swedish armed forces joint development & experimentation .../ltu 2010-11-18_eng_ltu...

21
HÖGKVARTERET SWEDISH ARMED FORCES Joint Development & Experimentation Center (JCDEC) SWEDISH ARMED FORCES Joint Development & Experimentation Center (JCDEC)

Upload: others

Post on 25-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

SWEDISH ARMED FORCES Joint Development & Experimentation Center

(JCDEC)

SWEDISH ARMED FORCES Joint Development & Experimentation Center

(JCDEC)

Page 2: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

Försvarsmakten söker examenssamarbete Försvarsmakten genomgår för närvarande ett paradigmskifte. Från att tidigare ha varit ett invasionsbaserat försvar skall man i framtiden istället vara ett kunskaps- och insatsbaserat försvar. För att kunna realisera detta krävs ny syn på informationshantering och informationssystem samt god kunskap inom dessa områden. För att förstärka sin kunskapsinhämting och och därmed sin kompetens för att möta dessa nya krav har Försvarsmakten inlett samarbete med universitet och högskolor i hela Sverige inom ämnesområdet säker och rationell informationshantering och söker studenter som skall göra sitt examensarbete. Samarbetet innebär att Försvarsmakten lämnar förslag till examensarbeten och ställer personlig supervisor - ej likställd lärosätets handledare - till studentens förfogande samt anordnar föreläsningar/seminarier för studenter. I gengäld får Försvarsmakten aktuella och verklighetsanknutna problem belysta ur såväl process- och organisations- som juridisk och teknisk synvinkel. En lista på föreslagna exjobb hittar du här nedan samt på: www.ltu.se/karriar För vidare frågor och information runt Försvarsmaktens examensarbeten kontakta: Ross Tsagalidis, tel: 0733 -666982, e-post: [email protected] .

Page 3: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Swedish Armed Forces Main Tasks

1. Defend Sweden against attack by a foreign power

2. Assert Sweden’s national integrity3. Carry out international peace-

keeping missions4. Support Swedish society in major

crises

Page 4: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Collaboration Academia – Swedish Armed Forces

Page 5: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Antal ex- arbeten

% % %Antalet procent examensarbete per examensgrad bestäms av respektive lärosäte.

2010 Vt10 0610 Ht10 1210

100 förslag

Selective work of Theses

2011

BachelorProbably M.Sc examina

BachelorM.Sc examina.

Vt11 0611 Ht11 1211

Vt12 0612 Ht12 1212

BachelorM.Sc examina

Start FD/PhD research?

ProbablyFD/PhD Dissertation

2012

BachelorM.Sc examina

Project planingProject milstones

Univ‐grade:

Fil‐mag?

MSc

FD/PhD   

2016 +

Page 6: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Cooperation and theses will lead to (1):For Colleges and Universities:•Valuable input on the Agency's knowledge enhancement and resources•Support for collaboration among researchers, SWAF and businesses•“Networking” for increased collaboration; Swedish Armed Forces - a motivating partner and valuable peer (e.g. for EU research funding).•Shared knowledge in which theory meets practice - including Swedish Armed Forces as a guest lecturer•Possible commissioned educational programs

Page 7: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

For the student:•Real world related problems•Support from Swedish Armed Forces/JCDEC supervisor during the thesis•Knowledge broadening and specialization.•Career Opportunities

Cooperation and theses will lead to (2):

Page 8: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

For the Swedish Armed Forces:•Knowledge Acquisition for effective business intelligence.•Diversity of alternative solutions for secure, effective and efficient information management.•Networking through collaborations between academia and Swedish Armed Forces.•Synergies for future use in the development of methods, organization, technology and personnel skills.

Cooperation and theses will lead to (3):

Page 9: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Collaboration PartiesEstablished contact and signed Letter of Intent - spring 2010

Blekinge

Institute of Technology

Chalmers University of Technology

Karlstad University

Linköping

University

Luleå

University of Technology

Lund University and University of Technology

Malmö

University

Mid Sweden University

Royal Institute of Technology

Stockholm University

Umeå

Universitet

Page 10: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Systemic Security - Theses proposals 2010

Com- Security

Virtualization Mobility WEBB-SEC IAM – AC Password Mgnt.

MMI/MCI

Key distribution in a multilevel system with a single or multi key-servers.

Services in the Cloud: Software-as-a-Service (SaaS), PaaS, IaaS, etc. Feasible within SwedAf? A way to go and how!

Minimization of portable devices at work. What are the needs and where in the organization makes the decision who will use what?

SwedAF-Wiki: “Get knowledged” – Your source to knowledge. A conceptual model.

Classification and authorization in a multirole user environment.

How to create organizational superiority due human intelligence for immediate response?

NCS (Network Centric Security)

Is virtualization a better way to effective and efficient information management?

Portable devices: Threats. Risks, vulnerabilities, solutions. Protection measures.

Web Security Access Control. To exploit the web's potential with complete peace of mind.

Delegation and Distribution of user Privileges.

EA (Enterprise Architecture). What, Where, When, Why, Who, For Whom.

Merging needs like Economy, Effective and fast Technology - fewer connecting points and availability.

Virtualized security.

Virtualization and MLS. A solution for better security.

Prons & Cons.

USB devices have evolved into useful storage media, but they've also turned into a security nightmare for organizations. Security Solutions

Do Wikis offer a new way to get accurate and updated documents to the forces more rapidly?

Models for secure Information Management. Mitigating Design and Verification Risk Through a Robust Test Environment.

Tools for rational Information Management.

Effectiveness metrics - Methodology

A Convergence of Means and Ends for facing cyber threats.

Virtualization, Storage & Datacentre Optimizations

Methodologies for the creation of Rational Information Management. (Automated, Manual, in paper, digital, verbal).

System overload avoidance requires Availability such Mechanisms as Fault Tolerance and Recovery.

IAM Federation and Automated Account shift & Privilege

Model/s for rational IM and Survey of Document Management Applications.

Examples of theses proposals

Page 11: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Page 12: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Page 13: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

AUTOMATION Logging Market analysis

Security Management

INFO WAR Data media and UPS

Automated capabilities for these key areas:

1. Access control

2. Segregation of duties

3. Security incident procedures

4. Policy monitoring and enforcement

5. Security system planning

6. System testing and evaluation

7. Assessing, monitoring, and alerting on vulnerabilities in real-time

8. Remediating vulnerabilities and security incidents

What to log and why: Establishment of a log management strategy that combines requirements from auditors with a process for the security team based on risk to gain better visibility into log data. (ED)

Identify, assess, and mitigate IT risk: A market survey of latest techniques.

An effective information security program.

What’s the key – if any - providing a complete security solution?

The Asymmetric warfare! Defenders vs Aggressors: A deductive analysis

Damaged data retreival. Examine and suggest mechanisms.

Q-secured log. Incident description, Incident verification. Normalization/Harmonization of multiple sources.

Processes and technologies that support security information management (SIM) operations?

A market survey.

General security 1. Conduct a catalog with all requirements on security. Everything which is related to security). 2. Categorization of the requirements according to the Info-security tree structure.

The Asymmetric warfare! Defenders vs Aggressors: An inductive analysis

Examine and suggest UPS mechanisms/solutions regardless data system environments.

Monitor and transmission log data via small band. Transmission of log data between different zones, intrinsic, extrinsic,

Define “Trust” and “Trustworthiness”. Prerequisites, criteria and metrics.

The Asymmetric warfare! Defenders vs Aggressors. Proof due falsification.

Rational Data Retention structured logically.

Secure Information Management based on user profiles: Which logged data do we need? Trace Agents for active selection due need-to-know, need-to-show criteria.

Conduct a security plan having the red thread, Quality, from organisation to personnel, processes and technology. (Miller´s Living Systems Theory can be used as model).

The challenges of cyber defense for multinational missions.

Page 14: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Page 15: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Page 16: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Page 17: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Page 18: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Page 19: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

FUTURE OPPORTUNITIES

Offer to host SWITS 2012!o A networking group for PhD’s in IT Security

Annual follow-up meetings

Scholarships

A "Future Park“ for Collaborative Research and Development

Extended cooperation, more than just secure effective and efficient information management

Stepping-up cooperation to include international Universities and Colleges

Page 20: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Enköping

2010-05-21

Page 21: SWEDISH ARMED FORCES Joint Development & Experimentation .../ltu 2010-11-18_eng_ltu karriär.pdf · 1. Defend Sweden against attack by a foreign power 2. Assert Sweden’s national

HÖGKVARTERET

Contacts

FMKE SupervisorDan Ahlström [email protected]

+46 (0)706 002970

LP-POCRoss [email protected]+46 (0) 733 666982

www.forsvarsmakten.se