{"id":640,"date":"2023-11-24T13:54:19","date_gmt":"2023-11-24T13:54:19","guid":{"rendered":"http:\/\/sites.itml.gr:9988\/?page_id=640"},"modified":"2023-12-01T09:52:16","modified_gmt":"2023-12-01T09:52:16","slug":"work-packages","status":"publish","type":"page","link":"http:\/\/sites.itml.gr:9988\/work-packages\/","title":{"rendered":"Work Packages"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.23″ _module_preset=”default” custom_padding=”||0px||false|false” locked=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_padding=”0px||0px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_2_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_padding=”||||false|false” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
The project is structured in phases:<\/strong><\/p>\n [\/et_pb_text][et_pb_accordion _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_accordion_item title=”(i) Design, Development, and Integration Phase (WP2, WP3 & WP4):” open=”on” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Focuses on designing and developing the three major building blocks of the CyberSecDome approach.<\/p>\n [\/et_pb_accordion_item][et_pb_accordion_item title=”(ii) Deployment and Evaluation Phase (WP5):” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}” open=”off”]<\/p>\n Involves the pilot operation and concurrent evaluation activities to assess outcomes. It will produce policy recommendations for public authorities, addressing regulatory aspects of cybersecurity, and evaluate legal and ethical issues.<\/p>\n [\/et_pb_accordion_item][et_pb_accordion_item title=”(iii) Horizontal Activities (WP1 and WP6):” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}” open=”off”]<\/p>\n Encompass project management (WP1) and impact maximization (WP6) activities throughout the project duration. WP6 reports qualitative and quantitative results from real-field settings and assesses CyberSecDome’s impact.<\/p>\n [\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/CyberSecDome-WPs-Flows-Interdependencies.png” title_text=”CyberSecDome WPs Flows & Interdependencies” _builder_version=”4.23″ _module_preset=”default” custom_margin=”12%||||false|false” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.23″ _module_preset=”default” custom_margin=”0px||||false|false” custom_padding=”0px||||false|false” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”1_4,3_4″ module_id=”wp1″ _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset3″ global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/creative-marketing-icon-8.png” title_text=”creative-marketing-icon-8″ align=”center” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n WP1 aims to establish and maintain the administrative, financial, and management infrastructure of the CyberSecDome project. Key objectives include effective project management, initiation of project phases, supervision of scientific and technical progress, monitoring of project development, and establishment of communication channels among partners. Additionally, WP1 focuses on continuous risk and opportunity management throughout the project, along with ensuring compliance with ethics, privacy, and data protection guidelines.<\/span><\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp2″ _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset3″ global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/creative-marketing-icon-7.png” title_text=”creative-marketing-icon-7″ align=”center” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n WP2 aims to analyze requirements for effective cybersecurity measures in digital infrastructures. Objectives include progress beyond the state-of-the-art solutions, stakeholder requirements analysis, defining use-cases and attack scenarios, addressing legal and ethical considerations, and proposing the high-level architecture and functional requirements of CyberSecDome.<\/span><\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp3″ _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset3″ global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/creative-marketing-icon-4.png” title_text=”creative-marketing-icon-4″ align=”center” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n WP3 focuses on developing AI-empowered security tools for direct communication, ensuring cybersecurity in digital infrastructures and streaming network information. Key objectives include collecting and updating information on cybersecurity threats, live training of AI models, building modern AI intrusion detection and prediction modules, implementing tools for internal information analysis from specific incidents, developing AI pen-testing automation based on high-risk assessments, and creating an AI-based tool for dynamic responses and solutions to cybersecurity issues.<\/span><\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp4″ _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset3″ global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/creative-marketing-icon-10.png” title_text=”creative-marketing-icon-10″ align=”center” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n into the pilot CyberSecDome system. It includes developing an immersive user interface for cybersecurity tasks, enhancing understanding of AI operation, introducing knowledge sharing between CyberSecDome instances, implementing swarm learning for improved cybersecurity operations, and combining and maturing all components, including integration, testing, delivery, and tuning of the CyberSecDome.<\/span><\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp5″ _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset3″ global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/creative-marketing-icon-6.png” title_text=”creative-marketing-icon-6″ align=”center” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n WP5’s main objective is to manage, design, and execute financial support for CyberSecDome to engage third parties. Specifically, it will develop an Open Call methodology to attract cross-sector and cross-border third parties to join CyberSecDome deliveries. The goal is to define and publish the Open Call, execute a transparent process for engaging external experts, and evaluate third-party proposals. The Open Call, conducted in two rounds, follows the project’s methodology, involving activities like specifying objectives, preparing and publishing actions, managing and assessing winning proposals, and continuously promoting Open Call evolution to wider audiences.<\/span><\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp6″ _builder_version=”4.23″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset3″ global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2023\/11\/creative-marketing-icon-12.png” title_text=”creative-marketing-icon-12″ align=”center” _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n WP6 aims is to develop & execute a dissemination-communication strategy to maximise the visibility of CyberSecDome and its results, also develop the project exploitation strategy (including IPR definition) to ensure the sustainability and long-term impact of the technical and scientific outcomes and produce the business model canvases of the Key Exploitable Results (KERs). In addition, WP6 aims to monitor and follow the regulations and standards in the European landscape to promote CyberSecDome certification technology towards standardisation efforts. Finally, development of a business plan for the project\u2019s tangible outcomes.<\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" The work planned in the CyberSecDome project will be carried out in six (6) work packages (WPs).The project is structured in phases:Focuses on designing and developing the three major building blocks of the CyberSecDome approach.Involves the pilot operation and concurrent evaluation activities to assess outcomes. It will produce policy recommendations for public authorities, addressing regulatory […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-640","page","type-page","status-publish","hentry"],"yoast_head":"\nWP 1 | Project Management<\/span><\/h3>\n
WP 2 | Requirements, Evaluation Metrics and Architecture<\/span><\/h3>\n
WP 3 | Specifications and Development of AIEmpowered Security Tools<\/span><\/h3>\n
WP 4 | VR, XAI, Information Sharing and Integration of CyberSecDome<\/span><\/h3>\n
WP 5 | Pilots\u2019 Development and Evaluation of CyberSecDome<\/span><\/h3>\n
WP 6 | Dissemination, Exploitation and Sustainability<\/span><\/h3>\n