• No results found

Norway and the Nordic s

N/A
N/A
Protected

Academic year: 2021

Share "Norway and the Nordic s"

Copied!
29
0
0

Loading.... (view fulltext now)

Full text

(1)

Minding the Gap for

Computational Sovereignty in

Computational Sovereignty in

Norway and the Nordic’s

Professor Dr. Stewart Kowalski Information Security

Vice Dean of Education

Faculty of Computer and Media Technology Norwegian Information Security Lab (NISlab) Center for Cyber and Information Security

(2)

2

Education your Stairway to Heavenly Security

(2016/2017)

PhD in Information Security Cisco Lab &

Cyber range

Information Security Management Group

Bachelor in IT-Operations and Information Security (BITSEC) Master in Information Security (MIS) - Cybersecurity - Forensics - Information Security Management

Experienced Based Master in Information Security (MISEB)

Forensic Lab Biometris Lab

(3)

NISLAB STUDY PROGRAMS

100 120 140 160 142 108

 Bachelor IT-Operations and Security (BISTSEC – merged Program 2016/17)*

 Master Information Security (MIS) *

 Experienced Based Master Information Security (MISEB) **

 PhD Information Security (PhD-IS)*

0 20 40 60 80 100

BITSEC MIS MISEB PIS

16 22 Number of Students * Status intake 2015 ** 1st /2nd year only (PhD-IS (PhD-IS

(4)
(5)

Find HIG, NISlab, MTL, CCIS in the School of Athens https://www.youtube.com/watch?v=uOrG6jfBzEU

(6)
(7)

WHY IS THERE SUCH A GAP

“AS CHANGE IN QUANTITY = CHANGE IN KIND” “COMPUTATION AS A COMMODITY” A NEW GAP

(8)

8

PROBLEM 1 CYBER SECURITY AND

COMPUTATIONAL SOVEREIGNTY

Computation and IT Technology research and

development, adoption and implementation is driven to

a large extent by

“hype”

and security and privacy issues

and legal constraints are neither thought about or taught

correctly!

(9)
(10)

10

PROBLEM 1 CYBER SECURITY AND

COMPUTATIONAL SOVEREIGNTY

Computation and IT Technology research and

development, adoption and implementation is driven to a

large extent by

“hype”

and security and privacy issues and

legal constraints are neither thought about or taught

correctly!

Do you want to buy a parachute? What ??????? We need to make this thing a light as

(11)

PROBLEM 1

Computer and Media Technology research and development,

adoption and implementation is driven to a large extent by

“hype” and security issue and other constraints are neither

thought about or taught correctly correctly!

http://ca.news.yahoo.com/blogs/good-news/airplane-recovery-parachute-saves-three-lives-connecticut-crash-171749029.html

(12)

:

Problem: A GAP in our Society between

Hypothesis: It is Systemic

(13)

Security & Privacy Technology and Law?

(14)

14

The idea of these lunch seminars is to create an informal setting, where a

topic is presented during the first 15-20 minutes, and where the remaining time is set aside for discussion.

Conceptual Socio-Technical Model of Nordic Executive MBA in

(15)

Swedish information security university education begain with the forming of IFIP TC 11 in 1983.

(16)

16

DETAILS OF THE FRAMEWORK

Context, geographical/space and time bound "system point" Design/architecture

Theory/model

Process-Store- Communicate- Collect-Display

Technical Aspects Non-Technical Aspects Theory/model

Physical construction

Operational Administrative

Managerial Legal Ethical

Content subject areas

Systemic module

- an epistemological device, - meta-science, and

- criteria for control

(17)
(18)
(19)
(20)

20

(21)
(22)
(23)

EXECUTIVE MBA

SECURITY & PRIVACY TECHNOLOGY AND LAW

Business

Technologies and Innovation Legal Informatics

Security and Privacy Management Governance

Public & Private Sectors

(24)

24

FUTURE COMMON PROJECTS: EDUCATION

NordSecMob: Dual Degree with Concordia University, Canada (Autumn Bachelor in IT-Operations and Security PhD in Information Security Norwegian MOOC Common Body of Knowledge Cyber Security and

Privacy Nordic Master: InfoSec Mgmt & Privacy (Spring 2017) NordSecMob: Nordic Master in Security & Mobile Computing (Autumn 2016) Master in Information Security Bachelor/Master Information Security Introduction Courses Experience Based Masters Police/Cyber Defense

(25)

Security PhD Student Network

– Networking (Security Divas, SWITS, NordSec, NISK) Support students with travel grants

– Finse winter school (FRISC/COINS); Metochi summer school – Ph.D. student seminar (autumn): Ca. 30%-40% of students

plus Swedish/European partner network and invited speaker – Capture the flag team: International visibility of Norwegian

applied IT security

– Increased visibility: Attract more and better candidates for – Increased visibility: Attract more and better candidates for

(26)

26

END-TO-END SECURITY RESEARCH AND EDUCATION

Di v isi o ns /Di vis io ns /Sci en c eAn dEn gi ne eri ng T ech no lo g y /D ocu me nts /Co y l

NTNU NISlab CCIS NORSIS http://

w w w .ndia.org /Di v isi o ns eAn dEn gi ne eri ng T ech no lo g y e% 20 ND IA. pd f NORSIS

(27)
(28)

28

(29)

References

Related documents

In previously BTV8 vaccinated calves, the rise of neutral- izing antibodies against the virus serotype used in the challenge was earlier detected and reached higher lev- els

(a) Spectroscopic ellipsometry data and fit of Ag NP film with the model proposed in the main text; (b) Spectroscopic ellipsometry data and fit of Ag NP/TiO 2 (Ag/Ti 50-50) film

treatment might affect the powder properties such as, moisture content, particle size, bulk density, tapped density, water activity and color ( Prajapati et al.,

MGT of America performed an annual inspection for compliance with the ICE National Detention Standards (NOS) at the Central Texas Detention Facility (CTDF) located in San

To research how and in what ways critique, as a disciplinary practice and process, is discursively constructed among actors (e.g., instructor, students, client, etc.) in and through

A special problem with definiteness of the variational formulation (to be explained below) forces us to prove the Rellich identity also for solutions to the variational problem in

In this way, the first part of the present study is descriptive- correlation because this study aimed to collect the necessary information for determining

Once the hand was inside the grasp envelope, the system assisted the user in positioning the robot hand to grasp the object by blending the translation commands of the