution validation and testing report

Deliverable is based on T 4.4 and contains the validation and testing results of the CS-AWARE system before its final deployment.

Commercial actions report 2

This deliverable will document the latest developments regarding commercial actions taken.

Exploitation, dissemination and commercialisation report 3

This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.

Pilot deployment report

This deliverable will contain a detailed report of the deployment of the CS-AWARE solution within the environments provided by the local public administrations that are part of this project.

Exploitation, dissemination and commercialisation report 2

This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.

Commercial actions report 1

This deliverable will document the latest developments regarding commercial actions taken.

Exploitation, dissemination and commercialisation report

This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.

System and dependency analysis (second iteration) – Pilot scenario definition

This deliverable refines the results of D2.1 based on the second iteration of analysis of T2.1 and T2.2. The analysis results is the basis for the pilot scenario definitions and provide input to the pilot deployment preparations.

CS-AWARE framework

This deliverable specifies the CS-AWARE framework defined in T2.3. Based on the initial analysis results presented in D2.1.1, this deliverable specifies the interrelation between the CS-AWARE building blocks as well as the relevant internal and external information sources to collect and share cybersecurity data. The CS-AWARE framework will be a requirement for the technical software architecture tasked in WP3.

User story report

This deliverable will contain a composition of user stories relating to the cybersecurity experiences of the CS-AWARE project in the context of local public administrations. This could be in the form of a report or a book, edited by the WP-leaders, entitled: Narratives on cybersecurity: implementation and lessons of the CS-AWARE project.

System and dependency analysis tool support adaptation

This deliverable includes the implemented and tested adaptation of the GraphingWiki tool to meet the needs of the CS-AWARE solution.

Project’s public website, leaflet and poster

This deliverable essentially consists of the project’s website and any additional related material, such as leaflets, posters, etc. The website should be up by M3 and will be updated throughout the project duration.

Searching for OpenAIRE data...

Publications

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Author(s): Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos
Published in: Computers, Issue 9/1, 2020, Page(s) 18, ISSN 2073-431X
DOI: 10.3390/computers9010018

Applying Soft Systems Methodology to Complex Problem Situations in Critical Infrastructures: The CS-AWARE Case Study

Author(s): Veronika Kupfersberger, Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr and Juha Röning
Published in: International Journal On Advances in Security, Issue vol 11, no 3&4, year 2018, 2018, Page(s) 191 - 200, ISSN 1942-2636

Exploring Knowledge Graphs in an Interpretable Composite Approach for Text Entailment

Author(s): Vivian S. Silva, André Freitas, Siegfried Handschuh
Published in: Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19). Honolulu, USA. 2019, Issue Annual, 2019

Security-Driven Information Flow Modelling for Component Integration in Complex Environments

Author(s): Veronika Kupfersberger, Thomas Schaberreiter, Gerald Quirchmayr
Published in: Proceedings of the 10th International Conference on Advances in Information Technology - IAIT 2018, 2018, Page(s) 1-8
DOI: 10.1145/3291280.3291797

Addressing Complex Problem Situations in Critical Infrastructures using Soft Systems Analysis: The CS-AWARE Approach

Author(s): Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr and Juha Röning
Published in: SECURWARE 2017 : The Eleventh International Conference on Emerging Security Information, Systems and Technologies, Issue Annual, 2017, Page(s) 99-105

Enhancing credibility of digital evidence through provenance-based incident response handling

Author(s): Ludwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-6
DOI: 10.1145/3339252.3339275

A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources

Author(s): Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-10
DOI: 10.1145/3339252.3342112

An Innovative Self-Healing Approach with STIX Data Utilisation

Author(s): Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou, Christos Ilioudis
Published in: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020, Page(s) 645-651
DOI: 10.5220/0009893306450651