Opendata, web and dolomites

CAPTOR

cAPTor captures Advanced System Threats

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

Project "CAPTOR" data sheet

The following table provides information about the project.

Coordinator
S2 GRUPO DE INNOVACION EN PROCESOS ORGANIZATIVOS SL 

Organization address
address: CALLE RAMIRO DE MAEZTU 7 bajo
city: VALENCIA
postcode: 46022
website: www.s2grupo.es

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Spain [ES]
 Project website http://www.s2grupo.eu
 Total cost 71˙429 €
 EC max contribution 50˙000 € (70%)
 Programme 1. H2020-EU.3.7. (Secure societies - Protecting freedom and security of Europe and its citizens)
2. H2020-EU.2.3.1. (Mainstreaming SME support, especially through a dedicated instrument)
 Code Call H2020-SMEINST-1-2014
 Funding Scheme SME-1
 Starting year 2014
 Duration (year-month-day) from 2014-10-01   to  2015-02-28

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    S2 GRUPO DE INNOVACION EN PROCESOS ORGANIZATIVOS SL ES (VALENCIA) coordinator 50˙000.00

Map

 Project objective

CAPTOR is a set of tools whose main objective is to characterize, identify and detect APT’s as well as minimize their impact in the target organization. CAPTOR should be able to operate in complex environments, like Urban Critical Infrastructures, where IT, industrial, energy and network infrastructures must be protected from security threats.

The most important innovation of CAPTOR is the application of a set of techniques and methodologies known as anomaly detection, which will be later explained and an approach more akin to classic intelligence as opposed to the malware-detection-centered approach used by the vast majority of proposed commercial solutions.

S2’ s objective is to position CAPTOR as a leading European toolset to protect Critical Infrastructures in general and Urban Soft Targets and Critical Infrastructures in particular. Advances in the integration of ICT technologies in urban areas and their infrastructures have brought undeniable advantages to the cities economic management, inhabitability and have helped to reduce their environmental impact.

Unfortunately, together with these advantages, many cyber security vulnerabilities have been introduced in infrastructures where these threats have never before been taken into account. The threat posed by cyber terrorists and cyber criminals continually grows and organizations are increasing their awareness of the possibility of an incident.

An APT (Advanced Persistent Threat) is a planned multimodal attack targeted at a specific organization or infrastructure, where several types of malware, under control of a command center is combined with techniques like social engineering, use of insiders or access through third parties, with the objective of gaining access to critical physical or virtual assets and, exfiltrate information, obtain economic advantage or sabotage infrastructures. APTs are the most important kind of cyber attacks a critical infrastructure can suffer today.

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CAPTOR" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CAPTOR" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.;H2020-EU.2.3.1.)

SRAP (2018)

Safe and Readily Authenticated Pharmaceutical dosage forms (tablets)

Read More  

Quakebots (2018)

Artificial Intelligence and IoT for seismic monitoring

Read More  

SIGAGuard (2018)

Cybersecurity anomaly detection solution for critical infrastructures

Read More