{"id":300,"date":"2023-11-03T15:08:59","date_gmt":"2023-11-03T15:08:59","guid":{"rendered":"http:\/\/sites.itml.gr:9988\/?page_id=300"},"modified":"2024-03-01T14:15:41","modified_gmt":"2024-03-01T14:15:41","slug":"concept","status":"publish","type":"page","link":"http:\/\/sites.itml.gr:9988\/concept\/","title":{"rendered":"Concept"},"content":{"rendered":"
[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|tablet” _builder_version=”4.23″ _module_preset=”default” background_image=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/10\/54f27571-bcc6-4700-bc84-887c0534a70fFf.png” background_size=”initial” background_enable_mask_style=”on” background_mask_style=”corner-blob” background_mask_aspect_ratio=”square” background_mask_size=”cover” custom_padding=”14%||14%||true|false” custom_padding_tablet=”5%||5%||true|false” custom_padding_phone=”5%||5%||true|false” background_last_edited=”on|tablet” use_background_color_gradient_phone=”on” background_color_gradient_type_phone=”linear” background_color_gradient_direction_phone=”100deg” background_color_gradient_direction_radial_phone=”top left” background_color_gradient_stops_phone=”#ffffff 33%|rgba(255,255,255,0) 69%” background_color_gradient_overlays_image_phone=”on” background_size_tablet=”cover” background_size_phone=”cover” background_position_tablet=”top_right” background_position_phone=”top_right” background_vertical_offset_phone=”0%” background_enable_mask_style_phone=”off” background_mask_transform_phone=”flip_vertical” background_mask_aspect_ratio_tablet=”portrait” background_mask_aspect_ratio_phone=”portrait” background_mask_size_phone=”cover” background_mask_position_phone=”bottom_center” background_mask_vertical_offset_phone=”1%” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23″ _module_preset=”default” width=”100%” max_width=”1920px” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_font=”|800|||||||” header_text_color=”#30027e” header_font_size=”4vw” custom_margin=”|||25%|false|false” custom_margin_tablet=”|||15%|false|false” custom_margin_phone=”|||10%|false|false” custom_margin_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.23″ _module_preset=”default” custom_padding=”||0px||false|false” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23″ _module_preset=”default” width=”90%” max_width=”1920px” custom_padding=”0px||0px||true|false” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text admin_label=”Title” _builder_version=”4.23″ text_font=”||||||||” text_text_color=”#242424″ header_font=”||||||||” header_text_color=”#242424″ header_2_font=”Montserrat|600||on|||||” header_2_text_color=”#474747″ header_2_font_size=”30px” header_2_line_height=”1.5em” background_layout=”dark” custom_margin=”||||false|false” custom_padding=”||||false|false” animation_style=”fold” animation_direction=”left” animation_intensity_fold=”20%” animation_starting_opacity=”1000%” header_2_text_align_tablet=”” header_2_text_align_phone=”center” header_2_text_align_last_edited=”on|phone” text_text_shadow_style=”preset2″ text_text_shadow_color=”#474747″ locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23″ _module_preset=”default” width=”90%” max_width=”1920px” custom_margin=”-30px||||false|false” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” background_layout=”dark” custom_margin=”||||false|false” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n
The CyberSecDome offers a proactive solution for safeguarding digital infrastructures from cyber threats. With a protective layer for diverse systems, from individual devices to enterprise networks, it consists of four core building blocks\u2014Digital Infrastructure, Virtual Infrastructure with digital twins, AI-Empowered Security Tools, and a VR-based Interactive Collaborative User Interface. This ensures continuous operations despite potential cyber-attacks.<\/p>\n
The Virtual Infrastructure facilitates safe training and testing, bridging offline research and real-time system performance. AI-Empowered Security Tools analyze data for a deeper understanding of potential attacks, providing incident forensics and comprehensive situational awareness. This knowledge guides effective incident response strategies for system continuity.<\/p>\n
At the apex, a Digital Twin-powered VR-Interface enhances response capabilities, synergizing human and AI competences. Novel XR interfaces offer dynamic 3D visualizations in real-time, enhancing user experience. The approach extends beyond individual protection by interconnecting CyberSecDomes, forming a virtual “Global CyberSecDome” for entire digital infrastructures. This network facilitates collaboration, threat identification, and the development of comprehensive response strategies. Privacy-aware Information and Knowledge Sharing tools ensure secure data exchange, adhering to robust security and privacy requirements.<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/CyberSecDome-Overview.png” title_text=”CyberSecDome Overview” align=”center” _builder_version=”4.23″ _module_preset=”default” custom_margin=”80px||||false|false” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.23″ _module_preset=”default” text_font=”|800|||||||” text_font_size=”1.5rem” header_2_font=”|800|||||||” text_orientation=”center” width=”100%” custom_margin=”||||false|false” global_colors_info=”{}”]<\/p>\n
CyberSecDome Overview<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.23″ _module_preset=”default” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23″ _module_preset=”default” width=”90%” max_width=”1920px” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/Technical-Architecture-of-CyberSecDome.png” title_text=”Technical Architecture of CyberSecDome” _builder_version=”4.23″ _module_preset=”default” width=”80%” module_alignment=”center” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.23″ _module_preset=”default” text_font=”|800|||||||” text_font_size=”1.5rem” header_2_font=”|800|||||||” text_orientation=”center” width=”100%” custom_margin=”||||false|false” global_colors_info=”{}”]<\/p>\n
Technical Architecture of CyberSecDome<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” background_layout=”dark” custom_margin=”||||false|false” global_colors_info=”{}”]<\/p>\n
On the left side, the diagram illustrates <\/span> outlines the technical architecture of CyberSecDome’s main building blocks. The workflow involves the digital infrastructure as the starting point, creating a virtual infrastructure through Digital Twin-based Cyberrange for safe user interaction. Network data from both infrastructures is streamed to the first AI-Empowered Security tool, Intrusion Detection and Prediction (IDP), which analyzes data for abnormal behaviors. The Incident Investigation tool investigates detected incidents, feeding information to Dynamic Risk Analysis and Automated Pen-Testing tools.<\/p>\n Automated Pen-Testing performs attacks based on incidents, and Dynamic Risk Analysis assesses risks to critical functions. Dynamic and Adaptive Intrusion Response (DAIR) operationalizes insights, initiating automated processes for effective incident handling. The VR-Interface provides a live cybersecurity overview, supporting CyberSecDomes in evaluating defense strategies.<\/p>\n For collaborative incident detection and response, the Threat Information Sharing tool shares threat intelligence. The AI-Knowledge Sharing tool shares AI models without disclosing private training information. Each component plays a vital role in enhancing CyberSecDome’s cybersecurity capabilities.<\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" Concept\u00a0The CyberSecDome offers a proactive solution for safeguarding digital infrastructures from cyber threats. With a protective layer for diverse systems, from individual devices to enterprise networks, it consists of four core building blocks\u2014Digital Infrastructure, Virtual Infrastructure with digital twins, AI-Empowered Security Tools, and a VR-based Interactive Collaborative User Interface. This ensures continuous operations despite potential […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-300","page","type-page","status-publish","hentry"],"yoast_head":"\n