THE GENERAL PURPOSE OF MUSES IS TO PROMOTE THE SAFETY OF THE COMPANY THROUGH THE REDUCTION OF THE RISKS INTRODUCED BY USER BEHAVIOR.
Data security and privacy are of fundamental importance to organizations, where they are defined and managed through security policies. Most security incidents are caused by company personnel, either because of their lack of knowledge or because of their malicious or inappropriate behavior.
Today, information is highly distributed among company servers, the “cloud” and multiple personal devices like PDAs, tablets and smartphones. These are not only the supports of the corporate information, but also the user interfaces to access it. In addition, the practice of bringing your own device (BYOD) is becoming more common in large organizations, posing new security threats, as well as blurring the boundaries between personal and corporate use. In this situation, the implementation of security policies is increasingly difficult, since any strategy with possibilities of success has to take into account several changing factors: the delocalization of information, access from heterogeneous devices and the mixture of personal and professional activities. Furthermore, any mechanism or control should be easy to use and provide non-intrusive and clear feedback on the risk incurred at all times.
- What is MUSES?
- Why is this technology important?
- In what applications can MUSES help me?
MUSES will provide a device-independent corporate security system, user-centric and self-adaptive, capable of providing identical work experience on different devices where a user can log on to one device and location and continue on different devices, without loss in the company’s digital assets.
Usability metrics, context risk assessment, current user confidence level and device exposure level, and a set of guidelines for safe application design, enterprise policies, and context-based security requirements. A real-time risk and trust analysis engine will also be developed, with security mechanisms that are difficult to compromise once installed on the target platforms.
Project funded by the European Commission under the Seventh Framework Program (FP7) (Project number: 318508 FP7-ICT-2011-8)