{"id":208,"date":"2016-03-10T15:58:17","date_gmt":"2016-03-10T15:58:17","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=208"},"modified":"2017-06-10T09:57:22","modified_gmt":"2017-06-10T08:57:22","slug":"bucsr-helping-create-balkan-rail","status":"publish","type":"post","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=208","title":{"rendered":"BUCSR helping create &#8216;Balkan Rail&#8217;"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778.jpg\" rel=\"attachment wp-att-209\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-209\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778-300x300.jpg\" alt=\"IMG_2778\" width=\"300\" height=\"300\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778-300x300.jpg 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778-150x150.jpg 150w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778-768x768.jpg 768w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778-1024x1024.jpg 1024w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778-250x250.jpg 250w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/03\/IMG_2778-174x174.jpg 174w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>This week, we hosted Georgia Lycou from <a href=\"http:\/\/www.aueb.gr\">AUEB<\/a> who has been helping us build security models for a hypothetical rail company; this work is part of a project funded by the <a href=\"https:\/\/2018.bournemouth.ac.uk\/fusion\/\">BU Fusion Investment Fund<\/a> to <a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=55\">create specification exemplars for critical infrastructure protection<\/a>. \u00a0The exemplar (<em>Balkan Rail<\/em>) will explore the impact to critical infrastructure on what otherwise appear to be innocuous issues in any typical commercial organisation in the Balkans. \u00a0 We ran a two-day workshop to elicit \u00a0elements of this exemplar using <a href=\"http:\/\/cairis.org\">CAIRIS<\/a> based on pre-existing risk analysis models from Greek organisations. \u00a0Next week, researchers from BUCSR will visit Athens to collect additional data; this will augment the exemplar with details about people at Balkan Rail, the work they do, issues that might lead to security vulnerabilities, and threats faced by the organisation.<\/p>\n<p>From the outset, the Balkan Rail exemplar is being made publicly available via <a href=\"https:\/\/github.com\/failys\/CAIRIS\/tree\/master\/cairis\/examples\/exemplars\/Balkan_Rail\">github<\/a>. Watch this space for more information on how Balkan Rail, and the security challenges it faces, will evolve!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, we hosted Georgia Lycou from AUEB who has been helping us build security models for a hypothetical rail company; this work is part of a project funded by the BU Fusion Investment Fund to create specification exemplars for critical infrastructure protection. \u00a0The exemplar (Balkan Rail) will explore the impact to critical infrastructure on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[4,8],"tags":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/208"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=208"}],"version-history":[{"count":4,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/208\/revisions"}],"predecessor-version":[{"id":213,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/208\/revisions\/213"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}