H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach
Attachment | Size |
---|---|
HaruspexLogo.png | 387.82 KB |
H-Time Machine (Forensics module) stores and manages the digital twins that describes the various versions of the infrastructure and vulnerabilities in all its life. Hence, these twins describe both the whole history of the infrastructure and the differences among its versions. H-Time machine simplifies forensics investigation of attacks that may have occurred in the past and have used vulnerabilities that have become public now. In fact, as soon as an infrastructure vulnerability becomes public, the H-Time Machine can retrieve and update the various twins to include the new vulnerability and simulate the attacks to discover whether an attacker could have exploited the new vulnerability to stealthy attack the infrastructure and hide some malware or steal some information. The output of the simulations minimizes the cost of investigation by driving the search for indicators of compromise or hidden malware. In this way H-Time machine extends the coverage of a “continuous assessment in the past” handling threat agents that could have exploited some vulnerabilities long time before they became public.
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use