Requirement elicitation methodology Sample Clauses
Requirement elicitation methodology. PALANTIR offers Security-as-a-Service in a variety of delivery modes (cloud/light/edge) allowing clients not only to select the level of protection that best fits their needs but also the level of information they would like to communicate to and receive from other PALANTIR users. To this end, it leverages
(i) a Risk Analysis Framework that allows the quantification of security/privacy threats based on security/privacy impact assessment and its correlation with the attack surface analysis; (ii) Network Function Virtualisation (NFV) for virtualization and dynamic placement of security appliances in the network; (iii) a hybrid Threat Intelligence framework for real-time incident detection and mitigation; and (iv) a Trust and Attestation framework for securing both infrastructure and services. Three high- level use cases are identified as the most relevant for PALANTIR and are described in detail in D2.4: • Use Case #1: Securing private medical practices with lightweight SecaaS for the protection of medical data, illustrating relevant cases of incident detection and mitigation activities to safeguard patient data and prevent medical identity theft.
