SCOTT NO meeting Measurement

Slides:



Advertisements
Similar presentations
0 DOD/DT/CEDCV – 20 th & 21 st January Paris meeting SAGEM RTD Activities C2-Sense project Paris – 20 & 21 January 2015.
Advertisements

BENEFITS OF SUCCESSFUL IT MODERNIZATION
Patch Management Strategy
Transfer Payment and Financial Reporting Branch Ministry of Education Implementation of Tangible Capital Asset (TCA) Reporting TPFR Information Sessions.
2010 W EST V IRGINIA GIS C ONFERENCE Wednesday, June 9, 2010.
Developing the Fine Particulate Matter Response. Developing the Response – Air Physical System.
Scott Butson District Technology Manager. Provide professional to all district staff Professional development has been provided on a regular basis to.
PDS4 Project Report PDS MC F2F University of Maryland Dan Crichton March 27,
Baseline The baseline at July Previously there was a lack of consistency for: Pathways into specialist clinics; Policies, procedures and guidelines.
Project Execution Methodology
Jan 2016 Solar Lunar Data.
August ICA Agenda Time Topic 8:00 – 8:15
Mini Global Demonstration
Release Timeline Discussion R2 and beyond
August LNBA Agenda Time Topic 1:00 – 1:15
IDN Variant TLDs Program Update
OSEP Project Directors Meeting
2018 Safety Group 1 – 5 Year Program Timeline Guide

Decision Handbook [Organisation(s) and decision / project]
Smart City Interoperable Reference Architecture (SCIRA) Next Steps
Annex 5: Milestones Action Determine sticker label design / features
2017 Safety Group 1 – 5 Year Program Timeline Guide
Hydrographic Data as a Service
Review of the project OLD CHALLENGES, NEW PATHWAYS:
Q1 Q2 Q3 Q4 PRODUCT ROADMAP TITLE Roadmap Tagline MILESTONE MILESTONE
Practical Software Engineering
2009 TIMELINE PROJECT PLANNING 12 Months Example text Jan Feb March
2019 Safety Group 1 – 5 Year Program Timeline Guide
2018 Advantage Program Timeline Guide
Group Meeting Ming Hong Tsai Date :
Work plan and next steps – RDE-LDV working group
Back-End Payor Sub-Group
Secure COnnected Trustable Things
Safety Group Program Timeline
GN2 JRA5 Roaming and Authorisation Jürgen Rauschenbach, DFN-Verein
Decision Handbook [Organisation(s) and decision / project]
2014 Advantage Program Timeline Guide *** Progress Visits ***
2014 Advantage Program Timeline Guide *** Progress Visits ***
Grouping Programs by Market Sector

Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Q1 Q2 Q3 Q4 PRODUCT ROADMAP TITLE Roadmap Tagline MILESTONE MILESTONE
NEMSIS V3.5.0 Timeline developed at NEMSIS Annual Meeting 2017
2017 Advantage Program Timeline Guide
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Software Update - Type approval related issues -
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
2016 Safety Group 1 – 5 Year Program Timeline Guide
Text for section 1 1 Text for section 2 2 Text for section 3 3
Albeado - Enabling Smart Energy

TIMELINE NAME OF PROJECT Today 2016 Jan Feb Mar Apr May Jun
Safety Group Program Timeline
2012 Safety Group 1 – 5 Year Program Timeline Guide
2012 Safety Group Advantage Program Timeline
2012 Safety Group Advantage Program Timeline
2009 TIMELINE PROJECT PLANNING 12 Months Example text Jan Feb March
WECC Scenario Task Force (WSTF)
2013 Safety Group Advantage Program Timeline
XRN 4927 – MiR Drop 4 - Status Update
Q1 Q2 Q3 Q4 PRODUCT ROADMAP TITLE Roadmap Tagline MILESTONE MILESTONE
LIU Wirescanners software
2016 Advantage Program Timeline Guide
Presentation transcript:

SCOTT NO meeting Measurement Presentation title 10.02.2010 Toktam Ramezani 30/11/2017

Topics Assessment of technology Measurable security and labeling Relation to SP1- SP2- SP3 Suggestion Measurable security and labeling Application in UC Theory UiO PM 2017-11-30 SCOTT

Apssessment levels for BB Definition of assessment levels for BB implementation Calculation of scores 2017-11-30 SCOTT

SP1 Timeline Update of BB descriptions TODAY In parallel: SCOTT specification and implementation (BBs, UCs) D1.1 D2.1 D3.1 Requirement entry on SharePoint – Iteration 1 D4.1 D5.1 March 1, 2018, Deadline for Y1 assessment D1.2 Alignment on TL level Alignment on SCOTT level D2.2 D3.2 D4.2 Requirement entry on SharePoint – Iteration 2 D1.4 D5.2 Alignment on TL level, Iteration 2 Alignment on SCOTT level Y1 Assessment D1.3 June 1, 2017 July 1, 2017 Aug 1, 2017 Sep 1, 2017 Oct 1, 2017 Nov 1, 2017 Dec 1, 2017 Jan 1, 2018 Feb 1, 2018 Mar 1, 2018 Apr 1, 2018 May 1, 2018 June 1, 2018 July 1, 2018 Aug 1, 2018 Sep 1, 2018 t 2017-11-30 SCOTT

SCOTT Structure / Assessment TL A Security and Safety TL B Distributed Cloud Integration UC WP7 UC WP8 UC WP9 UC WP21 TL C Autonomy / Energy Efficiency TL D Reference Architect. Demos … BB A.1 BB A.2 BB A.x RQ A1.1 RQ A1.2 RQ A1.x BB B.1 BB B.2 BB B.x RQ B1.1 RQ B1.2 RQ B1.x BB C.1 BB C.2 BB C.x RQ C1.1 RQ C1.2 RQ C1.x BB D.1 BB D.2 BB D.x RQ D1.1 RQ D1.2 RQ D1.x Demo a - TBD Demo b - TBD UC Score = z Requ. 1, Score = 1 Requ. 2, Score = 2 1 BB has x requirements Requ. 3, Score = 3 Requ. 4, Score = 4 Requ. 5, Score = 1 Requ. 6, Score = 2 BB Score = y Requ. 7, Score = 3 Requ. 8, Score = 4 Assessment on 3 levels Individual requirements BB UC We will use a bottom-up approach  In the following we focus on the assessment of individual requirements 2017-11-30 SCOTT

Tracking implementation progress Requirements tracking scale UC activities beyond BB? Proposal 1 – Draft proposal in D1.1 Proposal 2 – Adding more granularity Proposal 3 – Normalize values 6 Confirmed/validated by UC 100% 4 Verified by lead UC(s) (at least by one lead UC) 5 Integrated in UC demonstrator; method considered in demonstrator 90% 3 Implemented on BB level Fully implemented on BB level (to be documented in M32 in D23.5, D23.6, D24.3, D25.3, D26.3) 75% to be aligned with SP3 / M32 in D23.5, D23.6, D24.3, D25.3, D26.3) 2 Partly implemented (i.e. implementation ongoing) Implemented on BB level to large extent (to be documented in M22 in D23.3, D23.4, D24.2, D25.2, D26.2) 50% Implemented on BB level to large extent (to be aligned with SP3 / M22 in D23.3, D23.4, D24.2, D25.2, D26.2) Implemented on BB level to small extent (to be documented in M12 in D23.1, D23.2, D24.1, D25.1, D26.1) 25% (to be aligned with SP3 / M12 in D23.1, D23.2, D24.1, D25.1, D26.1) 1 Implementation planned for commercial product after SCOTT completion (i.e. not implemented in prototype, but important) 10% Not implemented 0% 2017-11-30 SCOTT

What does the scale mean for different requirement types? Requirements may belong to BBs of different type SW component to build a SW-tool a system or a product HW component to build a system or a product Tool or a tool chain Interface Standard Methodology (for SW and/or HW development) Process, Profile, Service, Means for establishing cross-domain interoperability Other, e.g. guideline Implementation-specific requirements (rather functional requirements, i.e. what the system should do) Implementation of prototype Design decisions of prototype Characteristics of final implementation Methodology / interoperability requirements (rather non-functional requirements, i.e. how the system performs the function) Compliance to methodology / process / standard SCOTT 2017-11-30

Topics Assessment of technology Measurable security and labeling Relation to SP1 (SCOTT SP1 Call)- SP2- SP3 Suggestion: Each BB may have a progress report (might be missed) Describing any individual progress – Per UC at least for the lead UC Measurable security and labeling Theoretical Practical in UC UiO PM 2017-11-30 SCOTT

Security metrics and measurment VULNERABILITY METRICS Attacks, and Situations DEFENSE METRICS 2017-11-30 SCOTT

VULNERABILITY METRICS Past and future Metrics Metrics for Measuring Severity of Individual Software Vulnerabilities. Categories of metrics: Base metrics (including exploitability and impact), Attack vector (vulnerability can be exploited remotely, locally, with/out or physical access to the computer), required conditions to a successful attack,… Temporal metrics, Exploit code maturity, Remediation level, … Historically exploited vulnerability metric, Metrics for measuring vulnerability lifetime (Server, Cloud-end) future Metrics Environmental metrics. 2017-11-30 SCOTT

Sub-ontology metrics - temporal characteristics of vulnerabilities 2017-05-22/23 SCOTT

A summary The vast variety of approaches: Open challenges: From graph-based To game theory Open challenges: In theory In practice In approaches 2017-11-30 SCOTT

Topics Assessment of technology Measurable security and labeling Relation to SP1 (SCOTT SP1 Call)- SP2- SP3 Suggestion: Each BB may have a progress report (might be missed) Describing any individual progress – Per UC at least for the lead UC Measurable security and labeling Theoretical Practical in UC Suggestion: A light-wait risk assessment for lead UC UiO PM (SCOTT No, SP3, Leading BBs, Partner BBs, 20 WPs,... ) 2017-11-30 SCOTT

Questions? toktamr@ifi.uio.no www.scottproject.eu

UiO PM 23.C: SCOTT-HW supported security mechanisms 23.N: SCOTT-SCOTT Security Library SCOTT-SCOTT Security Core – Identification, authentication and secure communication 23.R: SCOTT-Trust Anchor and Trust Indicator for ES and smart sensors SCOTT-Remote Configuration of Infrastructure SCOTT-Mobile Edge Computing 1 UiO-WP1, 2 UiO-WP2, 3 UiO-WP3, 4 UiO-WP5, 5 UiO-WP6, 6 UiO-WP7, 7 UiO-WP8, 8 UiO-WP9, 9 UiO-WP13(2), 10 UiO- WP14(2), 11 UiO-WP15(3), 12 UiO-WP21, 13 UiO-WP22, 14 UiO-WP23, 15 UiO-WP24, 16 UiO-WP26, 17 UiO-WP29, 18 UiO-WP30(4) 46/36/ 2017-05-22/23 SCOTT