Objectives of the FORTIKA project
In order for FORTIKA to successfully realize its vision, a set of objectives are set, covering the project’s scientific, and technological aspects throughout its duration as well as the exploitation of the project’s results after its end. The overall project success will be defined by the efficiency and effectiveness of the appropriate synthesis, as well as the individual quality of the specific achievements related to the project’s objectives, clearly measured by the indicators defined in Section 1.1.3 (Key Performance Indicators). The FORTIKA objectives are described in what follows:
- Objective 1: To provide an embedded, smart and robust security layer enhanced with an adaptive data security management tool. FORTIKA will design and manufacture a trusted low-cost modular smart middleware security accelerator with the aim to facilitate the deployment of new generation cyber security solutions in micro, small and medium-sized businesses (SMEs). To accomplish this, the FORTIKA security accelerator will: (a) incorporate security by design and advanced encryption capabilities, (b) provide the required processing power and storage capacity to perform in small businesses characterized by limited resources and specialist expertises, and (c) allow the provision of a wide range of B2B cyber security services.
- Objective 2: To create a B2B cyber security marketplace for SMEs to allow easy access to peer reviewed, existing, trusted solutions and comparative data on the basis of functional characteristics and pricing. The marketplace will address usability and interoperability issues and organize available cyber security products / services according to various user needs. Particular SMEs will be able to customize / package security services through the marketplace and ideally form suitable security management solutions. For this purpose, they may utilize a variety of existing products / services from a wide range of security solution providers.
- Objective 3: To provide tailored cyber security insights in line with each SME needs. Tailored security services are highly sensitive to the context and the requirements of the user, and a service may not require the same level of adaptation. Different levels of adaptation are needed in ICT services, which are highly dependent on types of service and user’s requirements. FORTIKA aims to embed an innovative architecture to fulfil the following purposes: (a) scrutable user-side personalization with dynamic privacy control by exploiting a predefined (by the user) configuration and (b) re-usability of the parts of a user model across different services.
- Objective 4: To offer a novel architecture for the provision of highly adaptive cyber security services and intelligence dynamically adjusted to the changing needs of SMEs. Such intelligence will be gathered (anonymized) and (semi-) automatically processed at central level to draw good practices, threat updates and lessons learned. These results may then be communicated to the SMEs (filtered according to their profiling), and can be introduced into smart contracts at enterprise network level.
- Objective 5: To apply behavioral analysis to detect and assess the risk level from organizational processes and/or individual behaviors with the aim to automatically implement appropriate incentives for behavioral change and awareness enhancement. Persisting risk-prone behavior and/or behavioral patterns will be identified and communicated to authorized personnel and the management of the enterprise to trigger appropriate organizational changes that can potentially have a remedial effect.
- Objective 6: To validate the proposed technology and business framework through pan-European demonstrations in small SMEs. The operational properties of the proposed cyber-security ecosystem and overall solution will be validated and evaluated against performance, effectiveness and usability indicators. Enterprises participating in the project’s pilots will deploy and evaluate the solution at business as usual and emergency situations across various business operations. Use cases will be supported by different cyber security architectures, which will be classified according to the operation mode. For enterprises and business processes with a low level of digitization, a lightweight standalone smart router with embedded security functionalities and a simple GUI will be presented. In more complex enterprise information systems and fully digitized processes the use of advanced architectures (e.g. a number of routers with a centralized management engine) and more sophisticated functionalities will be demonstrated.
- Objective 7: To perform all required activities, e.g. formulate the appropriate business models and settle IPR procedures for pushing the outcome of this action (an integrated operational/information exchange Platform/Portal/Marketplace) as a commercial product in the relevant SME market, in order to improve overall cybersecurity performance of modern, digital SMEs ecosystem and to create a seamless and secure information system by offering a wide variety of tailored information security services.