Shopping cart

    Subtotal

    View cartCheckout

    Requirements
    WP2 (M1-M24)

    Requirements

    CoordinatorFraunhofer Institute for Applied and Integrated Security AISEC (FHG)

    Participants – IMT, CEA, EHT, NRD, CSI, NIC, TLB, VIC, VMU​.

    The objective of WP2 is to define the use cases as well as the overall requirements.

    The following tasks are set:

    • Task 2.1 Use Case Design will focus on the use case definition. These will be the baseline of simulation and piloting.
    • Task 2.2 Requirements Definition will define requirements to be fulfilled. These will be the basis for further development of software components, integration, deployment simulation and piloting in the other WPs. Requirements will be split into functional requirements as well as non-functional requirements with specific focus on privacy and security (such as remote integrity verification). This task will also contribute requirements from relevant EU legislation and political initiatives such as the NIS directive, the Cybersecurity Act, the Regulation on the European Cybersecurity Competence Centre (ECCC) and the Network of National Coordination Centres and the cybersecurity Blueprint.
    • Task 2.3 Regulatory Requirements will focus on analyses of regulatory requirements for information sharing. It will also analyse the legal impact and requirements for sharing agreements between entities.
    • Task 2.4 Synergies with Blueprint/CyCLONe & Joint Cybersecurity Unit and other European and national cyber-security initiative will study possible synergies with official European cybersecurity initiatives such as CyCLONe, the Joint Cybersecurity Unit and the CSIRT network.

    Deliverables:

      • 1 Use case & requirement documentation – preliminary version – M6
      • 2 Use case & requirement documentation – final version – M24