NISlab - Norwegian Information Security laboratory



Similar documents
Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL uley/

How To Understand Information Security

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Contents. Information Society and Security. Section 1 Risk and information security 7 Protection of vital information assets; Erlend Skuterud

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY Small Commercial Service (SCS-1) GSR

2175 K Street NW, Suite K Street, NW, Suite 320 Phone: Phone: bobburke@gwu.edu

Analysis One Code Desc. Transaction Amount. Fiscal Period

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Norway and the Nordic s

Ashley Institute of Training Schedule of VET Tuition Fees 2015

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

About CREST R&D Grant

Computing & Telecommunications Services Monthly Report March 2015

JENS HENRIK EGGERT CHRISTENSEN RESEARCH ADVISOR, FINANCIAL RESEARCH FEDERAL RESERVE BANK OF SAN FRANCISCO 101 MARKET STREET, SAN FRANCISCO, CA 94105

CURRICULUM VITAE LARS ERIK WALLE

BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun Jul Full Force Calc

DARPA ACTIVE AUTHENTICATION PROGRAM: BEHAVIORAL BIOMETRICS

Academic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Discussion Outline. A. KPIs Defined. B. Why KPIs Matter. C. KPI Menu. D. Implementation. E. Example KPIs. F. Pitfalls

BIG DATA & Forensics. Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Coordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency

SEO Presentation. Asenyo Inc.

TELENOR NETT SPECIFICATION

2014/2015 MASTER S DEGREE ACADEMIC STUDIES POSTGRADUATE STUDIES

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Evaluating The Performance of Symmetric Encryption Algorithms

Norway - In-Country Mobile Calling

DERIVATIVES, OSLO BØRS - MAY 2015

CAFIS REPORT

Appendix 1 to Fish Pool Rulebook. Product Specifications and Trading schedule for Trading at Fish Pool markets

ESMT FULL-TIME MBA PROGRAM. Photo: Sven Herzberg #3 MBA GLOBALLY BLOOMBERG BUSINESS WEEK INTERNATIONAL RANKING 2014

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt. Monitoring & Audit

Enabling the secure use of RFID

Energy Savings from Business Energy Feedback

2012 HIPAA Privacy and Security Audits

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!

Center for Cyber and Information Security. a shared commitment to the nation s research and expertise development. Opening Conference August 15

Continuous compliance through good governance

Grow retail energy s share of market value. Stephen Mikkelsen

Security and Privacy in Big Data, Blessing or Curse?

ADVANCED LOCAL PREDICTORS FOR SHORT TERM ELECTRIC LOAD

MONTHLY REMINDERS FOR 2013

Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)

ITAG RESEARCH INSTITUTE

Fargen i et pixel. Agenda for mine 13 minutter The Norwegian Colour and Visual Computing Laboratory

Process Validation Workshops. Overview Session

[Kapse*, 4.(10): October, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Computer Security (EDA263 / DIT 641)

Important Dates Calendar FALL

Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)

Understanding Your Credit Report

Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr.

Project Proposal Meeting - 8.June UiO

University-Wide Academic Calendar

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Information Security Course Specifications

The Role of Mathematics in Information Security Education

There e really is No Place Like Rome to experience great Opera! Tel: to discuss your break to the Eternal City!

Det norske oljeselskap ASA (DETNOR) - Oil & Gas - Deals and Alliances Profile


Carl Burch Clifton St mobile Conway AR Education May 00

Transcription:

NISlab - Norwegian Information Security laboratory 11. oktober 2007

What is information security? Information security encompasses the study of the concepts, techniques, technical measures, and administrative measures used to protect information assets from deliberate or inadvertent unauthorized acquisition, damage, disclosure, manipulation, modification, loss, or use. (MCDANIEL, G. IBM dictionary of computing. McGraw-Hill, Inc., New York, NY, USA, 1994.)

: 2001-2002 History June 2001 Pre-project for start-up M.Sc. initiated by Gjøvik University College and Gjøvik Science Park, The Norwegian Army at Jørstadmoen and Telenor, funded by Telenor, Norsk Tipping and Innovation Norway Jan. 2002 Main project for M.Sc. 2002-2005, funded by Telenor, Thales, PricewaterhouseCoopers, Norsk Tipping, DnBNOR and Sparebanken Hedmark Mar. 2002 Academic collaboration established with KTH/Stockholm (quality assurance) and SITAS/UiO (Legal aspects course) May 2002 Over 100 highly qualified applicants for the program Nov. 2002 Professor Einar Snekkenes entered NISlab

: 2003 History Jan. 2003 Professor Jan Arild Audestad entered NISlab Apr. 2003 The Bluelight network initiated Oct. 2003 ESORICS and NordSec held in Gjøvik, hosted by NISlab Oct. 2003 Two research projects awarded funding by the Council of Norway Authentication in a health service context (Snekkenes, 500 EUR) Security of approaches to personell authentication (Snekkenes, 225 EUR)

: 2004 History June 2004 Graduated first batch of M.Sc. students (13 candidates) Sep. 2004 NOKUT accreditation of M.Sc. Information security received Oct. 2004 Two research projects awarded funding by the Council of Norway Security reporting (Snekkenes, 260 EUR) BAS 5 - Effectiveness of information security measures (subcontractor of FFI, Snekkenes, 200 EUR) Nov. 2004 Professor Slobodan Petrović entered NISlab

: 2005 History Jan. 2005 Information security selected as Gjøvik University College PhD area in the university project Apr. 2005 Professor Stephen D. Wolthusen entered NISlab July 2005 Assoc. prof. Patrick Bours entered NISlab Aug. 2005 Professor Chik How Tan entered NISlab Aug. 2005 Assist. prof Tor Arne Folkestad entered NISlab Aug. 2005 B.Sc. Information security initiated

: 2006- History Jan. 2006 NorSIS relocated to Gjøvik May 2006 17 highly qualified applicants for faculty positions at NISlab Sep. 2006 The Bluelight network establishes itself permanently with NISlab represented in the steering committee Jan. 2007 Assoc. prof. Katrin Franke entered NISlab

History Permanent NISlab Faculty Professor Førsteamanuensis Høgskolelektor Erik Hjelma s

Adjunct NISlab faculty Professor Jose J. Gonzalez Information security management Critical infrastructure protection Professor Jan A. Audestad Network security and telecommunication Assoc. prof. André Årnes Attacks & forensics Privacy Assist. prof. Lasse Øverlier Network security Privacy, Anonymization Assist. prof. Morten Schjelderup Information security management

Current NISlab: People 15 faculty members (9 permanent and 6 adjunct) 7 professors (5 permanent, 2 adjunct) 4 associate professors (3 permanent, 1 adjunct) 4 assistant professors (1 permanent, 3 adjunct) 10 researchers 1 post.doc 9 PhD students 100 students 50 M.Sc. students 50 B.Sc. students

NISlab: Key facts History International environment (employees from 8 nations) 36 refereed publications in 2006 5 Norwegian Council research projects (2003-2007) 1 EU IP project (2008-2011) 84 graduates with M.Sc. Information Security (2004-2007) 35% of M.Sc. theses with external partners 1 spin-off company Located on same campus as Gjøvik Science Park which hosts: NorSIS Bluelight KinS SECTOR

Current PhD students History Lasse Øverlier, Network anonymity Nils Kalstad Svendsen, Connections between network topology and network security Geir Olav Dyrkolbotn, Smart Cards - Robustness against Electromagnetic Side-Channel Attacks Kirsi Helkala, Authentication in a health service context Davrondzhon Gafurov, Security of approaches to personnel authentication Janne Hagen, Security effectiveness assessment Vitaliy Pavlenko, Security reporting Frode P. Gilberg, Interactive information security simulation Knut Wold, Securing Cryptographic Algorithms in FPGAs Against Side Channel Attacks

Previous PhD students Hanno Langweg, Metrics for software resistance against malicious software attack (2003-2006)

Study programs History

Continuing education/lifelong learning

Needs for education in information security (M. Bishop. Education in information security. IEEE Concurrency, oct-dec 2000.)

Needs for education in information security (M. Bishop. Education in information security. IEEE Concurrency, oct-dec 2000.)

Needs for education in information security (M. Bishop. Education in information security. IEEE Concurrency, oct-dec 2000.)

Needs for education in information security (M. Bishop. Education in information security. IEEE Concurrency, oct-dec 2000.)

B.Sc. Information security

M.Sc. Information security

Ph.D. Information Security (TBA!) 1 Information security management 2 System security 3 Cryptology 4 Network security 5 Privacy 6 Attacks and forensics 7 Information warfare and critical infrastructure protection 8 Content protection 9 Dependable computing More than just technology!

Where do our students end up?

Where do our students end up? Telenor, EDB, Det Norske Veritas, Ergo, Accenture Statoil, Hydro DnBNOR, Terra, SpareBank1 FSA (Jørstadmoen), FFI, NSM Mnemonic, Secode, Buypass, IBAS, NorSIS Bluegarden, Opera, WebDeal, IQ Motion Recording Norsvin, Eidsiva Energi Nett, Geoservice HiG