Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Description

(related to/part of theme "Information Governance & Integrity")

4. Proving the integrity

  • Tools/toolsets and processes for public authorities (police, customs, border control, KTK, military, etc.) for investigation of cyber attacks

Ideas

  • Recording DOS attacks in WSNs
  • Provability: authentic vs. non-authentic

Image Added

Questions

  • What kind of toolset public authorities will need, so that it will be possible for them to (successfully) investigate ongoing or already happened cyber attack?
  • SOL-operations
  • Forensics
  • Incident response -processes
  • Planning and process to do post-mortem cyber forensic to unknown cyber threats

Industrial partners

OrganizationContact personRole & contribution
Patria

Metso

Missing Link

Gofore










Research partners

OrganizationContact personRole & contribution