

{"id":1137,"date":"2021-06-22T16:10:44","date_gmt":"2021-06-22T14:10:44","guid":{"rendered":"https:\/\/tsp.iit.cnr.it\/?page_id=1137"},"modified":"2021-06-30T12:33:56","modified_gmt":"2021-06-30T10:33:56","slug":"lab-1","status":"publish","type":"page","link":"https:\/\/tsp.iit.cnr.it\/en\/research\/lab-1\/","title":{"rendered":"Advanced cyber threat management"},"content":{"rendered":"<p>The digital world is continuously expanding thus providing a larger attack surface to several threats. Modern systems must be designed to resist to existing and emerging threats that may impact cyber physical systems. We consider for simplicity three classical areas that are linked as\u00a0<strong>protect, detect\u00a0<\/strong>and<strong>\u00a0respond<\/strong>.<br><br><strong>The\u00a0protection\u00a0phase<\/strong> designs and deploys system that are secure and resilient and can monitor their security status. The prevention and protection of attacks in modern ICT components, infrastructure, and systems remains a complex task. It entails <strong>developing software and hardware components that have security-by-design as main requirement <\/strong>as well as the capability of deploy several protection mechanisms. The complexity of heterogeneous collections of hardware and software components finds its roots in a diversity of individual development contexts and levels of maturity. It is compounded by growing means of networked interactions, and varied lifecycle schedules that generate highly dynamic behaviors in these systems. As part of this process <strong>we need to design and formally analyze the system security and design proper security workflows<\/strong>, in addition to design systems that can be easily reconfigured at run time.<br><br><strong>The\u00a0detect\u00a0phase <\/strong>allow systems to detect threats using several approaches, <strong>from policy based approaches to machine learning ones<\/strong>. It entails the collection and sharing of significant amount of data from several sources and the continuous monitoring of resources. The collection and analysis of the data must be equipped with specific techniques depending on the threats.<br><br><strong>In the respond phase<\/strong>, threats are countered and possibly the system may evolve during subsequent planning\/redesign steps. The\u00a0<strong>Respond<\/strong>\u00a0security process is concerned with <strong>planning and executing appropriate actions following the detection of a security event<\/strong>. These reconfiguration plans could be policy based. The purpose of the Recover security process is to evolve the system being protected to better and improved \u2018business as usual\u2019 status.<\/p>","protected":false},"excerpt":{"rendered":"<p>The digital world is continuously expanding thus providing a larger attack surface to several threats. Modern systems must be designed to resist to existing and emerging threats that may impact cyber physical systems. We consider for simplicity three classical areas that are linked as\u00a0protect, detect\u00a0and\u00a0respond. The\u00a0protection\u00a0phase designs and deploys system that are secure and resilient [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1135,"menu_order":17,"comment_status":"closed","ping_status":"closed","template":"pagina_con_sottopagine.php","meta":{"footnotes":""},"class_list":["post-1137","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/comments?post=1137"}],"version-history":[{"count":3,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1137\/revisions"}],"predecessor-version":[{"id":1196,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1137\/revisions\/1196"}],"up":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1135"}],"wp:attachment":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/media?parent=1137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}