Powered by OpenAIRE graph
Found an issue? Give us feedback

ProTego

Data-protection toolkit reducing risks in hospitals and care centers
Funder: European CommissionProject code: 826284 Call for proposal: H2020-SC1-FA-DTS-2018-1
Funded under: H2020 | RIA Overall Budget: 4,457,720 EURFunder Contribution: 4,457,720 EUR
visibility
download
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
854
589
Description

Health care is an essential service that uses a great deal of sensitive personal data which has a high black market value being a lucrative target for data theft and ransomware attacks.The EU NIS Directive (EU 2016/1148) and GDPR (EU 2016/679) will harmonize and improve information security in Europe. Both require relevant ICT infrastructure operators to perform risk assessments, introduce appropriate security measures to manage identified risks, and report security breaches. Unfortunately, risk-based approaches are notoriously difficult to implement in a consistent and comprehensive fashion. They depend on a high level of understanding of both cybersecurity and of the system or network to be protected, are labour intensive and costly and typically done by small teams. This is increasingly inappropriate as health care providers introduce IoT systems, cloud services and (in the near future) 5G networks to provide services in which patients are more engaged, may own some of the devices used, and want access in hospitals, on the move or at home. The ProTego project will develop a toolkit and guidelines to help health care systems users address cybersecurity risks in this new environment by introducing 3 main advances over current approaches: Extensive use of machine intelligence: a combination of machine inference exploiting a priory knowledge for security-by-design, and machine learning from data for run-time threat detection and diagnosis; Advanced data protection measures: advanced encryption techniques and hardware based full memory encryption, and multi-stakeholder IAM to control access to and by user devices, to protect data at rest and provide ultra-secure data exchange portals; Innovative protocols for stakeholder education: using security-by-design analysis to target training and support stakeholders to contribute to networok overall security.The toolkit will be integrated and validated in IoT and BYOD-based case studies at two hospitals.

Data Management Plans
  • OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 854
    download downloads 589
  • 854
    views
    589
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback

Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.

All Research products
arrow_drop_down
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda__h2020::48b58e5d4bdbb252e722af735490c5dc&type=result"></script>');
-->
</script>
For further information contact us at helpdesk@openaire.eu

No option selected
arrow_drop_down