Powered by OpenAIRE graph
Found an issue? Give us feedback

IDUNN

A Cognitive Detection System for Cybersecure Operational Technologies
Funder: European CommissionProject code: 101021911 Call for proposal: H2020-SU-DS-2020
Funded under: H2020 | IA Overall Budget: 5,159,000 EURFunder Contribution: 4,514,410 EUR
visibility
download
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
96
34
Description

Data is becoming the core engine of businesses. Data allows extracting, exchanging and sharing value out of the myriad of production and service chains that are no longer under a centralised distribution. As a result, an IT and OT convergence based on the integration of multiple ICT systems will transform market dynamics that present specific security challenges in a context of ever-accelerating change in terms of the threat landscape, attack surface, ecosystems, solutions and regulation. IDUNN’s main objective will focus on adding this trust ingredient to any business by making its ICT systems resilience to cyber-attacks. To achieve that, IDUNN will create a security shield in the form of tools, methodologies, microservices and initial standards compatible with any ICT supply chain. IDUNN will demonstrate a secure Continuity Plan for ICT based organisations by creating and validating a unique Cognitive Detection System for Cybersecure Operational Technologies. Faced with a possible incident, IDUNN will know how to act quickly to alleviate it, and in turn generate a cognitive learning process, which reduces human intervention and provides forecasting capabilities. In this respect, IDUNN will be capable of learning to protect themselves from new threats since they are constantly updated. IDUNN project will develop a complete integrated solution, modular and adaptative to different scenarios. Only when ICT systems behave securely, digital trust will be achieved. The deployment of IDUNN will (i) increase trust in ICT for both IT and OT, (ii) decrease person effort to ensure cybersecurity operations, (iii) increase response and lower recovery time, and above all, (iv) will have a crucial impact in the productivity of any businesses that make use of these secured ICT chains by ensuring that all technologies, services, and tools are defined to guarantee the continuation of the business, providing reasonable effective security and trust for the daily operations.

Data Management Plans
  • OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 96
    download downloads 34
  • 96
    views
    34
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback

Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.

All Research products
arrow_drop_down
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda__h2020::ddb558eee09a9de7f9fdf61ebc8a04c1&type=result"></script>');
-->
</script>
For further information contact us at helpdesk@openaire.eu

No option selected
arrow_drop_down