Result description
Cybersecurity threat modelling strategy that increases resilience of the system against cyber attacks throughout system development lifecycle:
- Phase 1: Requirements
- Phase 2: Design
- Phase 3: Implementation
- Phase 4: Verification
- Phase 5: Release
- Phase 6: Support & Service
The risk based cyber threat modelling tool ensures trustworthy security throughout all the development lifecycle of critical infrastructure.
Addressing target audiences and expressing needs
- Business partners – SMEs, Entrepreneurs, Large Corporations
- Business plan development
We plan to utilise this as a participant in further R&I in new industries and intend to further exploit this approach with the help of formal verification.
- Other Actors who can help us fulfil our market potential
R&D, Technology and Innovation aspects
Next Steps:
- Actively looking for collaboration partner within and outside electricity domain.
- Extend the semi formal threat modeling approach with a formal verification approach which mathematically proves the cyber security of the system set-up. More focus on research in this domain.
Can be easily replicted for various domains.
- Turkey
- Austria
- Europe
- United Kingdom
Result submitted to Horizon Results Platform by JOANNEUM RESEARCH FORSCHUNGSGESELLSCHAFT MBH