Description
(related to/part of theme "Information Governance & Integrity")
4. Proving the integrity
- Tools/toolsets and processes for public authorities (police, customs, border control, KTK, military, etc.) for investigation of cyber attacks
Ideas
- Recording DOS attacks in WSNs
- Provability: authentic vs. non-authentic
Questions
- What kind of toolset public authorities will need, so that it will be possible for them to (successfully) investigate ongoing or already happened cyber attack?
- SOL-operations
- Forensics
- Incident response -processes
- Planning and process to do post-mortem cyber forensic to unknown cyber threats
Research questions
Industrial partners
Organization | Contact person | Role & contribution |
---|---|---|
Patria | ||
Metso | ||
Missing Link | ||
Gofore | ||
Kalmar | ||
Research partners
Organization | Contact person | Role & contribution |
---|---|---|
Tamk | ||
2 Comments
Anonymous
Split this to three main phases of a cyber-attacks, namely
1. Before cyber-attack: Preparedness. Building capabilities:
2. During cyber-attack:
3. After cyber-attack
Anonymous
TAMK's Field Lab allows testing DoS meaning that it enables experiments on the three phases of the cyber attack mentioned above. The tests can be planned based on industry needs.
Add Comment