Technical Approach

The evolution and deeper penetration of Artificial Intelligence into our interconnected world leads the development of data- and resource-intensive applications, running on dispersed, interconnected cloud, edge and IoT infrastructures.

CyberNEMO aims to infuse end-to-end cybersecurity and trust on the IoT-Edge-Cloud-Data Computing Continuum. CyberNEMO delivers innovations that support resilience, risk preparedness, awareness, detection and mitigation within Critical Infrastructures deployments and across supply chains on top of ΝΕΜΟ (Next Generation Meta OS – HE 101070118), which manages the IoT-Edge-Cloud continuum, through an open-source, flexible, adaptable, and multi-technology meta-Operating System.

CyberNEMO will offer end-to-end and full stack protection, ranging from a low level Zero-Trust Network Access layer up to a human AI explainable Situation Perception, Comprehension & Protection (SPCP) framework and tools, collaborative micro-cervices Auditing, Certification & Accreditation and a pan-European Knowledge Sharing, risk Assessment, threat Analysis and incidents Mitigation (SAAM) collaborative platform.

GettyImages-1328602525

In a nutshell

  • End-to-end Cybersecurity to NEMO Meta-OS
    • Cybersecurity, resilience, trust, privacy and policy enforcement 
    • AI-based cybersecurity threats preparedness, awareness, detection and mitigation 
    • Optimized for the IoT- Edge-Cloud-Data Computing Continuum
    • High availability, scalability & adaptability
    • Development & deployment simplicity
  • Secure integration of self-aware, (semi-) autonomous entities

    • On-device Zero Trust Federated Machine Learning “as a service”
    • AI-based attack detection
    • Moving Target Defence IoT systems
  • Internet-native Zero Trust Network Access (ZTNA)
    • cybersecurity and zero-trust mechanisms via 5G/6G (micro-) slices and ad-hoc network topology attestation
    • “by design” self-healing/zero-delay failback
    • AI-based traffic filtering
  • Secure Access Service Edge
    • secure integration of untrusted IoT
    • AI-based Firewall as a Service
    • Cybersecure DNS
  • Cybersecure Situation Perception, Comprehension and Protection
    • state awareness and mitigation 
    • Cyber threat intelligence for the anticipation of cyber risks and vulnerabilities
    • Human-explainable AI (XAI) and Intelligence Amplification
  • PRESS (Privacy, data pRotection, Ethics, Security & Societal) framework
    • Computing Continuum role-based access for transactions verification and validation
    • Data provenance verification and data loss prevention
    • Zero knowledge and zero trust validations of data transactions 
  • Evidence-based Certification & Accreditation assurance
    • collaborative evidence-based micro-services cybersecurity certification 
    • (micro-)service cybersecurity auditing 
  • Cross-domain/cross-border Knowledge Sharing, Risk Assessment, Threat Analysis and Incidents Mitigation 
    • Enhanced protection against cybersecurity threats and complex attacks 
    • Advanced AI and data technologies to assess cybersecurity risks and increase CC preparedness
    • Inter-DLT based, federated & synchronized, cyber risk assessment and common state awareness
  • Cybersecurity in Critical Infrastructures & across supply chains Secure Execution Environment(SEE)
    • Living Labs in key verticals (energy, water, health, media, farming, logistics) 
    • Smart and quantifiable security assurance and certification shared across the EU
    • Building a culture of Cybersecurity