Opendata, web and dolomites

CyberSANE SIGNED

Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

Project "CyberSANE" data sheet

The following table provides information about the project.

Coordinator
PDM E FC PROJECTO DESENVOLVIMENTO MANUTENCAO FORMACAO E CONSULTADORIALDA 

Organization address
address: R AMADEU SOUSA CARDOSO 20 1 DTO
city: LISBOA
postcode: 1300 066
website: www.pdmfc.com

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Portugal [PT]
 Total cost 6˙146˙737 €
 EC max contribution 4˙985˙550 € (81%)
 Programme 1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
 Code Call H2020-SU-ICT-2018
 Funding Scheme IA
 Starting year 2019
 Duration (year-month-day) from 2019-09-01   to  2022-08-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    PDM E FC PROJECTO DESENVOLVIMENTO MANUTENCAO FORMACAO E CONSULTADORIALDA PT (LISBOA) coordinator 421˙312.00
2    UBITECH LIMITED CY (LIMASSOL) participant 421˙312.00
3    SPHYNX TECHNOLOGY SOLUTIONS AG CH (ZUG) participant 419˙125.00
4    MAGGIOLI SPA IT (SANTARCANGELO DI ROMAGNA) participant 401˙187.00
5    KLINIKUM NURNBERG DE (NURNBERG) participant 342˙500.00
6    ATOS SPAIN SA ES (MADRID) participant 319˙375.00
7    IDRYMA TECHNOLOGIAS KAI EREVNAS EL (IRAKLEIO) participant 312˙500.00
8    INSTITUT NATIONAL DE RECHERCHE ENINFORMATIQUE ET AUTOMATIQUE FR (LE CHESNAY CEDEX) participant 303˙750.00
9    INSTITUT JOZEF STEFAN SI (LJUBLJANA) participant 302˙250.00
10    LIGHTSOURCE LABS LIMITED IE (DUBLIN) participant 301˙875.00
11    CONSIGLIO NAZIONALE DELLE RICERCHE IT (ROMA) participant 296˙625.00
12    FUNDACION DE LA COMUNIDAD VALENCIANA PARA LA INVESTIGACION, PROMOCION Y ESTUDIOS COMERCIALES DE VALENCIAPORT ES (VALENCIA) participant 296˙137.00
13    S2 GRUPO DE INNOVACION EN PROCESOS ORGANIZATIVOS SL ES (VALENCIA) participant 249˙375.00
14    KATHOLIEKE UNIVERSITEIT LEUVEN BE (LEUVEN) participant 248˙250.00
15    SIDROCO HOLDINGS LIMITED CY (NICOSIA) participant 175˙875.00
16    UNIVERSITY OF BRIGHTON UK (BRIGHTON) participant 174˙100.00

Map

 Project objective

In the digital era, Critical Infrastructures (CIs) are operating under the premise of robust and reliable ICT components, complex ICT infrastructures and emerging technologies and are transforming into Critical Information Infrastructures (CIIs) that can offer a high degree of flexibility, scalability, and efficiency in the communication and coordination of advanced services and processes. The increased usage of information technology in modern CIIs means that they are becoming more vulnerable to the activities of hackers and other perpetrators of cyber-related crime (cyber criminals). Several recent studies have shown that the landscape of cyber threats is changing continuously and the nature of attacks of this sort are evolving, involving a great degree of persistence and (technical) sophistication. In addition to this, barriers to entry for would-be cyber criminals are falling rapidly, and nowadays, the attackers have a range of (technical) capabilities and substantial resources at their disposal, since malware and malware-as-a service become more easily and cheaply available through various means and sources (such as Dark Web, Deep Web). Thus, a variety of advanced techniques and tools (e.g. social engineering techniques and zero-day exploits programs) are available and can be used by the cyber criminals to initiate advanced targeted attacks. These threats employ multiple technologies and malware, deployed in multiple stages, to bypass traditional security mechanisms in order to penetrate an organization’s defenses. The attack vectors vary significantly including Application-Layer, Social Engineering Unauthorized Access, Malicious Code, and Reconnaissance and Networking-based service attacks that target applications, host and client operating systems, and even networking equipment. In this vein, the attackers use these techniques to get valuable data assets, such as financial transaction information, user credentials, insider information etc.

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CYBERSANE" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CYBERSANE" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.2.1.1.)

Safe-DEED (2018)

Safe Data Enabled Economic Development

Read More  

ADEPTNESS (2020)

Design-Operation Continuum Methods for Testing and Deployment under Unforeseen Conditions for Cyber-Physical Systems of Systems

Read More  

NGIAtlantic.eu (2020)

A Collaborative platform for EU-US NGI experiments

Read More