Blog

Within a large and complex network environment, such as healthcare infrastructures, hundreds, if not thousands heterogeneous network-enabled entities (devices and services) enter or leave the network. These entities, apart from largely widening the management surface of the underlying infrastructure, also bring several vulnerabilities in multiple...

In 2001, Mirca R. Endsley defined Situation Awareness (SA) as the key to providing information, because the problem is no longer lack of information, but finding what is needed when it is needed. Over the years, SA has been defined in several complementary ways, most...

Continue from Part II In SPHINX building blocks, the technical consortium members are joining efforts to deliver twenty-one key components according to their expertise. Below, the components are presented: Sandbox (SB) A Sandbox provides a safe and isolated testing environment where components can be deployed without compromising any...

Continue from Part I In SPHINX building blocks, the technical consortium members are joining efforts to deliver twenty-one key components according to their expertise. Below, the components are presented: Forensic Data Collection Engine (FDCE) The Forensic Data Collection Engine (FDCE) is a component led by NTUA and is...

Continue from blog entry SPHINX Use Cases: Part VII Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Theft of Hospital Equipment Description: In a hospital’s psychiatric ward,...

The SPHINX solution is featuring a modular architecture, which comprises 5 building blocks. These modules entail a series of components each one of them implementing a specific capability of SPHINX. In this context, the main architectural building blocks should be elaborated on a decomposed perspective...

Continue from blog entry SPHINX Use Cases: Part VI Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Exploiting Remote Patient Monitoring Services Description: A patient undergoes a...

SPHINX project labels the cybersecurity threats that a healthcare organisation may face as an outcome of either a malicious action (i.e. malware, hijacking, data theft, DoS/DDoS), a human error (configuration error, unauthorized access, BYOD), a system failure (i.e. overload, software and/or firmware failure, outdated systems),...