WP1 – Project Management

 Coordinated by
UNINOVA (M01-M36)

Objective

The aim is to ensure timely and efficient project execution, according to the budget and the overall project objectives. This includes, but is not limited to:
• Coordination of the technical activities and linking together all project components
o Proactive management of project plan, scope and objectives
o Tracking of Milestones, Deliverables, Reporting towards the Commission
•The overall legal, contractual, ethical, financial and administrative management o Administration of Financial Management towards the Commission o Monitor relevant rules and regulations related to the project to be properly implemented o Handle IPR and Knowledge Management
• Maintaining communication within the project as well as with the European Commission

Deliverables

  • D1.1 Reporting towards the EU WP1 (1 – UNINOVA) Report Confidential, only for members of the consortium (including the Commission Services) M18
  • D1.2 Project Quality Manual WP1 (1 – UNINOVA) Report Public M4
  • D1.3 Data Management Plan WP1 (1 – UNINOVA) ORDP: Open Research Data Pilot Public M6
  • D1.4 Update of Data Management Plan WP1 (1 – UNINOVA) Report Public M32
  • D1.5 Risk Analysis WP1 (11 – IFEVS) Report Confidential, only for members of the consortium (including the Commission Services) M18
  • D1.6 Risk Analysis Final Report WP1 (11 – IFEVS) Report Confidential, only for members of the consortium (including the Commission Services) M30
  • D1.7 Reporting towards the EU – Final Version WP1 (1 – UNINOVA) Report Confidential, only for members of the consortium (including the Commission Services) M36

Results

Fuzzing Tool

Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding outputs.

ResilBlockly

This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This