swedish armed forces joint development & experimentation .../ltu 2010-11-18_eng_ltu...
TRANSCRIPT
HÖGKVARTERET
SWEDISH ARMED FORCES Joint Development & Experimentation Center
(JCDEC)
SWEDISH ARMED FORCES Joint Development & Experimentation Center
(JCDEC)
Försvarsmakten söker examenssamarbete Försvarsmakten genomgår för närvarande ett paradigmskifte. Från att tidigare ha varit ett invasionsbaserat försvar skall man i framtiden istället vara ett kunskaps- och insatsbaserat försvar. För att kunna realisera detta krävs ny syn på informationshantering och informationssystem samt god kunskap inom dessa områden. För att förstärka sin kunskapsinhämting och och därmed sin kompetens för att möta dessa nya krav har Försvarsmakten inlett samarbete med universitet och högskolor i hela Sverige inom ämnesområdet säker och rationell informationshantering och söker studenter som skall göra sitt examensarbete. Samarbetet innebär att Försvarsmakten lämnar förslag till examensarbeten och ställer personlig supervisor - ej likställd lärosätets handledare - till studentens förfogande samt anordnar föreläsningar/seminarier för studenter. I gengäld får Försvarsmakten aktuella och verklighetsanknutna problem belysta ur såväl process- och organisations- som juridisk och teknisk synvinkel. En lista på föreslagna exjobb hittar du här nedan samt på: www.ltu.se/karriar För vidare frågor och information runt Försvarsmaktens examensarbeten kontakta: Ross Tsagalidis, tel: 0733 -666982, e-post: [email protected] .
HÖGKVARTERET
Swedish Armed Forces Main Tasks
1. Defend Sweden against attack by a foreign power
2. Assert Sweden’s national integrity3. Carry out international peace-
keeping missions4. Support Swedish society in major
crises
HÖGKVARTERET
Collaboration Academia – Swedish Armed Forces
HÖGKVARTERET
Antal ex- arbeten
% % %Antalet procent examensarbete per examensgrad bestäms av respektive lärosäte.
2010 Vt10 0610 Ht10 1210
100 förslag
Selective work of Theses
2011
BachelorProbably M.Sc examina
BachelorM.Sc examina.
Vt11 0611 Ht11 1211
Vt12 0612 Ht12 1212
BachelorM.Sc examina
Start FD/PhD research?
ProbablyFD/PhD Dissertation
2012
BachelorM.Sc examina
Project planingProject milstones
Univ‐grade:
Fil‐mag?
MSc
FD/PhD
2016 +
HÖGKVARTERET
Cooperation and theses will lead to (1):For Colleges and Universities:•Valuable input on the Agency's knowledge enhancement and resources•Support for collaboration among researchers, SWAF and businesses•“Networking” for increased collaboration; Swedish Armed Forces - a motivating partner and valuable peer (e.g. for EU research funding).•Shared knowledge in which theory meets practice - including Swedish Armed Forces as a guest lecturer•Possible commissioned educational programs
HÖGKVARTERET
For the student:•Real world related problems•Support from Swedish Armed Forces/JCDEC supervisor during the thesis•Knowledge broadening and specialization.•Career Opportunities
Cooperation and theses will lead to (2):
HÖGKVARTERET
For the Swedish Armed Forces:•Knowledge Acquisition for effective business intelligence.•Diversity of alternative solutions for secure, effective and efficient information management.•Networking through collaborations between academia and Swedish Armed Forces.•Synergies for future use in the development of methods, organization, technology and personnel skills.
Cooperation and theses will lead to (3):
HÖGKVARTERET
Collaboration PartiesEstablished contact and signed Letter of Intent - spring 2010
Blekinge
Institute of Technology
Chalmers University of Technology
Karlstad University
Linköping
University
Luleå
University of Technology
Lund University and University of Technology
Malmö
University
Mid Sweden University
Royal Institute of Technology
Stockholm University
Umeå
Universitet
HÖGKVARTERET
Systemic Security - Theses proposals 2010
Com- Security
Virtualization Mobility WEBB-SEC IAM – AC Password Mgnt.
MMI/MCI
Key distribution in a multilevel system with a single or multi key-servers.
Services in the Cloud: Software-as-a-Service (SaaS), PaaS, IaaS, etc. Feasible within SwedAf? A way to go and how!
Minimization of portable devices at work. What are the needs and where in the organization makes the decision who will use what?
SwedAF-Wiki: “Get knowledged” – Your source to knowledge. A conceptual model.
Classification and authorization in a multirole user environment.
How to create organizational superiority due human intelligence for immediate response?
NCS (Network Centric Security)
Is virtualization a better way to effective and efficient information management?
Portable devices: Threats. Risks, vulnerabilities, solutions. Protection measures.
Web Security Access Control. To exploit the web's potential with complete peace of mind.
Delegation and Distribution of user Privileges.
EA (Enterprise Architecture). What, Where, When, Why, Who, For Whom.
Merging needs like Economy, Effective and fast Technology - fewer connecting points and availability.
Virtualized security.
Virtualization and MLS. A solution for better security.
Prons & Cons.
USB devices have evolved into useful storage media, but they've also turned into a security nightmare for organizations. Security Solutions
Do Wikis offer a new way to get accurate and updated documents to the forces more rapidly?
Models for secure Information Management. Mitigating Design and Verification Risk Through a Robust Test Environment.
Tools for rational Information Management.
Effectiveness metrics - Methodology
A Convergence of Means and Ends for facing cyber threats.
Virtualization, Storage & Datacentre Optimizations
Methodologies for the creation of Rational Information Management. (Automated, Manual, in paper, digital, verbal).
System overload avoidance requires Availability such Mechanisms as Fault Tolerance and Recovery.
IAM Federation and Automated Account shift & Privilege
Model/s for rational IM and Survey of Document Management Applications.
Examples of theses proposals
HÖGKVARTERET
HÖGKVARTERET
HÖGKVARTERET
AUTOMATION Logging Market analysis
Security Management
INFO WAR Data media and UPS
Automated capabilities for these key areas:
1. Access control
2. Segregation of duties
3. Security incident procedures
4. Policy monitoring and enforcement
5. Security system planning
6. System testing and evaluation
7. Assessing, monitoring, and alerting on vulnerabilities in real-time
8. Remediating vulnerabilities and security incidents
What to log and why: Establishment of a log management strategy that combines requirements from auditors with a process for the security team based on risk to gain better visibility into log data. (ED)
Identify, assess, and mitigate IT risk: A market survey of latest techniques.
An effective information security program.
What’s the key – if any - providing a complete security solution?
The Asymmetric warfare! Defenders vs Aggressors: A deductive analysis
Damaged data retreival. Examine and suggest mechanisms.
Q-secured log. Incident description, Incident verification. Normalization/Harmonization of multiple sources.
Processes and technologies that support security information management (SIM) operations?
A market survey.
General security 1. Conduct a catalog with all requirements on security. Everything which is related to security). 2. Categorization of the requirements according to the Info-security tree structure.
The Asymmetric warfare! Defenders vs Aggressors: An inductive analysis
Examine and suggest UPS mechanisms/solutions regardless data system environments.
Monitor and transmission log data via small band. Transmission of log data between different zones, intrinsic, extrinsic,
Define “Trust” and “Trustworthiness”. Prerequisites, criteria and metrics.
The Asymmetric warfare! Defenders vs Aggressors. Proof due falsification.
Rational Data Retention structured logically.
Secure Information Management based on user profiles: Which logged data do we need? Trace Agents for active selection due need-to-know, need-to-show criteria.
Conduct a security plan having the red thread, Quality, from organisation to personnel, processes and technology. (Miller´s Living Systems Theory can be used as model).
The challenges of cyber defense for multinational missions.
HÖGKVARTERET
HÖGKVARTERET
HÖGKVARTERET
HÖGKVARTERET
HÖGKVARTERET
HÖGKVARTERET
FUTURE OPPORTUNITIES
Offer to host SWITS 2012!o A networking group for PhD’s in IT Security
Annual follow-up meetings
Scholarships
A "Future Park“ for Collaborative Research and Development
Extended cooperation, more than just secure effective and efficient information management
Stepping-up cooperation to include international Universities and Colleges
HÖGKVARTERET
Enköping
2010-05-21
HÖGKVARTERET
Contacts
FMKE SupervisorDan Ahlström [email protected]
+46 (0)706 002970
LP-POCRoss [email protected]+46 (0) 733 666982
www.forsvarsmakten.se