Phase 2: The Vertical Demonstrator Requirements Revisited

Romy General News

18 October 2021

Phase 2: The Vertical Demonstrator Requirements Revisited

CyberSec4Europe’s report Requirements Analysis of Demonstration Cases Phase 2, is the first deliverable in the second phase of the project demonstrators’ lifecycle.

connecting through webinar requirements

In this second phase, our plans for the demonstrators are perfected with the feedback we received during the first cycle. To this end, the report builds upon the requirements analysis in the first cycle by reviewing the use cases and requirements of each demonstrator.

Both these reports present the demonstrators’ goals and importance in the context of today’s cybersecurity landscape, with a particular focus on the European Union’s market and citizenry. These two deliverables give an in-depth description of the demonstrators’ foundations; that is, the use cases to be implemented to showcase the project’s research and development work, and the requirements of these use cases.

What does “requirements” mean? A requirement is a property or a functionality that a use case and its implementation must satisfy. We put the requirements into categories with different concerns, namely security and privacy, look and feel, usability, operational, maintainability and portability, and legal and regulatory. The final report in this cycle will focus on validating the use cases; that is, assessing to what extent their implementations met the requirements laid down in this latest report. Because a large part of CyberSec4Europe is conducting research, we also included requirements that may not be met by the end of the project, but may help with defining its latest research and development roadmap.

Given that this report is by design an iteration of the previous requirements report, their content is similar. To help the reader better understand the changes we made, we added one section per demonstrator that highlights the updates to the use cases and requirements since the publication of the first iteration. Namely, we added, merged, deleted and rewrote requirements to reflect both the feedback we received during the first cycle and our own research and development activities. In a few cases, we did the same for the use cases. Of particular interest might be a new use case, titled Cyber Threat Intelligence Sharing, for the Open Banking vertical as a result of a new collaboration with the other pilots.

To conclude, this new report is an important deliverable for CyberSec4Europe, providing an in-depth overview of the demonstrator use cases and requirements for the seven verticals whose cybersecurity challenges the project is addressing.


Alessandro Sforzin, NEC Labs Europe GmbH