{"id":196224,"date":"2024-09-17T09:22:21","date_gmt":"2024-09-17T07:22:21","guid":{"rendered":"https:\/\/www.rse-web.it\/rapporti\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/"},"modified":"2024-09-17T09:25:19","modified_gmt":"2024-09-17T07:25:19","slug":"ict-security-and-assurance-for-enabling-components-and-technologies-insights","status":"publish","type":"rapporti","link":"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/","title":{"rendered":"ICT Security and Assurance for Enabling Components and Technologies: Insights"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>The results of a study on specific aspects of cybersecurity in the context of 5G, SCADA (Supervisory Control And Data Acquisition) and blockchain are reported. The study aims to provide electricity system stakeholders with elements to assess the maturity of 5G systems in terms of security specifications and related controls, to manage the constraints imposed on SCADA systems by national legislation on the security of critical infrastructure, and to assess the potential of blockchain systems for authenticating public keys of IoT (Internet of Things) devices. The study expands and develops a previous preliminary study limited to 5G and SCADA systems. <\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[1344,1579,1341,1330,1315,1379],"targets":[1317],"rapporti_tipologie":[762],"class_list":["post-196224","rapporti","type-rapporti","status-publish","hentry","tag-cybersecurity-en","tag-ict-en","tag-infrastructure","tag-security-en","tag-smart-grids-en","tag-technologies-and-components","targets-research","rapporti_tipologie-report-en"],"acf":{"projects":{"ID":191051,"post_author":"464","post_date":"2024-07-10 16:51:29","post_date_gmt":"2024-07-10 14:51:29","post_content":"","post_title":"Application of Information Technology, Internet of Things, Peer-to-peer, to the electrical system in order to improve security and resilience","post_excerpt":"The project develops methods, tools, demonstrators and experiments to evaluate the application potential of the latest information and communication technologies for the benefit of the electro-energy system.","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience","to_ping":"","pinged":"","post_modified":"2024-08-09 15:59:29","post_modified_gmt":"2024-08-09 13:59:29","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.rse-web.it\/progetti\/application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience\/","menu_order":0,"post_type":"progetti","post_mime_type":"","comment_count":"0","filter":"raw"},"order_posts":"","dont_show_search":false,"related_posts":false,"dont_show_hompage":false,"show_on_slider":false,"single_post_data":{"titolo_spot":"","post_content":"<p>In the context of 5G systems, an analysis of the security issues related to the concepts of Network Function Virtualization (NFV) and Network Slicing was carried out. Furthermore, in view of the specific innovations introduced in the 3GPP (3rd Generation Partnership Project) and GSMA (Global System for Mobile communications Association) contexts for the security assessment of real 5G components, the revision (carried out in the preliminary study) of the SECAM (SECurity Assurance Methodology) and the corresponding NESAS (Network<\/p>\n<p>Equipment Security Assurance Scheme) have been significantly updated. Finally, the analysis of vulnerabilities in the 3GPP security specifications (started in the preliminary study) was extended. The in-depth study for 5G systems allows a precise assessment of the level of security currently achievable by a 5G access network. However, it is not sufficiently specified how to approach the security assessment of real components, especially in the case of virtualized components (based on the NFV paradigm). In the context of SCADA systems, the revision of the national legislation on the National Cyber Security Perimeter (Law 133\/2019 and subsequent provisions) has been updated as far as possible (given the delays in the preparation of the relevant standards), especially with regard to the requirements for the acquisition of components to be included in the perimeter itself. Furthermore, a review of the risk assessment methods used\/proposed for the SCADA context<\/p>\n<p>was carried out and the review (started in the preliminary study) of the vulnerabilities of (components of) SCADA systems was integrated. Finally, the preliminary definition of a risk analysis methodology related to the acquisition (of components) of SCADA systems in the National Cyber Security Perimeter was made. The proposed methodology will be developed in the future according to the evolution of the reference legislation. In the context of blockchain systems, an initial study was carried out on the potential of these systems for defining solutions to the problem of authenticating the public keys of IoT devices. The specialized literature dedicated both to the use of digital certificates and PKI (Public Key Infrastructure) (classical solutions for the authentication of public keys) in the IoT context, and to the authentication of public keys of devices based on Blockchain systems was reviewed. Some proposals for the authentication of devices (preferably of the IoT type) based on Blockchain were examined in detail. The results of the analyses will be used in the continuation of the activity to configure an appropriate experimental setup.<\/p>\n","link_estreno":false,"scarica_file":[{"download_option":"download","file_name":"Download Report","download":{"ID":166659,"id":166659,"title":"20010481","filename":"20010481.pdf","filesize":7091025,"url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2022\/05\/20010481.pdf","link":"https:\/\/www.rse-web.it\/en\/rapporti\/sicurezza-ict-e-assurance-per-componenti-e-tecnologie-abilitanti-approfondimenti\/attachment\/20010481\/","alt":"","author":"93","description":"","caption":"","name":"20010481","status":"inherit","uploaded_to":166658,"date":"2022-05-13 07:42:59","modified":"2022-05-13 07:42:59","menu_order":0,"mime_type":"application\/pdf","type":"application","subtype":"pdf","icon":"https:\/\/www.rse-web.it\/wp-includes\/images\/media\/document.png"}}],"button":{"text":"","link":""},"referente_group":false,"data_emissione":"2020-12-30","autori":"G. Dondossola (RSE S.P.A), V. Bagini, N. Cardamone, F. D. Tanasache, F. Guida, R. Menicocci, M. Orazi, G. Vecchia, A. Vitaliti (FUB  Fondazione Ugo Bordoni)","rapporto":"","rif_rse":"20010481"},"satellite_post_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ICT Security and Assurance for Enabling Components and Technologies: Insights - RSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ICT Security and Assurance for Enabling Components and Technologies: Insights - RSE\" \/>\n<meta property=\"og:description\" content=\"The results of a study on specific aspects of cybersecurity in the context of 5G, SCADA (Supervisory Control And Data Acquisition) and blockchain are reported. The study aims to provide electricity system stakeholders with elements to assess the maturity of 5G systems in terms of security specifications and related controls, to manage the constraints imposed on SCADA systems by national legislation on the security of critical infrastructure, and to assess the potential of blockchain systems for authenticating public keys of IoT (Internet of Things) devices. The study expands and develops a previous preliminary study limited to 5G and SCADA systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/\" \/>\n<meta property=\"og:site_name\" content=\"RSE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-17T07:25:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/\",\"url\":\"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/\",\"name\":\"ICT Security and Assurance for Enabling Components and Technologies: Insights - RSE\",\"isPartOf\":{\"@id\":\"https:\/\/www.rse-web.it\/#website\"},\"datePublished\":\"2024-09-17T07:22:21+00:00\",\"dateModified\":\"2024-09-17T07:25:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rse-web.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ICT Security and Assurance for Enabling Components and Technologies: Insights\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rse-web.it\/#website\",\"url\":\"https:\/\/www.rse-web.it\/\",\"name\":\"RSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rse-web.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rse-web.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rse-web.it\/#organization\",\"name\":\"RSE\",\"url\":\"https:\/\/www.rse-web.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"contentUrl\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"width\":734,\"height\":164,\"caption\":\"RSE\"},\"image\":{\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ICT Security and Assurance for Enabling Components and Technologies: Insights - RSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/","og_locale":"en_US","og_type":"article","og_title":"ICT Security and Assurance for Enabling Components and Technologies: Insights - RSE","og_description":"The results of a study on specific aspects of cybersecurity in the context of 5G, SCADA (Supervisory Control And Data Acquisition) and blockchain are reported. The study aims to provide electricity system stakeholders with elements to assess the maturity of 5G systems in terms of security specifications and related controls, to manage the constraints imposed on SCADA systems by national legislation on the security of critical infrastructure, and to assess the potential of blockchain systems for authenticating public keys of IoT (Internet of Things) devices. The study expands and develops a previous preliminary study limited to 5G and SCADA systems.","og_url":"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/","og_site_name":"RSE","article_modified_time":"2024-09-17T07:25:19+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/","url":"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/","name":"ICT Security and Assurance for Enabling Components and Technologies: Insights - RSE","isPartOf":{"@id":"https:\/\/www.rse-web.it\/#website"},"datePublished":"2024-09-17T07:22:21+00:00","dateModified":"2024-09-17T07:25:19+00:00","breadcrumb":{"@id":"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rse-web.it\/en\/reports\/ict-security-and-assurance-for-enabling-components-and-technologies-insights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rse-web.it\/en\/"},{"@type":"ListItem","position":2,"name":"ICT Security and Assurance for Enabling Components and Technologies: Insights"}]},{"@type":"WebSite","@id":"https:\/\/www.rse-web.it\/#website","url":"https:\/\/www.rse-web.it\/","name":"RSE","description":"","publisher":{"@id":"https:\/\/www.rse-web.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rse-web.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rse-web.it\/#organization","name":"RSE","url":"https:\/\/www.rse-web.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","contentUrl":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","width":734,"height":164,"caption":"RSE"},"image":{"@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/196224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti"}],"about":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/types\/rapporti"}],"author":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/comments?post=196224"}],"version-history":[{"count":2,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/196224\/revisions"}],"predecessor-version":[{"id":196226,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/196224\/revisions\/196226"}],"wp:attachment":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/media?parent=196224"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/tags?post=196224"},{"taxonomy":"targets","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/targets?post=196224"},{"taxonomy":"rapporti_tipologie","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti_tipologie?post=196224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}