Page tree
Skip to end of metadata
Go to start of metadata

Description

  1. Identification of (relevant) information
  2. Definition of key processes
    1. Information/data ownership
    2. Access rights
  3. Process verification and monitoring (see theme "Digital Trust")
  4. Proving the integrity (see theme "Investigation of cyber attacks")

Ideas

  • Case Metso + pilot
  • Access guidelines
  • Processes
  • Asset management
  • Can process be used as a way to protect information?

Questions

  • TBD

Research questions

Industrial partners

Organization*Contact personRole & contribution
Huoltovarmuuskeskus?Kalle Luukkainen?





















*Color code:
Orange: "wish list" of companies to participate

Research partners

OrganizationContact personRole & contribution
























2 Comments

  1. Anonymous

    Verifiable independent authentic evidence needs to be available later on for neutral audit.

    1. You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.
  2. Anonymous

    Preparedness. Building capabilities:

    • planning
      • avoiding dangerous job combinations (vaaralliset työyhdistelmät)
    • processes
      • incl. evidence management
      • incl. MIM (Major Incident Management) process
    • deception (incl. honey potting)
    • training
    • building
    • testing
    • auditing