Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Other literature type . 2024
License: CC BY
Data sources: ZENODO
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Other literature type . 2024
License: CC BY
Data sources: ZENODO
ZENODO
Project deliverable . 2024
License: CC BY
Data sources: Datacite
ZENODO
Project deliverable . 2024
License: CC BY
Data sources: Datacite
ZENODO
Project deliverable . 2024
License: CC BY
Data sources: Datacite
ZENODO
Project deliverable . 2024
License: CC BY
Data sources: Datacite
versions View all 4 versions
addClaim

D2.2 Report on Training and Cyber-range capabilities and requirements

Authors: Floros, Evangelos; Petrakis, Ioannis; Vasilaki, Irini; Katsifarakis, Manolis;

D2.2 Report on Training and Cyber-range capabilities and requirements

Abstract

This Deliverable focuses on collecting cyber security training requirements and identifying the training needs of different stakeholders (coming from the targeted critical sectors of telecom, energy, healthcare, and maritime) at national, regional, and European level. To achieve this, a systematic requirements elicitation approach will be established, having a two-fold focus: a) to identify the requirements and specific needs of the participating stakeholders, which represent different critical sectors and with different needs with regard to IT security; and b) to substantially engage the external stakeholders so as to gain feedback regarding their needs and priorities in the frame of the project, through the realization of interviews with their users expressing significant interest on the project’s technologies and vision, and through the large-scale circulation of structured questionnaires, utilizing the dissemination channels of the participating partners. These requirements will be used for the customization of the Cyber Range Platform (T2.4 and WP4) and the establishment of the training programs and the specification of the training scenarios (WP3), which must demonstrate these requirements. This Deliverable will also include a preliminary analysis of Cyber-range training requirements imposed by the existing national and European legal and regulatory framework and regime (e.g. (NIS Directive and the General Data Protection Regulation (GDPR)). The identification of relevant sets of legislation (e.g. regarding data protection, privacy and security) and ethical principles will lead to a high-level description of provisions which will need to be taken into account in the course of the project and the development of all the cyber range training outcomes within. The aim of this Deliverable is to depict all relevant frameworks in order to assure that differing legal and regulatory constraints and internationally agreed standards for security, privacy and data protection are met. The deliverable will also include appropriate Key Performance Indicators (KPIs). 

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green