SlideShare a Scribd company logo
Center for Cyber and 
Information Security 
a shared commitment to the nation’s research and expertise development
ccis.no 
Welcome! 
The Center for Cyber and 
Information Security 
2 3 
We read daily about things that 
should worry us but we barely 
understand. Identity theft, industrial 
espionage, cybercrime, online extor-tion, 
cyberwar, cyberattack, data leak, 
international surveillance programs, and 
challenges to privacy. 
Our modern societies have become 
totally dependent on computer 
based information and communica-tion 
technologies (ICT), and thus on 
their robustness and resilience against 
accidents and crimes. Today, compu-ter 
systems control everything from 
traffic lights and surgical equipment in 
hospitals to telephone communications 
and electricity distribution. Further 
more, computer systems harbours 
information and knowledge that must 
be sheltered from unauthorized access; 
including engineering solutions, business 
secrets, information about your bank 
accounts, defense secrets, purchasing 
habits and emails. This is about you, it is 
about what kind of society you want to 
live in, it is about your company’s ability 
to survive, and it is about our govern-ment’s 
ability to protect us, to protect 
our welfare and to protect our privacy. 
All countries today need to develop 
their education and research capacity 
to meet this future. As a significant 
national contribution, a number of 
organizations have partnered to create 
a center for research and education 
in information and cyber security in 
Norway. 
By the end of 2014, the center will 
have a core group of 25 scientists 
of a total of 70-80 people, including 
non-permanent and adjunct positions 
as for instance Ph.D. students and post-docs. 
In addition, there will be 200-300 
bachelor and master students at the 
Centre. 
August 15, 2014, we officially 
opened the center. find very inte-resting. 
With regards, 
The National Police Directorate, 
Eidsiva, the Norwegian National 
Security Authorities, the Norwegian 
Cyber Defence, the Police ICT Service, 
the National Criminal Investigation 
Service - Kripos, the National Authority 
for Investigation and Prosecution of 
Economic and Environmental Crime - 
Økokrim, the Police University College, 
the Norwegian Defence Cyber Academy, 
the Norwegian Defence Research 
Establishment - FFI, Gjøvik University 
College, Telenor, Statkraft, Statnett, 
mnemonic, IBM, PwC, Oppland County, 
Lillehammer University College, the 
Norwegian National Identity Center, 
Oslo Police District, the Police Security 
Service, NC-Spectrum, Vestoppland 
Police District, Watchcom Security Group, 
the Norwegian Centre for Information 
Security - NorSIS. 
will strengthen our expertise and skills to 
prevent, detect, respond to, and investigate 
undesirable and criminal computer based ac-tivities. 
The centre will undertake actions towards: 
• Building research capacity and research groups at top level interna-tionally 
in disciplines that are relevant for our partners and for Nor-way. 
• Providing training and study programs of high quality and with great 
societal relevance. 
• Contributing to Norway’s international collaboration where partners 
can participate and apply their knowledge and expertise. 
• Helping to increase the recruitment of students and researchers for 
the Norwegian education and training in security and for research 
environments. 
• Contributing to the long term competence development strategy 
and research and education strategy. 
• Cooperating with and contributing to organizations whose mission is 
to inform and raise awareness about security. 
• Strengthening cooperation, exchanging knowledge, and sharing of 
skills among sectors, among application/innovation environments, 
among academic institutions, and among national and international 
projects, centres and organizations. 
• Becoming a knowledge and expertise node in Europe’s ability to 
compete for international research funding.
OUR INCREASED VULNERABILITY 
Our increased reliance on Information 
and Communication Technologies (ICT) 
will create in the years ahead new, 
large, and increasingly complex security 
challenges; confronting these challenges 
will require an increased focus on 
higher education, more efficiency in 
resource development, improved 
research capacity, and broad cross-sector 
collaboration among industry, 
infrastructure providers, the police and 
other government security agencies, 
and academia. 
In the last few years we have seen a 
number of examples of how everything 
from pacemakers and cars to electricity 
generators, public transportation, or 
intellectual property may be exposed 
to criminal activity and destroyed from 
a distance - even from the other side 
of the globe. Thousands of events 
have brought up information security 
and cyber security to the public 
debate, including security breaches in 
government computer systems, lack 
of protection of personal information, 
loss of credit card information, and 
4 5 
espionage at high level. The virus that 
put 35,000 computers out of work 
in Saudi Aramco, the world’s largest 
oil company; the cyber attack on 
Georgia, ahead of Russia’s invading the 
country; industrial espionage against 
the Scandinavian telecom operator 
Telenor; the Americans’ access to 
communication information in other 
countries; the cyber attacks on the 
Nobel Institute and the International 
Monetary Fund (IMF), the nuclear 
enriching programmes of Iran and 
Estonia; a strong increase in identity 
theft and relentless attacks on our 
financial institutions; and the Swedish 
monitoring law (FRA) that provides the 
Swedish intelligence service full access 
to the content of communications 
of their neighbour countries that is 
transmitted across Swedish soil. 
It is said that what can go wrong will 
go wrong. ICT has opened up a whole 
new dimension of how things can go 
wrong - be it by themselves or due to 
malicious acts. We must be prepared.
6 EXAMPLES FROM AROUND 
THE WORLD 
1 
2 
3 
4 
5 
6 
While 20,000 Norwegians are exposed to pickpocketing every year, 
60,000 are victim of identity thefts that result in financial loss. 
In March 2013 the telecom operator Telenor announced that several of 
its senior management team had been subjected to extensive and 
organised cyber espionage. 
In the U.S. a cyber attack happens every three minutes on average. 
In December 2012, more than 55,000 computers at Saudi Aramco, 
the world’s largest oil company, were incapacitated by a virus attack. 
450,000 names and passwords were stolen from Yahoo in May 2012. 
After The New York Times investigated allegations of economic nepotism 
among the Chinese prime minister’s family members, the newspaper’s 
servers and a number of laptops were tapped over several months. The 
Washington Post, The Wall Street Journal and several other newspapers 
and news media have experienced similar espionage. 
Denial of Service attacks can be purchased online. The websites of 
the Nobel Committee were attacked when it awarded the Peace Price 
to a Chinese dissident in 2010, and later a number of organizations in 
Norway, including Norwegian security agencies, political parties, and 
businesses, experienced similar attacks. 
Iran’s nuclear program was delayed due to a targeted attack using the 
Stuxnet computer worm. When Norway joined military operations in 
Libya in 2011, the Norwegian Armed Forces were victim of a sophisti-cated 
6 7 
attack. 
“... an inadequate national focus on areas such 
as cyber security poses potential real threats 
to Norway’s security.” 
“We must confront new dangers, like cyber 
attacks, that threaten our nation’s infrastructure, 
businesses and people,” President Barack Obama 
wrote in his introduction message to the 2014 
budget. 
Our new, large and increasingly complex security 
challenges require efficiency in the development 
of resources, training and research, sophisticated 
and dynamically evolving study programmes and 
applied research, and well developed relations 
among stakeholders and good collaboration 
across sectors. 
However, the dramatic increase in cyber 
security challenges has demanded a focus on 
achieving operational capacity, creating a critical 
undercapacity in research and education. The 
funding for developing relevant skills and carrying 
out research is still limited, and collaborative 
relations between stakeholders and academia 
are poorly developed. All this is putting security 
stakeholders under pressure. 
Some countries have responded to these 
challenges. For instance, the U.S. state budget for 
2014 allocates $500 million to the Department of 
Homeland Security for cyber security research. 
In the Nordic countries the response has been 
slower. For instance, an independent international 
committee evaluating ICT research in Norway 
concluded that Norway’s inadequate national 
research strategy on cyber security “poses 
potential real threats to security in Norway.” 
To this concern, the Center for Cyber and 
Information Security (CCIS) is an answer.
United for a Security Center 
Gjøvik University College will establish a centre for information security with up to 80 employees and ten 
professors, with the participation of Defence, the National Police, Industry and Academia. 
Kjetil Nilsen, Director of National Security Authority, Benedicte Bjørnland, Director of the Police Security Service, 
Major General Roar Sundseth, Head of Cyber Defence, Odd-Reidar HumlegĂĽrd, Director of the Police Directorate 
Computerworld 11.06.2013, 
Text & Photo: Leif Martin Kirknes 
Odd Reidar HumlegĂĽrd, Director of The Norwegian Police Directorate congratulates Morten Irgens, Chair of CCIS 
8 9 
with the opening. 
4 university colleges are partners in CCIS
In Norway, key national cyber security stakeholders 
have initiated a partnership to establish the Center 
for Cyber and Information Security (CCIS), a national 
centre for research, training, and education in cyber and 
information security. 
Center for Cyber and Information Security will become 
one of the largest academic environments in cyber 
and information security in Europa and will position 
itself as a national resource and the contact point for 
international partners. 
10 11 
Statkraft is Europe’s largest generator of re-newable 
energy and is the leading power com-pany 
in Norway. The company owns, produces 
and develops hydropower, wind power, gas power 
and district heating. Statkraft is a major player in 
European power trading and has 3500 employees 
in more than 20 countries. Statkraft works actively 
with cyber security issues across all business areas 
and geographies. 
Statnett is the Norwegian TSO and is responsi-ble 
for Norway´s national electricity grid, an infra-structure 
that is increasingly becoming dependent 
on ICT for its operations. Statnett is constantly 
working to maintain a long-term information secu-rity 
strategy, and to strengthen the ability to deal 
with information security threats and incidents. 
Eidsiva Energy is a regional power producer 
and supplier, and the largest in the eastern part 
of Norway. Eidsiva has undertaken a particularly 
supportive role for developing competence in 
the Innland region. CCIS’ objectives and role are 
in line with Eidsiva’s efforts to strengthen its own 
security strategy. 
The Norwegian National Security Au-thority 
(NSM) is a cross-sectoral professional 
and supervisory authority within the protective 
security services in Norway. The authority is re-sponsible 
for the national cyber security, and oper-ates 
the national Computer Emergency Response 
Team (NorCERT). NSM delivers threat analyses 
on a national level, working with experts on cyber 
security and cryptology. 
The Norwegian Cyber Defence (CY-FOR) 
is the branch of the Norwegian Armed 
Forces responsible for protecting and defending 
military CIS in Norway. 
The Norwegian Defence Research 
Establishment (FFI) is Norway’s prime 
institution responsible for defense-related research 
and development. A prioritized task is to study 
challenges and opportunities related to informa-tion 
assurance and cyber systems. 
The Ministry of Justice and Public 
Security (JD) is responsible for societal se-curity 
and preparedness, crime prevention and 
correctional services, immigration, courts and the 
legislative work for law enforcement. 
The National Police Directorate (POD) 
is responsible for Norway’s police districts and 
special police agencies, with the exception of the 
Police Security Service (PST). POD has undertak- 
en responsibility for establishing closer contact 
between the police and the applied research 
sector in Norway. 
Watchcom Security Group is a long-term 
business partner specializing in cyber and 
information security, contributing to secure the 
common valuables of our society. Knowledge 
sharing is central to their business. 
The National Criminal Investigation 
Service (Kripos) is a special agency within 
the Norwegian Police Service with responsibil-ity 
for investigating organized crime and major 
crime. It is Norway’s contact point for Interpol 
and Europol and their respective competence 
centres for fighting cyber crime. 
The National Authority for Inves-tigation 
and Prosecution of Eco-nomic 
and Environmental Crime 
(ØKOKRIM) is the national authority for 
investigations, and prosecution of economic 
and environmental crime. Digital evidence is 
essential in its investigations, but the volume is 
strongly increasing. Økokrim will together with 
CCIS develop more advanced methodologies 
for information analyses to support the fight 
against crime. 
The Police Security Service (PST) is 
the police agency for home security in Norway. 
PST will contribute its insight and expertise 
to CCIS in order to increase national security, 
enhance the ability to ward off, understand and 
investigate incidents, and provide the Norwegian 
government with the best possible threat as-sessment 
and advice. 
Oslo Police District is the capital’s police 
district, and the nation’s largest with nearly 
2,600 employees. The Police Authority has a 
number of national tasks.The Police Authority 
has focused on using technology effectively in 
the solution of police work, and has built up a 
solid unit - Digital Forensics Unit - which 
primary role is to utilize the potential of the 
technology track. The Unit will collaborate 
closely with CCIS on developing new methods 
in forensics. 
The Norwegian ID Centre (NID) has a 
national responsibility for identity and document 
expertise. Norwegian ID Centre is a key part-ner 
to the Norwegian Biometrics Laboratory 
at CCIS. Norwegian ID Centre has a national 
responsibility for identity and document exper-tise. 
Norwegian ID Centre is a key partner to 
the Norwegian Biometrics Laboratory at CCIS.
12 13 
Telenor Group is one of the leading mobile 
operators in the world, with 172 million mobile 
subscriptions. Telenor has mobile operations 
in 13 markets, as well as an interest of 33 % in 
VimpelCom Ltd., operating in 17 markets. Telenor 
contributes into CCIS with its expertise in cyber 
security of electronic communications. 
Vestoppland Police District 
It is the district’s police – the local police – who 
meets the community every day and accounts 
for everyday preparedness in relation to crime 
prevention and community safety. Many cases 
begin with the local police and then taken over 
by specialist agencies. The local police must have 
modern skills to prevent, detect and prosecute 
serious crimes, but also in relation to more every-day 
challenges. 
mnemonic is one of the largest specialists in 
information security within the Nordic region. We 
supply products and services to some 
of the leading private and public sector enter-prises. 
Our services cover all areas of information 
security from risk management and 
application security to detecting, preventing and 
respond to security incidents via our service Ar-gus 
Managed Defence. 
NC–Spectrum delivers consultancy services in 
engineering, project development, and operation 
of infrastructure in the public and private sectors. 
NC-Spectrum works closely with its customers 
to develop cyber security for communication 
networks and critical infrastructure. 
PriceWaterhouse Coopers (PwC) is a 
multinational professional services firm. It pro-vides 
a range of integrated cyber security services. 
The International Business Machines 
Corporation (IBM) IBM is an American mul-tinational 
technology and consulting corporation. 
The company has several centres of expertise in 
cyber security. 
The Oppland County (OFK) has been an 
early supporter of CCIS, a financing agent and a 
strong and enthusiastic promoter of CCIS. The 
county council cooperates actively in the effort 
to improve information security in the county’s 
municipalities and businesses. 
The Norwegian Police University 
College (PHS) offers education a three-year 
bachelor program in police studies, in-service train-ing 
and post-graduate studies, including a master 
program in police science. PHS conducts research 
and development work in its areas. of focus. PHS 
has a central role in CCIS and contribute to the 
centre with expertise, research capacity and study 
programs in various aspects of cyber crime. 
Gjøvik University College (GUC) estab-lished 
its research group in information security 
11 years ago and built it up to become one of 
Europe’s largest open academic research groups in 
the field. Today GUC leads the National Research 
School in Information Security (COINS) and is 
offering dedicated undergraduate programmes in 
information security at bachelor, master and PhD 
level, in addition to its undergraduate programs at 
these three levels in Computer Science. GUC is 
host institution for CCIS, and provides CCIS with 
offices, ICT services and administrative support 
The Norwegian Defence Cyber 
Academy (FIH) FIH’s study program awards 
bachelor degrees in military education and de-velops 
research capacity in cyber defence. FIH 
cooperates closely with GUC. 
Lillehammer University College (LUC) 
established its bachelor program in law six years 
ago. LUC will be a cornerstone in CCIS’ work on 
developing a research group in privacy, cyber law 
and the connection information security and law. 
The Norwegian Centre for Information 
Security (NorSIS) has a national mandate to 
increase the information security expertise of in-dividuals 
and businesses through raising awareness 
about threats and vulnerabilities, disseminating spe-cific 
measures through the news, providing advice 
and guidance, and trying to influence positive at-titudes 
in information security. NorSIS’ participation 
in CCIS will enhance the centre’s ability to deliver 
a broad dissemination of knowledge and practices 
on information security and to this purpose it will 
collaborate with the local authorities and SMEs.
Photo: Anders Gimmestad Gule, Høgskolen i Gjøvik/CCIS 
OPENING CEREMONY 
25 partner organisations established on Friday 
15th August 2014 a national research and educa-tion 
14 15 
center for cyber and information security - 
Center for Cyber and Information Security - CCIS. 
The establishment of the centre was celebrated 
with an opening conference in Gjøvik that was 
attended by almost 300 participants. Many state-ments 
and presentations were made during the 
opening, including by Odd Reidar HumlegĂĽrd, the 
Norwegian Police Director; Kjetil Nilsen, Director 
of the National Security Authority; General Major 
Odd Egil Pedersen, Head of Cyber Defence; 
Berit Svendsen, CEO of Telenor; Bjørn Erik Thon, 
Director of the Data Inspectorate; Troels Oerting 
Joergensen, Head of Europol Computer Crime 
Research Center in the Netherlands; Kimmo 
Ulkuniemi, Assistant Director of the Cyber Crime 
Centre of Interpol in Singapore, and as well as 
several other. 
Four university colleges Gjøvik University College 
(GUC), Lillehammer University College (LUC), 
the Norwegian Defence University College 
(FIH), and the Police University College (PUC) 
collaborate through CCIS. GUC and PUC have 
established a common experience-based master’s 
degree in information security. The target group 
of applicants for the program are members of the 
police, military and other actors in the public and 
private sectors. In his speech, the principal of PUC, 
HĂĽkon Skulstad, emphasized on the importance of 
this agreement to confront the developments of 
crime. 
The Police Director, Odd Reidar HumlegĂĽrd, made a 
clear space for the Police in the center. HumlegĂĽrd 
stated that this investment in research would help to 
make sure that all the police agencies, including National 
Criminal Investigation Service (Kripos), Norwegian 
National Authority for Investigation and Prosecution of 
Economic and Environmental Crime (Økokrim), and the 
Police University College, attain their long-term goals. 
Defence was also decisively represented. “I, on behalf 
of the Chief of Defence, set two professorships avail-able 
for CCIS”, said the Chief of Cyber Defence, Major 
General Odd Egil Pedersen, and added, “the center 
will help to strengthen the knowledge in cyber security, 
assisting with education and expertise, and not least, 
will constitute an arena in which actors in the field can 
come together and share their knowledge, experiences 
and opinions for the common good”. 
Any actor alone cannot handle serious incidents in the 
cyber domain. “We believe that the establishment of 
CCIS will help to strengthen the nation’s ability to coun-ter 
the threat of cyber domain”, said Berit Svendsen, 
CEO of Telenor. 
“It is a great pleasure that so many actors of the soci-ety, 
both in the public and private sector, have seen the 
benefits of this powerful collaboration and contribute 
to pay salaries of researchers”, said Rector Jørn Wrold-sen 
from Gjøvik University College, the host institution. 
While he thanked partners for their support, Wroldsen 
expressed his hope for the government to take a politi-cal 
decision and provide funding to secure the long-term 
operation of the center. 
Photo: Anders Gimmestad Gule, Høgskolen i Gjøvik/CCIS
The 22 July Committee presents its report to the 
media 
BROAD POLITICAL SUPPORT 
CCIS has received strong interdisciplinary 
political support, including the direct and 
explicit support of several parliamentary 
committees and parliament’s documents. 
The White Paper 207 S, (2011-2012), 
from the Special Committee report to the 
Minister of Justice and Minister of Defence 
from the Parliament’s meeting held on 10 
November 2011, concerning the attacks 
22 July, explicitly and unanimously recom-mends 
16 17 
that the Centre receives support. 
(Chapter15, page15): “The Committee 
welcomes the establishment of the centre 
and believes that the government should 
assess how the centre can be supported 
to develop its work”. 
“The White Paper 29 (2011-2012) on 
societal security has a separate section on 
the centre’s initiative and describes a com-prehensive 
task force that has been set 
up to consider further actions (Chapter 9, 
page 107). The Justice Committee decided 
to emphasise this in its report. Recom-mendation 
of the Justice Committee on 
terror preparedness (NOU 2012:14 Fol-low 
up Report of 22 July Commission) 
emphasises the importance of establishing 
Norwegian expertise in information se-curity: 
“Especially the work carried out at 
GUC is of interest”, points out the Com-mittee 
in White Paper 207 S. 
The Government supports the centre with 
5 million NOK in 2014, from the Ministry 
of Justice and Public Security and the 
Ministry of Local Governments and 
Modernisation. 
6 REASONS WHY THE CENTER IS 
IMPORTANT 
The centre is important because an increasing amount of criminal activities 
are dependent on information and communication technologies (ICT). 
Crime, whether it takes place in cyberspace alone or not, most likely 
leaves digital traces. At the same time it is a challenge to find, understand, 
assemble and secure such evidence in a way that it safeguards individual 
rights and forensic correctness. 
The centre is important because the threat landscape changes. The 
increased mobility and open borders, climate change, increased 
unemployment and social pressures in Europe, resource scarcity, terrorism, 
pandemics and resistant infections, and Norway’s participation in 
international military operations all help to increase the possibility of criminal 
acts, attacks and terrorism against Norwegians, Norwegian infrastructure 
and interests. 
The centre is important because orivacy and security, two central citizen 
rights, are under pressure and need good technological, legal and societal 
understanding and research 
The centre is important because education, skills and research in cyber and 
information security will help to combat increasing threats, vulnerabilities 
and offences in the cyberspace. 
The centre is important because there is a need for extensive international 
cooperation and long-term research to prepare for tomorrow’s challenges. 
The centre is important because there is a need to educate and train new 
experts and to develop skills within the Norwegian central institutions, at 
the bachelor, master and PhD levels. 
1 
2 
3 
4 
5 
6
Wireless Security 
Legal Aspects of Information Security 
Financial Crime Investigation 
Ethical Hacking 
Privacy-Enhancing Technologies 
Image and Video Analysis 
Biometrics 
Security Administration 
Cloud Security 
Network Security 
Data Hiding 
Computational Forensics 
Risk Management ¡ 
Cryptology 
Digital Forensics 
Information Warfare 
Big Data Forensics 
Cyber Defense 
M e d i a S e c u r i t y Socio-technical Systems Security 
Malware and Botnet Detection 
The Center for Cyber and Information Security (CCIS) is not only a research 
centre. It establishes competence transfer across agencies, companies and 
sectors. It facilitates research projects that connects industry and government 
agencies with international research networks. It connects research with study 
programmes and students to research, linking operational environments to aca-demic 
study programmes and research. CCIS connects research, applications and 
Center for Cyber and 
Information Security 
18 19 
Authentication 
Web Security 
Protection of Critical Infrastructure 
Incidence Management Malware and Botnet Detection 
Information Warfare 
Security by Design 
Mobile Security 
U s a b i l i t y f o r S e c u r i t y 
Intrusion Detection 
and Prevention 
Information 
Management 
Every aspect of the challenge 
Cyber and Information Security is a discipline that must be understood in its full 
dimension, technological, psychological, social, economic, and organizational aspects 
interact and influence the outcome. Therefore, the centre promotes an exchange of 
knowledge and competence not only among academia and the applications areas, sectors, 
agencies and institutions, but also among the different fields in cyber and information 
security. Thus, CCIS academic degrees at bachelor, master and PhD level are specifically 
dedicated to information and cyber security. This is in contrast with how information 
security is taught at most other universities; as courses that are part of a computer science 
degree. 
APPLICATIONS 
RESEARCH 
CCIS 
DISSEMINATION 
TRAINING 
study programmes with communication and dissemination capabilities. 
EDUCATION
PhD in Information Security 
PhD in Computer Science 
Master in Information Security 
Master in Cyber Crime Investigation 
Master in Applied Computer Science 
Bachelor in Network Management 
Bachelor in Information Security 
Bachelor in Telematics 
Bachelor in Software Development 
Bachelor in Computer Engineering 
One year program in Information 
Security 
One year program in Software 
Development 
Courses & training packages 
Conferences, workshops, seminars 
12 Study programmes 
7 Study programmes dedicated to 
information security, cyber security, 
cyber defence and cybercrime, with: 
20 PhD students 
80 Master students 
240 Bachelor students 
20 21 
CCIS delivers, through its core partners, a 
number of Bachelor programs in information 
security, network management and computer 
science, as well as a BSc in Telematics at the 
Norwegian Defence Cyber Academy (FIH), 
also known as the education of the military’s 
“cyber warriors”. 
CCIS also delivers a MSc program in infor-mation 
security with three study tracks, in-formation 
security management, forensics, 
and security technologies. The centre is also 
delivering a flexible, experience-based master 
with a a study track in the investigation of 
digital evidence and cyber crime, a collabora-tion 
between the CCIS partners the Police 
University College (PHS) and GUC. 
CCIS’ dedicated information security pro-grams 
cover the full scope of cyber and 
information security. In addition, the 
centre has a number of associated com-puter 
sscience programs with security-oriented 
activities at all levels, including 
applications of image and video process-ing, 
games and mobile computing tech-nologies. 
The Centre’s PhD program in cyber and 
information security will have 15 PhD stu-dents 
at start up in 2014 and 25 students 
two years later. In addition, the centre will 
have a number of associated PhD students in 
computer security research. 
The centre provides flexible courses, training 
packages, corporate courses and lectures, in 
collaboration with the Norwegian Centre for 
Information Security (NorSIS). 
PhD i informatikk 
Center 
for Cyber and 
Information 
Security CCIS 
Gjøvik University College 
Police University College 
Norwegian Defence Cyber Academy 
NorSIS
National Academic Network 
22 23 
Core research partners in CCIS includes 
Gjøvik University College, the Police 
University College, the Norwegian 
Defence Cyber Academy, and the Nor-wegian 
Defence Research Establishment. 
CCIS is developing substantial collabora-tion 
between these, on research, degree 
programmes, research network develop-ment, 
and international training programs. 
Each academic partner has quite different 
international networks, giving a strong 
potential for innovative international col-laborations 
and research projects. 
CCIS leads the Norwegian Research 
School of Computer and Information 
Security (COINS). COINS integrates 
Norwegian research groups in 
Information Security to a larger entity by 
integrating the course portfolio for 
research school members, builds stronger 
relationships between doctoral students 
in the network, establishes more incen-tives 
to excel and increases student mo-bility 
through access to a larger network. 
COINS also increases Norway’s interna-tional 
student mobility, hosts internation-ally 
recognised researchers, and offers 
“free flow of goods and services” in Infor-mation 
Security Research in Norway. At 
any time, 40 PhD students are members 
of COINS. 
COINS provides a significant added value 
to PhD students at CCIS, while CCIS 
provides COINS with a strong national 
and international network, including busi-nesses, 
end users, and security agencies. 
PhD i informatikk 
Norwegian University of Science and Technology - NTNU 
University of Agder 
University of Stavanger 
University of Tromsø 
University of Bergen 
University of Oslo 
Gjøvik University College 
Police University College 
Norwegian Defence Cyber Academy 
Lillehammer University College 
COINS: 
National Research 
School of Computer 
and Information 
Security 
CCIS: 
Center 
for Cyber and 
Information 
Security
Information Security 
Management 
Group 
24 25 
Research Groups 
The centre covers all major areas of information and cyber security. Multidisciplinary expertise is assembled in 
research groups and labs to address specific application areas. Other research groups will be established, includ-ing 
information security in the health sector, product and software security and cyber security Innovation. 
The Norwegian 
Biometrics 
Laboratory 
Center 
for Cyber and 
Information Security 
CCIS 
Critical Information 
Infrastructure 
Protection Group 
Norwegian Cyber 
Defence 
Research Group 
Testimon Forensics 
Research Group 
Testimon Forensics Research Group 
Digital evidence derived from information and 
communication technology using forensics tech-niques 
is playing an increasingly important role, 
e.g. in corporate compliance activities, criminal 
investigations, counter terrorism and intelligence 
operations. Technologies such as Cloud Computing, 
online Social Networks, the growing use of mobile 
and embedded devices as well as cross-border 
multi-jurisdictional collaboration on digital evidence 
and forensic readiness, pose challenges. The volume, 
velocity and variety of data is increasing exponen-tially. 
For example, sensor signals in the Internet of 
Things, text documents, images or audio-video data, 
are produced, shared and consumed using many 
heterogeneous devices, communication technolo-gies, 
and software applications. This presents a scale 
and complexity that demands continuous improve-ment 
of the methods and techniques applied in dig-ital 
investigations, i.e. to prevent, detect and analyze 
fraud and criminal activities. 
The research conducted in the CCIS / Testimon 
Forensics Group (Testimon) aims to gain new 
knowledge, to derive legal & privacy regulations, to 
develop and to evaluate novel techniques, that will 
address the aforementioned challenges in both the 
state-of-the-art and the state-of-the-practice. Cur-rent 
activities include, but are not limited to: 
* Gain new knowledge on large-scale fraud detec-tion, 
crime investigation & prevention in compliance 
with privacy and legal regulations. 
* Explore socio-technical controls to balance 
forensics-by-design & privacy-by-design. 
* Work towards sustainable investigation methods 
that follow sound forensic principles. 
* Develop software methods & infrastructures to 
increase efficiency in large-scale forensic investiga-tions. 
* Support search & analysis through terabytes of 
electronic data stored within closed systems and 
open Internet. 
Unique study and training programs are made avail-able 
by Testimon through the close cooperation 
among its partners within CCIS, i.e. 
* PhD in Information Security / Digital and Compu-tational 
Forensics 
* Master of Science in Information Security / Digital 
Forensics and Cyber Crime Investigation 
* Experience-Based Master of Science in Informa-tion 
Security / Digital Forensics and Cyber Crime 
Investigation 
* Nordic Computer Forensics Investigators (Mod-ule 
1 & 2) 
Partners within the Testimon Forensics Group 
bring in diverse backgrounds and expertise from 
academia, the public and private sector. Most 
prominent are the Norwegian police agencies, i.e. 
the Norwegian Police University College (Politihøg-skolen), 
Norway’s National Criminal Investigation 
Service (KRIPOS), the Norwegian National Security 
Authority (NSM), the Norwegian National Author-ity 
for Investigation and Prosecution of Economic 
and Environmental Crime (ØKOKRIM), the Norwe-gian 
Police Directorate (POD), and other regional 
law enforcement agencies, e.g. the Oslo Politidistrikt 
and Vestoppland Politidistrikt. 
Since its beginning Testimon is evolving steadily. It 
was established originally as academic research 
group under the Norwegian Information Security 
Laboratory (NISlab) in 2010, and is today recog-nized 
nationally and internationally. For example, 
Testimon maintains close collaborations with the 
Netherlands Forensics Institute (NFI), The Neth-erlands, 
Ericsson, Sweden, the University College 
Dublin (UCD), Irland, the National Institute of 
Standards and Technology (NIST), USA, the Uni-versity 
of California Santa Cruz (UCSC), USA, the 
Kyushu Institute of Technology (Kyutech), Japan, the 
Center for Advanced Security Research Darmstadt 
(Cased), and the Ecole polytechnique federale de 
Lausanne (EPFL), Switzerland. 
The Norwegian Biometrics Laboratory 
The activity in the biometrics group in CCIS is 
based around the Norwegian Biometrics Labora-tory 
(NBL, (http://www.nislab.no/biometrics_lab)
and its long lasting partnership with the Norwegian 
ID Centre. 
NBL is a discussion forum to brainstorm, to gener-ate 
new ideas and projects and to present interme-diate 
results. The group represents an active focus 
point with currently four international research 
projects. Further it is the intention to increase the 
awareness of biometrics in Norway via the Nor-wegian 
Biometric Forum (http://www.frisc.no/frisc-biometrics- 
forum/) and its potential involvement in 
the Norwegian legislation and to contribute to the 
international standardization in the field. Along this 
intention the biometrics group will host in 2015 the 
International Standardisation conference of ISO/ 
IEC JTC1 SC37, which will run from June 22 to 26, 
2015. 
NBL is an active member in the European Associa-tion 
for Biometrics and co-organizer of the interna-tional 
conference BIOSIG as well as participating in 
the organization of other biometric events like the 
IEEE ICB, IEEE IJCB, IEEE IIH-MSP. Moreover NBL 
represents Norway in the European expert net-work 
COST Action IC1106 and furthermore NBL 
26 27 
is hosting the COST Action International Work-shop 
on Biometrics and Forensics on March 3 and 
4, 2015. 
The biometric research is covering various physio-logical 
and behavioral biometrics including 2D- and 
3D-face recognition, iris and eye recognition, finger-print 
recognition, finger vein recognition, ear recog-nition, 
signature recognition, gait recognition, key-stroke 
recognition, gesture recognition and mouse 
dynamics. The research activities of NBL are also 
presented during its annual workshop (NBLAW), 
which will take place on March 2, 2015. 
Furthermore NBL focuses on privacy enhancing 
technologies such as biometric template protec-tion 
and integration in physical and logical access 
control. The lab serves also as independent testing 
institution for biometric performance evaluations 
based on its in-house biometric databases. 
The Information Security Management 
Group 
In an ever more rapidly digitized connect world 
Cyber- and information security threats, vulner-ability, 
risks and solutions to protect our digital and 
non-digital assets need to be continuously modeled, 
measured, evaluated and managed. The Information 
Security Management Group performance both 
theoretical, empirical and applied research on the 
modeling measuring and managing of technical and 
procedural problems and solutions in the informa-tion 
security management area. 
The group has a special responsibility for the in-formation’s 
security management track of the MSc 
at University College Gjøvik. Consequently it’s 
research based teaching methods bring together a 
broad spectrum of socio-technical systems security 
research results that cover the social, organizational, 
psychological, legal, ethical, cultural, political, rhetori-cal 
educational and technical aspect of cyber- and 
information security management. 
Dissemination of both solutions and problems in 
the information security management area are 
an important focus of the group. Members of the 
group cooperate closely with NorSIS and partici-pate 
in the Norwegian National Information Se-curity 
Month, which is held in October every year. 
They also assist NorSIS in the Information Security 
Top Leader Round table discussions that are held 3 
times a year. 
On the research front members of the group are 
part of the Norwegian Forum for Research and In-novation 
in Security and Communications (FRISC) 
which primary role is to be a meeting place for 
Norwegian information security researcher to share 
and exchange ideas. 
Critical Information Infrastructure 
Protection Group 
The CCIS Security of Critical Infrastructures (SCI) 
group was formed around a long-standing research 
group at Gjøvik University College studying se-lected 
aspects of the security and dependability of 
critical infrastructures at different abstraction levels 
ranging from national level and supranational de-pendency 
and interdependency models to proto-cols, 
sensor, and actuator security in process control 
systems. 
The SCI group was established in collaboration 
with and is supported by industrial partners includ-ing 
Statnett, Statkraft, Eidsiva, Telenor, and NC-Spec-trum 
with a strong research track record in the 
telecommunications and energy sectors. Research 
in the SCI group also has strong and natural syner-gies 
with the CCIS Cyber Defence group (CDG), 
and also collaborates closely with national authori-ties 
and international organisations. Critical infra-structures 
pose a number of highly interesting and 
challenging research problems. 
Many are inherently cyber-physical systems and re-quire 
an in-depth understanding of the often non-linear 
coupling and underlying models to capture all 
threats and vulnerabilities. 
Even the failure of a single critical infrastructure by 
definition has grave consequences up to loss of 
life or severe economic impact, but in many cases 
— particularly for energy and telecommunications 
- strong interdependencies would cause cascading 
failures. Such failure modes must be understood 
and mitigated where possible, requiring not only 
the study of interactions within and among infra-structures, 
but also of possible responses when co-ordination 
and control is hampered or even actively 
targeted. 
Threats range from random faults to deliberate at-tacks 
by non-state and state actors, which must be 
assumed to have substantial resources at their dis-posal 
and may prepare attacks over a long period. 
Beyond purely technical issues, a further key chal-lenge 
to understanding threats but also for dealing 
with incidents and attacks is the timely and efficient 
sharing of relevant information that will often need 
to transcend individual organisations or even sec-tors. 
As many infrastructure sectors are privately owned 
and operated, such information may be com-mercially 
sensitive, whilst sharing intelligence from 
national authorities also raises operational and 
technical challenges. The CCIS SCI group seeks to 
address these core challenges in close collaboration 
with national and international partners. 
Norwegian Cyber Defence 
Research Group 
The research group specializes in various aspects 
of national cyber. It draws its members from the 
Norwegian Cyber Defence, GUC, the Norwegian 
Defence Research Establishment (FFI) and the Nor-wegian 
Defence Cyber Academy (FIH). The group 
contributes to the BSc, MSc and PhD programs 
in information security at GUC and FIH’s BSc in 
telematics, known as the “cyber warrior” education. 
The implementation of network based defence has 
introduced both new opportunities and threats in 
military operations. 
The improvements in communication networks, 
information management systems and operational 
awareness comes at the cost of increased depend-ability 
of commercial off the shelf products, in-creased 
dependability of civilian infrastructure and 
larger systemic exposure surface. The Cyber De-fence 
group should conduct research that increased 
an organizations ability to administrate, operate and 
defend their ICT-systems, networks and technologi-cal 
platforms.
Associated Groups and Organizations 
The Media Technology Laboratory 
(MTL) 
CCIS shares offices with the Media Technology 
Lab. MTL delivers research and study programs 
(on BSc, MSc and PhD level) in various areas of 
computer science. Of particular interest to CCIS 
is its research in mobile security, biometric meth-ods, 
user design for security and safety applica-tions 
of augmented reality, mobile phones, tablets, 
game consoles, digital interfaces and visors (e.g. 
Google glasses). MTL’s Colour and Vision Re-search 
Laboratory works in security with applica-tions 
such as video analysis of gait recognition and 
the design of counterfeit-resistant bank notes. 
NorSIS 
CCIS will share offices with the Norwegian 
Centre for Information Security (NorSIS). NorSIS is 
part of the Norwegian Government’s overall com-mitment 
to information security and reports to the 
Ministry of Justice and Public Security. NorSIS works 
to ensure that information security becomes a natu-ral 
part of every day’s life of citizens and businesses 
through raising awareness about threats and vulner-abilities 
and informing on security measures, NorSIS 
operates the online service slettmeg.no and the na-tional 
identity theft project. With NorSIS, CCIS gets a 
partner highly experienced in communication, with an 
excellent network of SMEs, Norwegian municipalities 
and governmental agencies. NorSIS and CCIS will col-laborate 
on media management, marketing resources, 
research dissemination, conferences and workshops. 
CCIS and NorSIS will in collaboration continue to 
deliver the Top Level Security Meeting which brings 
together security chief executives for discussions un-der 
28 29 
Chatham House Rule. 
Electro Section 
CCIS shares campus with the Section of Elec-tronics 
at GUC. In particular, the Electro Section 
supports CCIS in a number of security areas, 
including investigations of electronic equipment 
in criminal cases, electronic implementations of 
biometrics methods, combination of biometrics, 
Near Field Communication and mobile phones, 
and random number generation in programmable 
logic. The Electro Section has several associ-ate 
professors with PhD degrees in information 
security. 
Health Care and Nursing 
CCIS shares campus location at GUC with the 
Faculty of Health Care and Nursing, which devel-ops 
expertise in patient safety and security, includ-ing 
information security in the health sector. 
FRISC 
CCIS works in close collaboration with the 
Forum for Research and Innovation in Security 
and Communications (FRISC), a value network 
supported by the Norwegian Research Council. 
The mission of FRISC is to create meeting places 
for research and innovation in information securi-ty 
where information sharing and the value-added 
utilization of results can happen with an interna-tional 
perspective. 
Health Care 
The Norwegian 
Biometrics 
Laboratory 
Center 
for Cyber and 
Information 
Security CCIS 
Critical Information 
Infrastructure 
Protection Group 
Information Security 
Management 
Group 
Testimon Forensics 
Research Group 
Media Technology 
Laboratory FRISC 
Forum for 
Research & Innovation 
in Security and 
COINS Research Communications 
School 
Electro Section 
NorSIS 
Norwegian Centre 
for Information 
Security 
Norwegian Cyber 
Defence 
Research Group
30 31 
CCIS 
50% presence at CCIS 
Developing cross-sectoral projects 
Developing curricula 
Identifying student resources 
Developing research networks 
Attracting team members 
Partner-funded researchers develop the col-laboration 
between CCIS, its partners and 
networks and the funding partner organiza-tion. 
“Partner researchers” have the responsi-bility 
to help recruiting talented students for 
partner institutions, influence the develop-ment 
of degree programs in a direction that 
best supports the partner institution’s needs, 
and connect partner organization to the 
Centre’s other partners and to international 
networks. 
Scientists who build bridges 
THE PARTNER INSTITUTION 
50% presence at the partner institution 
Identifying skills and competence needs 
Identifying potential projects 
Mobilizing the partner’s professional network 
Attracting team participants 
Partner researchers will support the partner 
institutions in their long term strategic 
development, and are responsible for 
identifying their needs for competence 
development and research. 
Partner researchers recruit 
resources and networks to 
CCIS projects.
A partner researcher shall draw on resources at 
the partner institution and CCIS to develop a 
team that will contribute to activities 
and projects that will further the ob-jectives 
of the partner and CCIS in the 
particular focus areas of the partner. 
Team members comes from the partner institution, 
as well as doctoral candidates, researchers, PhD 
students, master students, bachelor students and 
experts, at CCIS and among CCIS’ partners and 
their networks. The partner researcher is expect-ed 
to spend some time doing fundraising and write 
CCIS emphasizes good collaboration in an excellent 
PhD-student 
Master student 
Domain Expert from partner 
organization 
32 33 
proposals to finance the team. 
PhD-student 
Guest researcher 
Associate professor 
Professor 
Post-Doc candidate 
Researchers who build teams 
research environment, where social challenges, 
professional dialogue, and cooperation 
are central. CCIS focus 
on eminent research and professional 
development that connect partner organizations, 
engineers, security experts, leading expertise and top 
scholars. It also closely connects applied research, 
teaching and real world information security 
experience and needs. This calls for a 
good organization that include research 
groups, focus laboratories, 
professional groups, and a 
good cooperation rhythm. 
Technician
MORE REASONS WHY 
CCIS IS IMPORTANT 
CCIS is important because society as a whole and its critical infrastructure have 
become completely dependent on ICT, and therefore dependent on ICT security 
- from command and control systems, financial structures, food production, food 
distribution, banking, payroll and electricity distribution to hospital management, and 
transportation. 
CCIS is important because the consequences of security breaches have become 
very high. 
CCIS is important because inadequate information security costs society large 
amounts of financial resources. The global cost of cyber crime is estimated to be 
between 0.4% and 1.4% of global GDP. 
CCIS is important because an arena for knowledge exchange across information 
security actors, including defence, law enforcement, police, administration, finance, 
and business, is necessary for developing effective security capacity. 
CCIS is important because effective information security measures rely on under-standing 
the security interdepence of technological, economical, legal and political 
measures. 
CCIS is important because information security actors, including security agencies 
and businesses, have much to gain from collaborating with long-term research, while 
research has much to gain from learning from the so-called “real world”. 
CCIS is important because security has become a necessary part of products and 
services. Insufficient security can drive products and firms off the market. High 
cyber security gives manufacturing companies higher uptimes, shorter delivery times 
and improved margins. 
CCIS is important because information security in itself is a large global market, both 
for products and services. 
CCIS is important because it will give its participants, who have significant national 
importance, increased cyber and information security competence. 
CCIS is important because it will increase the number of students in information 
security at all levels. 
34 35 
7 
89 
10 
11 
12 
13 
14 
15 
16 
Delivery 
2 years 
CCIS will have 
-established a research 
group on cyber crime 
-established a research 
group on cyber defence 
-established a research 
group on cyber security of 
critical infrastructure 
-strengthened and 
integrated degree programs 
in information security 
-started an experience-based 
master’s program on 
cyber crime investigation 
-established the presence 
of 25 PhD students at the 
centre and 64 associated 
via COINS, two post-doc-toral 
candidates, 40 master 
students and 240 under-graduates 
4 years 
CCIS will have 
-become a strong support 
for the Norwegian authori-ties 
in their national and 
international work on cyber 
security 
-established a research 
group in privacy and cyber 
aspects of rule of law 
- established a Nordic Cen-tre 
of Expertise in Cyber 
Crime Prevention and Inves-tigation 
-recruited 30 PhD students 
at the Centre and with 90 
associated via COINS, and 
10 postdoctoral candidates 
-recruited 25 partners 
8 years 
CCIS will have 
-been on track to eliminate 
society’s critical shortage of 
experts 
-led the Norwegian re-search 
in cyber security 
from being fragmented into 
being a national consolida-tion 
of meeting space for 
the dissemination of re-search 
and innovation 
-established a centre for 
cyber security innovation 
to help industry partners 
turn the results from CCIS 
into commercially successful 
products and services 
The Center for Cyber and Information Security (CCIS) 
works continually to obtain additional financing for projects 
and research groups and laboratories.
Š 2014 Center for Cyber and Information Security 
Contact information: 
Morten Irgens, Chair of the interim board 
morten.irgens@ccis.no, +47 46 54 19 41 
Nils Kalstad Svendsen, 
Dean of IMT, Gjøvik University College 
(NISlab), nils.svendsen@ccis.no, +47 454 92 425 
Thank you for your interest. CCIS is a 
resource for its partners and collaborators. 
Your comments and ideas on how CCIS 
can be made even better will be most 
appreciated. CCIS invites your organisation 
to participate as partner. 
www.ccis.no 
facebook.com/centerforcis 
twitter.com/ccisno 
36

More Related Content

Similar to CCIS Brochure English (Nov 2014)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
Mark Johnson
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspects
ijtsrd
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
Omer Coskun
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
sabrangsabrang
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
jessiehampson
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
Settapong_CyberSecurity
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
Fahmi Albaheth
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
Charles Mok
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
ijtsrd
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 

Similar to CCIS Brochure English (Nov 2014) (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspects
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

CCIS Brochure English (Nov 2014)

  • 1. Center for Cyber and Information Security a shared commitment to the nation’s research and expertise development
  • 2. ccis.no Welcome! The Center for Cyber and Information Security 2 3 We read daily about things that should worry us but we barely understand. Identity theft, industrial espionage, cybercrime, online extor-tion, cyberwar, cyberattack, data leak, international surveillance programs, and challenges to privacy. Our modern societies have become totally dependent on computer based information and communica-tion technologies (ICT), and thus on their robustness and resilience against accidents and crimes. Today, compu-ter systems control everything from traffic lights and surgical equipment in hospitals to telephone communications and electricity distribution. Further more, computer systems harbours information and knowledge that must be sheltered from unauthorized access; including engineering solutions, business secrets, information about your bank accounts, defense secrets, purchasing habits and emails. This is about you, it is about what kind of society you want to live in, it is about your company’s ability to survive, and it is about our govern-ment’s ability to protect us, to protect our welfare and to protect our privacy. All countries today need to develop their education and research capacity to meet this future. As a significant national contribution, a number of organizations have partnered to create a center for research and education in information and cyber security in Norway. By the end of 2014, the center will have a core group of 25 scientists of a total of 70-80 people, including non-permanent and adjunct positions as for instance Ph.D. students and post-docs. In addition, there will be 200-300 bachelor and master students at the Centre. August 15, 2014, we officially opened the center. find very inte-resting. With regards, The National Police Directorate, Eidsiva, the Norwegian National Security Authorities, the Norwegian Cyber Defence, the Police ICT Service, the National Criminal Investigation Service - Kripos, the National Authority for Investigation and Prosecution of Economic and Environmental Crime - Økokrim, the Police University College, the Norwegian Defence Cyber Academy, the Norwegian Defence Research Establishment - FFI, Gjøvik University College, Telenor, Statkraft, Statnett, mnemonic, IBM, PwC, Oppland County, Lillehammer University College, the Norwegian National Identity Center, Oslo Police District, the Police Security Service, NC-Spectrum, Vestoppland Police District, Watchcom Security Group, the Norwegian Centre for Information Security - NorSIS. will strengthen our expertise and skills to prevent, detect, respond to, and investigate undesirable and criminal computer based ac-tivities. The centre will undertake actions towards: • Building research capacity and research groups at top level interna-tionally in disciplines that are relevant for our partners and for Nor-way. • Providing training and study programs of high quality and with great societal relevance. • Contributing to Norway’s international collaboration where partners can participate and apply their knowledge and expertise. • Helping to increase the recruitment of students and researchers for the Norwegian education and training in security and for research environments. • Contributing to the long term competence development strategy and research and education strategy. • Cooperating with and contributing to organizations whose mission is to inform and raise awareness about security. • Strengthening cooperation, exchanging knowledge, and sharing of skills among sectors, among application/innovation environments, among academic institutions, and among national and international projects, centres and organizations. • Becoming a knowledge and expertise node in Europe’s ability to compete for international research funding.
  • 3. OUR INCREASED VULNERABILITY Our increased reliance on Information and Communication Technologies (ICT) will create in the years ahead new, large, and increasingly complex security challenges; confronting these challenges will require an increased focus on higher education, more efficiency in resource development, improved research capacity, and broad cross-sector collaboration among industry, infrastructure providers, the police and other government security agencies, and academia. In the last few years we have seen a number of examples of how everything from pacemakers and cars to electricity generators, public transportation, or intellectual property may be exposed to criminal activity and destroyed from a distance - even from the other side of the globe. Thousands of events have brought up information security and cyber security to the public debate, including security breaches in government computer systems, lack of protection of personal information, loss of credit card information, and 4 5 espionage at high level. The virus that put 35,000 computers out of work in Saudi Aramco, the world’s largest oil company; the cyber attack on Georgia, ahead of Russia’s invading the country; industrial espionage against the Scandinavian telecom operator Telenor; the Americans’ access to communication information in other countries; the cyber attacks on the Nobel Institute and the International Monetary Fund (IMF), the nuclear enriching programmes of Iran and Estonia; a strong increase in identity theft and relentless attacks on our financial institutions; and the Swedish monitoring law (FRA) that provides the Swedish intelligence service full access to the content of communications of their neighbour countries that is transmitted across Swedish soil. It is said that what can go wrong will go wrong. ICT has opened up a whole new dimension of how things can go wrong - be it by themselves or due to malicious acts. We must be prepared.
  • 4. 6 EXAMPLES FROM AROUND THE WORLD 1 2 3 4 5 6 While 20,000 Norwegians are exposed to pickpocketing every year, 60,000 are victim of identity thefts that result in financial loss. In March 2013 the telecom operator Telenor announced that several of its senior management team had been subjected to extensive and organised cyber espionage. In the U.S. a cyber attack happens every three minutes on average. In December 2012, more than 55,000 computers at Saudi Aramco, the world’s largest oil company, were incapacitated by a virus attack. 450,000 names and passwords were stolen from Yahoo in May 2012. After The New York Times investigated allegations of economic nepotism among the Chinese prime minister’s family members, the newspaper’s servers and a number of laptops were tapped over several months. The Washington Post, The Wall Street Journal and several other newspapers and news media have experienced similar espionage. Denial of Service attacks can be purchased online. The websites of the Nobel Committee were attacked when it awarded the Peace Price to a Chinese dissident in 2010, and later a number of organizations in Norway, including Norwegian security agencies, political parties, and businesses, experienced similar attacks. Iran’s nuclear program was delayed due to a targeted attack using the Stuxnet computer worm. When Norway joined military operations in Libya in 2011, the Norwegian Armed Forces were victim of a sophisti-cated 6 7 attack. “... an inadequate national focus on areas such as cyber security poses potential real threats to Norway’s security.” “We must confront new dangers, like cyber attacks, that threaten our nation’s infrastructure, businesses and people,” President Barack Obama wrote in his introduction message to the 2014 budget. Our new, large and increasingly complex security challenges require efficiency in the development of resources, training and research, sophisticated and dynamically evolving study programmes and applied research, and well developed relations among stakeholders and good collaboration across sectors. However, the dramatic increase in cyber security challenges has demanded a focus on achieving operational capacity, creating a critical undercapacity in research and education. The funding for developing relevant skills and carrying out research is still limited, and collaborative relations between stakeholders and academia are poorly developed. All this is putting security stakeholders under pressure. Some countries have responded to these challenges. For instance, the U.S. state budget for 2014 allocates $500 million to the Department of Homeland Security for cyber security research. In the Nordic countries the response has been slower. For instance, an independent international committee evaluating ICT research in Norway concluded that Norway’s inadequate national research strategy on cyber security “poses potential real threats to security in Norway.” To this concern, the Center for Cyber and Information Security (CCIS) is an answer.
  • 5. United for a Security Center Gjøvik University College will establish a centre for information security with up to 80 employees and ten professors, with the participation of Defence, the National Police, Industry and Academia. Kjetil Nilsen, Director of National Security Authority, Benedicte Bjørnland, Director of the Police Security Service, Major General Roar Sundseth, Head of Cyber Defence, Odd-Reidar HumlegĂĽrd, Director of the Police Directorate Computerworld 11.06.2013, Text & Photo: Leif Martin Kirknes Odd Reidar HumlegĂĽrd, Director of The Norwegian Police Directorate congratulates Morten Irgens, Chair of CCIS 8 9 with the opening. 4 university colleges are partners in CCIS
  • 6. In Norway, key national cyber security stakeholders have initiated a partnership to establish the Center for Cyber and Information Security (CCIS), a national centre for research, training, and education in cyber and information security. Center for Cyber and Information Security will become one of the largest academic environments in cyber and information security in Europa and will position itself as a national resource and the contact point for international partners. 10 11 Statkraft is Europe’s largest generator of re-newable energy and is the leading power com-pany in Norway. The company owns, produces and develops hydropower, wind power, gas power and district heating. Statkraft is a major player in European power trading and has 3500 employees in more than 20 countries. Statkraft works actively with cyber security issues across all business areas and geographies. Statnett is the Norwegian TSO and is responsi-ble for Norway´s national electricity grid, an infra-structure that is increasingly becoming dependent on ICT for its operations. Statnett is constantly working to maintain a long-term information secu-rity strategy, and to strengthen the ability to deal with information security threats and incidents. Eidsiva Energy is a regional power producer and supplier, and the largest in the eastern part of Norway. Eidsiva has undertaken a particularly supportive role for developing competence in the Innland region. CCIS’ objectives and role are in line with Eidsiva’s efforts to strengthen its own security strategy. The Norwegian National Security Au-thority (NSM) is a cross-sectoral professional and supervisory authority within the protective security services in Norway. The authority is re-sponsible for the national cyber security, and oper-ates the national Computer Emergency Response Team (NorCERT). NSM delivers threat analyses on a national level, working with experts on cyber security and cryptology. The Norwegian Cyber Defence (CY-FOR) is the branch of the Norwegian Armed Forces responsible for protecting and defending military CIS in Norway. The Norwegian Defence Research Establishment (FFI) is Norway’s prime institution responsible for defense-related research and development. A prioritized task is to study challenges and opportunities related to informa-tion assurance and cyber systems. The Ministry of Justice and Public Security (JD) is responsible for societal se-curity and preparedness, crime prevention and correctional services, immigration, courts and the legislative work for law enforcement. The National Police Directorate (POD) is responsible for Norway’s police districts and special police agencies, with the exception of the Police Security Service (PST). POD has undertak- en responsibility for establishing closer contact between the police and the applied research sector in Norway. Watchcom Security Group is a long-term business partner specializing in cyber and information security, contributing to secure the common valuables of our society. Knowledge sharing is central to their business. The National Criminal Investigation Service (Kripos) is a special agency within the Norwegian Police Service with responsibil-ity for investigating organized crime and major crime. It is Norway’s contact point for Interpol and Europol and their respective competence centres for fighting cyber crime. The National Authority for Inves-tigation and Prosecution of Eco-nomic and Environmental Crime (ØKOKRIM) is the national authority for investigations, and prosecution of economic and environmental crime. Digital evidence is essential in its investigations, but the volume is strongly increasing. Økokrim will together with CCIS develop more advanced methodologies for information analyses to support the fight against crime. The Police Security Service (PST) is the police agency for home security in Norway. PST will contribute its insight and expertise to CCIS in order to increase national security, enhance the ability to ward off, understand and investigate incidents, and provide the Norwegian government with the best possible threat as-sessment and advice. Oslo Police District is the capital’s police district, and the nation’s largest with nearly 2,600 employees. The Police Authority has a number of national tasks.The Police Authority has focused on using technology effectively in the solution of police work, and has built up a solid unit - Digital Forensics Unit - which primary role is to utilize the potential of the technology track. The Unit will collaborate closely with CCIS on developing new methods in forensics. The Norwegian ID Centre (NID) has a national responsibility for identity and document expertise. Norwegian ID Centre is a key part-ner to the Norwegian Biometrics Laboratory at CCIS. Norwegian ID Centre has a national responsibility for identity and document exper-tise. Norwegian ID Centre is a key partner to the Norwegian Biometrics Laboratory at CCIS.
  • 7. 12 13 Telenor Group is one of the leading mobile operators in the world, with 172 million mobile subscriptions. Telenor has mobile operations in 13 markets, as well as an interest of 33 % in VimpelCom Ltd., operating in 17 markets. Telenor contributes into CCIS with its expertise in cyber security of electronic communications. Vestoppland Police District It is the district’s police – the local police – who meets the community every day and accounts for everyday preparedness in relation to crime prevention and community safety. Many cases begin with the local police and then taken over by specialist agencies. The local police must have modern skills to prevent, detect and prosecute serious crimes, but also in relation to more every-day challenges. mnemonic is one of the largest specialists in information security within the Nordic region. We supply products and services to some of the leading private and public sector enter-prises. Our services cover all areas of information security from risk management and application security to detecting, preventing and respond to security incidents via our service Ar-gus Managed Defence. NC–Spectrum delivers consultancy services in engineering, project development, and operation of infrastructure in the public and private sectors. NC-Spectrum works closely with its customers to develop cyber security for communication networks and critical infrastructure. PriceWaterhouse Coopers (PwC) is a multinational professional services firm. It pro-vides a range of integrated cyber security services. The International Business Machines Corporation (IBM) IBM is an American mul-tinational technology and consulting corporation. The company has several centres of expertise in cyber security. The Oppland County (OFK) has been an early supporter of CCIS, a financing agent and a strong and enthusiastic promoter of CCIS. The county council cooperates actively in the effort to improve information security in the county’s municipalities and businesses. The Norwegian Police University College (PHS) offers education a three-year bachelor program in police studies, in-service train-ing and post-graduate studies, including a master program in police science. PHS conducts research and development work in its areas. of focus. PHS has a central role in CCIS and contribute to the centre with expertise, research capacity and study programs in various aspects of cyber crime. Gjøvik University College (GUC) estab-lished its research group in information security 11 years ago and built it up to become one of Europe’s largest open academic research groups in the field. Today GUC leads the National Research School in Information Security (COINS) and is offering dedicated undergraduate programmes in information security at bachelor, master and PhD level, in addition to its undergraduate programs at these three levels in Computer Science. GUC is host institution for CCIS, and provides CCIS with offices, ICT services and administrative support The Norwegian Defence Cyber Academy (FIH) FIH’s study program awards bachelor degrees in military education and de-velops research capacity in cyber defence. FIH cooperates closely with GUC. Lillehammer University College (LUC) established its bachelor program in law six years ago. LUC will be a cornerstone in CCIS’ work on developing a research group in privacy, cyber law and the connection information security and law. The Norwegian Centre for Information Security (NorSIS) has a national mandate to increase the information security expertise of in-dividuals and businesses through raising awareness about threats and vulnerabilities, disseminating spe-cific measures through the news, providing advice and guidance, and trying to influence positive at-titudes in information security. NorSIS’ participation in CCIS will enhance the centre’s ability to deliver a broad dissemination of knowledge and practices on information security and to this purpose it will collaborate with the local authorities and SMEs.
  • 8. Photo: Anders Gimmestad Gule, Høgskolen i Gjøvik/CCIS OPENING CEREMONY 25 partner organisations established on Friday 15th August 2014 a national research and educa-tion 14 15 center for cyber and information security - Center for Cyber and Information Security - CCIS. The establishment of the centre was celebrated with an opening conference in Gjøvik that was attended by almost 300 participants. Many state-ments and presentations were made during the opening, including by Odd Reidar HumlegĂĽrd, the Norwegian Police Director; Kjetil Nilsen, Director of the National Security Authority; General Major Odd Egil Pedersen, Head of Cyber Defence; Berit Svendsen, CEO of Telenor; Bjørn Erik Thon, Director of the Data Inspectorate; Troels Oerting Joergensen, Head of Europol Computer Crime Research Center in the Netherlands; Kimmo Ulkuniemi, Assistant Director of the Cyber Crime Centre of Interpol in Singapore, and as well as several other. Four university colleges Gjøvik University College (GUC), Lillehammer University College (LUC), the Norwegian Defence University College (FIH), and the Police University College (PUC) collaborate through CCIS. GUC and PUC have established a common experience-based master’s degree in information security. The target group of applicants for the program are members of the police, military and other actors in the public and private sectors. In his speech, the principal of PUC, HĂĽkon Skulstad, emphasized on the importance of this agreement to confront the developments of crime. The Police Director, Odd Reidar HumlegĂĽrd, made a clear space for the Police in the center. HumlegĂĽrd stated that this investment in research would help to make sure that all the police agencies, including National Criminal Investigation Service (Kripos), Norwegian National Authority for Investigation and Prosecution of Economic and Environmental Crime (Økokrim), and the Police University College, attain their long-term goals. Defence was also decisively represented. “I, on behalf of the Chief of Defence, set two professorships avail-able for CCIS”, said the Chief of Cyber Defence, Major General Odd Egil Pedersen, and added, “the center will help to strengthen the knowledge in cyber security, assisting with education and expertise, and not least, will constitute an arena in which actors in the field can come together and share their knowledge, experiences and opinions for the common good”. Any actor alone cannot handle serious incidents in the cyber domain. “We believe that the establishment of CCIS will help to strengthen the nation’s ability to coun-ter the threat of cyber domain”, said Berit Svendsen, CEO of Telenor. “It is a great pleasure that so many actors of the soci-ety, both in the public and private sector, have seen the benefits of this powerful collaboration and contribute to pay salaries of researchers”, said Rector Jørn Wrold-sen from Gjøvik University College, the host institution. While he thanked partners for their support, Wroldsen expressed his hope for the government to take a politi-cal decision and provide funding to secure the long-term operation of the center. Photo: Anders Gimmestad Gule, Høgskolen i Gjøvik/CCIS
  • 9. The 22 July Committee presents its report to the media BROAD POLITICAL SUPPORT CCIS has received strong interdisciplinary political support, including the direct and explicit support of several parliamentary committees and parliament’s documents. The White Paper 207 S, (2011-2012), from the Special Committee report to the Minister of Justice and Minister of Defence from the Parliament’s meeting held on 10 November 2011, concerning the attacks 22 July, explicitly and unanimously recom-mends 16 17 that the Centre receives support. (Chapter15, page15): “The Committee welcomes the establishment of the centre and believes that the government should assess how the centre can be supported to develop its work”. “The White Paper 29 (2011-2012) on societal security has a separate section on the centre’s initiative and describes a com-prehensive task force that has been set up to consider further actions (Chapter 9, page 107). The Justice Committee decided to emphasise this in its report. Recom-mendation of the Justice Committee on terror preparedness (NOU 2012:14 Fol-low up Report of 22 July Commission) emphasises the importance of establishing Norwegian expertise in information se-curity: “Especially the work carried out at GUC is of interest”, points out the Com-mittee in White Paper 207 S. The Government supports the centre with 5 million NOK in 2014, from the Ministry of Justice and Public Security and the Ministry of Local Governments and Modernisation. 6 REASONS WHY THE CENTER IS IMPORTANT The centre is important because an increasing amount of criminal activities are dependent on information and communication technologies (ICT). Crime, whether it takes place in cyberspace alone or not, most likely leaves digital traces. At the same time it is a challenge to find, understand, assemble and secure such evidence in a way that it safeguards individual rights and forensic correctness. The centre is important because the threat landscape changes. The increased mobility and open borders, climate change, increased unemployment and social pressures in Europe, resource scarcity, terrorism, pandemics and resistant infections, and Norway’s participation in international military operations all help to increase the possibility of criminal acts, attacks and terrorism against Norwegians, Norwegian infrastructure and interests. The centre is important because orivacy and security, two central citizen rights, are under pressure and need good technological, legal and societal understanding and research The centre is important because education, skills and research in cyber and information security will help to combat increasing threats, vulnerabilities and offences in the cyberspace. The centre is important because there is a need for extensive international cooperation and long-term research to prepare for tomorrow’s challenges. The centre is important because there is a need to educate and train new experts and to develop skills within the Norwegian central institutions, at the bachelor, master and PhD levels. 1 2 3 4 5 6
  • 10. Wireless Security Legal Aspects of Information Security Financial Crime Investigation Ethical Hacking Privacy-Enhancing Technologies Image and Video Analysis Biometrics Security Administration Cloud Security Network Security Data Hiding Computational Forensics Risk Management ¡ Cryptology Digital Forensics Information Warfare Big Data Forensics Cyber Defense M e d i a S e c u r i t y Socio-technical Systems Security Malware and Botnet Detection The Center for Cyber and Information Security (CCIS) is not only a research centre. It establishes competence transfer across agencies, companies and sectors. It facilitates research projects that connects industry and government agencies with international research networks. It connects research with study programmes and students to research, linking operational environments to aca-demic study programmes and research. CCIS connects research, applications and Center for Cyber and Information Security 18 19 Authentication Web Security Protection of Critical Infrastructure Incidence Management Malware and Botnet Detection Information Warfare Security by Design Mobile Security U s a b i l i t y f o r S e c u r i t y Intrusion Detection and Prevention Information Management Every aspect of the challenge Cyber and Information Security is a discipline that must be understood in its full dimension, technological, psychological, social, economic, and organizational aspects interact and influence the outcome. Therefore, the centre promotes an exchange of knowledge and competence not only among academia and the applications areas, sectors, agencies and institutions, but also among the different fields in cyber and information security. Thus, CCIS academic degrees at bachelor, master and PhD level are specifically dedicated to information and cyber security. This is in contrast with how information security is taught at most other universities; as courses that are part of a computer science degree. APPLICATIONS RESEARCH CCIS DISSEMINATION TRAINING study programmes with communication and dissemination capabilities. EDUCATION
  • 11. PhD in Information Security PhD in Computer Science Master in Information Security Master in Cyber Crime Investigation Master in Applied Computer Science Bachelor in Network Management Bachelor in Information Security Bachelor in Telematics Bachelor in Software Development Bachelor in Computer Engineering One year program in Information Security One year program in Software Development Courses & training packages Conferences, workshops, seminars 12 Study programmes 7 Study programmes dedicated to information security, cyber security, cyber defence and cybercrime, with: 20 PhD students 80 Master students 240 Bachelor students 20 21 CCIS delivers, through its core partners, a number of Bachelor programs in information security, network management and computer science, as well as a BSc in Telematics at the Norwegian Defence Cyber Academy (FIH), also known as the education of the military’s “cyber warriors”. CCIS also delivers a MSc program in infor-mation security with three study tracks, in-formation security management, forensics, and security technologies. The centre is also delivering a flexible, experience-based master with a a study track in the investigation of digital evidence and cyber crime, a collabora-tion between the CCIS partners the Police University College (PHS) and GUC. CCIS’ dedicated information security pro-grams cover the full scope of cyber and information security. In addition, the centre has a number of associated com-puter sscience programs with security-oriented activities at all levels, including applications of image and video process-ing, games and mobile computing tech-nologies. The Centre’s PhD program in cyber and information security will have 15 PhD stu-dents at start up in 2014 and 25 students two years later. In addition, the centre will have a number of associated PhD students in computer security research. The centre provides flexible courses, training packages, corporate courses and lectures, in collaboration with the Norwegian Centre for Information Security (NorSIS). PhD i informatikk Center for Cyber and Information Security CCIS Gjøvik University College Police University College Norwegian Defence Cyber Academy NorSIS
  • 12. National Academic Network 22 23 Core research partners in CCIS includes Gjøvik University College, the Police University College, the Norwegian Defence Cyber Academy, and the Nor-wegian Defence Research Establishment. CCIS is developing substantial collabora-tion between these, on research, degree programmes, research network develop-ment, and international training programs. Each academic partner has quite different international networks, giving a strong potential for innovative international col-laborations and research projects. CCIS leads the Norwegian Research School of Computer and Information Security (COINS). COINS integrates Norwegian research groups in Information Security to a larger entity by integrating the course portfolio for research school members, builds stronger relationships between doctoral students in the network, establishes more incen-tives to excel and increases student mo-bility through access to a larger network. COINS also increases Norway’s interna-tional student mobility, hosts internation-ally recognised researchers, and offers “free flow of goods and services” in Infor-mation Security Research in Norway. At any time, 40 PhD students are members of COINS. COINS provides a significant added value to PhD students at CCIS, while CCIS provides COINS with a strong national and international network, including busi-nesses, end users, and security agencies. PhD i informatikk Norwegian University of Science and Technology - NTNU University of Agder University of Stavanger University of Tromsø University of Bergen University of Oslo Gjøvik University College Police University College Norwegian Defence Cyber Academy Lillehammer University College COINS: National Research School of Computer and Information Security CCIS: Center for Cyber and Information Security
  • 13. Information Security Management Group 24 25 Research Groups The centre covers all major areas of information and cyber security. Multidisciplinary expertise is assembled in research groups and labs to address specific application areas. Other research groups will be established, includ-ing information security in the health sector, product and software security and cyber security Innovation. The Norwegian Biometrics Laboratory Center for Cyber and Information Security CCIS Critical Information Infrastructure Protection Group Norwegian Cyber Defence Research Group Testimon Forensics Research Group Testimon Forensics Research Group Digital evidence derived from information and communication technology using forensics tech-niques is playing an increasingly important role, e.g. in corporate compliance activities, criminal investigations, counter terrorism and intelligence operations. Technologies such as Cloud Computing, online Social Networks, the growing use of mobile and embedded devices as well as cross-border multi-jurisdictional collaboration on digital evidence and forensic readiness, pose challenges. The volume, velocity and variety of data is increasing exponen-tially. For example, sensor signals in the Internet of Things, text documents, images or audio-video data, are produced, shared and consumed using many heterogeneous devices, communication technolo-gies, and software applications. This presents a scale and complexity that demands continuous improve-ment of the methods and techniques applied in dig-ital investigations, i.e. to prevent, detect and analyze fraud and criminal activities. The research conducted in the CCIS / Testimon Forensics Group (Testimon) aims to gain new knowledge, to derive legal & privacy regulations, to develop and to evaluate novel techniques, that will address the aforementioned challenges in both the state-of-the-art and the state-of-the-practice. Cur-rent activities include, but are not limited to: * Gain new knowledge on large-scale fraud detec-tion, crime investigation & prevention in compliance with privacy and legal regulations. * Explore socio-technical controls to balance forensics-by-design & privacy-by-design. * Work towards sustainable investigation methods that follow sound forensic principles. * Develop software methods & infrastructures to increase efficiency in large-scale forensic investiga-tions. * Support search & analysis through terabytes of electronic data stored within closed systems and open Internet. Unique study and training programs are made avail-able by Testimon through the close cooperation among its partners within CCIS, i.e. * PhD in Information Security / Digital and Compu-tational Forensics * Master of Science in Information Security / Digital Forensics and Cyber Crime Investigation * Experience-Based Master of Science in Informa-tion Security / Digital Forensics and Cyber Crime Investigation * Nordic Computer Forensics Investigators (Mod-ule 1 & 2) Partners within the Testimon Forensics Group bring in diverse backgrounds and expertise from academia, the public and private sector. Most prominent are the Norwegian police agencies, i.e. the Norwegian Police University College (Politihøg-skolen), Norway’s National Criminal Investigation Service (KRIPOS), the Norwegian National Security Authority (NSM), the Norwegian National Author-ity for Investigation and Prosecution of Economic and Environmental Crime (ØKOKRIM), the Norwe-gian Police Directorate (POD), and other regional law enforcement agencies, e.g. the Oslo Politidistrikt and Vestoppland Politidistrikt. Since its beginning Testimon is evolving steadily. It was established originally as academic research group under the Norwegian Information Security Laboratory (NISlab) in 2010, and is today recog-nized nationally and internationally. For example, Testimon maintains close collaborations with the Netherlands Forensics Institute (NFI), The Neth-erlands, Ericsson, Sweden, the University College Dublin (UCD), Irland, the National Institute of Standards and Technology (NIST), USA, the Uni-versity of California Santa Cruz (UCSC), USA, the Kyushu Institute of Technology (Kyutech), Japan, the Center for Advanced Security Research Darmstadt (Cased), and the Ecole polytechnique federale de Lausanne (EPFL), Switzerland. The Norwegian Biometrics Laboratory The activity in the biometrics group in CCIS is based around the Norwegian Biometrics Labora-tory (NBL, (http://www.nislab.no/biometrics_lab)
  • 14. and its long lasting partnership with the Norwegian ID Centre. NBL is a discussion forum to brainstorm, to gener-ate new ideas and projects and to present interme-diate results. The group represents an active focus point with currently four international research projects. Further it is the intention to increase the awareness of biometrics in Norway via the Nor-wegian Biometric Forum (http://www.frisc.no/frisc-biometrics- forum/) and its potential involvement in the Norwegian legislation and to contribute to the international standardization in the field. Along this intention the biometrics group will host in 2015 the International Standardisation conference of ISO/ IEC JTC1 SC37, which will run from June 22 to 26, 2015. NBL is an active member in the European Associa-tion for Biometrics and co-organizer of the interna-tional conference BIOSIG as well as participating in the organization of other biometric events like the IEEE ICB, IEEE IJCB, IEEE IIH-MSP. Moreover NBL represents Norway in the European expert net-work COST Action IC1106 and furthermore NBL 26 27 is hosting the COST Action International Work-shop on Biometrics and Forensics on March 3 and 4, 2015. The biometric research is covering various physio-logical and behavioral biometrics including 2D- and 3D-face recognition, iris and eye recognition, finger-print recognition, finger vein recognition, ear recog-nition, signature recognition, gait recognition, key-stroke recognition, gesture recognition and mouse dynamics. The research activities of NBL are also presented during its annual workshop (NBLAW), which will take place on March 2, 2015. Furthermore NBL focuses on privacy enhancing technologies such as biometric template protec-tion and integration in physical and logical access control. The lab serves also as independent testing institution for biometric performance evaluations based on its in-house biometric databases. The Information Security Management Group In an ever more rapidly digitized connect world Cyber- and information security threats, vulner-ability, risks and solutions to protect our digital and non-digital assets need to be continuously modeled, measured, evaluated and managed. The Information Security Management Group performance both theoretical, empirical and applied research on the modeling measuring and managing of technical and procedural problems and solutions in the informa-tion security management area. The group has a special responsibility for the in-formation’s security management track of the MSc at University College Gjøvik. Consequently it’s research based teaching methods bring together a broad spectrum of socio-technical systems security research results that cover the social, organizational, psychological, legal, ethical, cultural, political, rhetori-cal educational and technical aspect of cyber- and information security management. Dissemination of both solutions and problems in the information security management area are an important focus of the group. Members of the group cooperate closely with NorSIS and partici-pate in the Norwegian National Information Se-curity Month, which is held in October every year. They also assist NorSIS in the Information Security Top Leader Round table discussions that are held 3 times a year. On the research front members of the group are part of the Norwegian Forum for Research and In-novation in Security and Communications (FRISC) which primary role is to be a meeting place for Norwegian information security researcher to share and exchange ideas. Critical Information Infrastructure Protection Group The CCIS Security of Critical Infrastructures (SCI) group was formed around a long-standing research group at Gjøvik University College studying se-lected aspects of the security and dependability of critical infrastructures at different abstraction levels ranging from national level and supranational de-pendency and interdependency models to proto-cols, sensor, and actuator security in process control systems. The SCI group was established in collaboration with and is supported by industrial partners includ-ing Statnett, Statkraft, Eidsiva, Telenor, and NC-Spec-trum with a strong research track record in the telecommunications and energy sectors. Research in the SCI group also has strong and natural syner-gies with the CCIS Cyber Defence group (CDG), and also collaborates closely with national authori-ties and international organisations. Critical infra-structures pose a number of highly interesting and challenging research problems. Many are inherently cyber-physical systems and re-quire an in-depth understanding of the often non-linear coupling and underlying models to capture all threats and vulnerabilities. Even the failure of a single critical infrastructure by definition has grave consequences up to loss of life or severe economic impact, but in many cases — particularly for energy and telecommunications - strong interdependencies would cause cascading failures. Such failure modes must be understood and mitigated where possible, requiring not only the study of interactions within and among infra-structures, but also of possible responses when co-ordination and control is hampered or even actively targeted. Threats range from random faults to deliberate at-tacks by non-state and state actors, which must be assumed to have substantial resources at their dis-posal and may prepare attacks over a long period. Beyond purely technical issues, a further key chal-lenge to understanding threats but also for dealing with incidents and attacks is the timely and efficient sharing of relevant information that will often need to transcend individual organisations or even sec-tors. As many infrastructure sectors are privately owned and operated, such information may be com-mercially sensitive, whilst sharing intelligence from national authorities also raises operational and technical challenges. The CCIS SCI group seeks to address these core challenges in close collaboration with national and international partners. Norwegian Cyber Defence Research Group The research group specializes in various aspects of national cyber. It draws its members from the Norwegian Cyber Defence, GUC, the Norwegian Defence Research Establishment (FFI) and the Nor-wegian Defence Cyber Academy (FIH). The group contributes to the BSc, MSc and PhD programs in information security at GUC and FIH’s BSc in telematics, known as the “cyber warrior” education. The implementation of network based defence has introduced both new opportunities and threats in military operations. The improvements in communication networks, information management systems and operational awareness comes at the cost of increased depend-ability of commercial off the shelf products, in-creased dependability of civilian infrastructure and larger systemic exposure surface. The Cyber De-fence group should conduct research that increased an organizations ability to administrate, operate and defend their ICT-systems, networks and technologi-cal platforms.
  • 15. Associated Groups and Organizations The Media Technology Laboratory (MTL) CCIS shares offices with the Media Technology Lab. MTL delivers research and study programs (on BSc, MSc and PhD level) in various areas of computer science. Of particular interest to CCIS is its research in mobile security, biometric meth-ods, user design for security and safety applica-tions of augmented reality, mobile phones, tablets, game consoles, digital interfaces and visors (e.g. Google glasses). MTL’s Colour and Vision Re-search Laboratory works in security with applica-tions such as video analysis of gait recognition and the design of counterfeit-resistant bank notes. NorSIS CCIS will share offices with the Norwegian Centre for Information Security (NorSIS). NorSIS is part of the Norwegian Government’s overall com-mitment to information security and reports to the Ministry of Justice and Public Security. NorSIS works to ensure that information security becomes a natu-ral part of every day’s life of citizens and businesses through raising awareness about threats and vulner-abilities and informing on security measures, NorSIS operates the online service slettmeg.no and the na-tional identity theft project. With NorSIS, CCIS gets a partner highly experienced in communication, with an excellent network of SMEs, Norwegian municipalities and governmental agencies. NorSIS and CCIS will col-laborate on media management, marketing resources, research dissemination, conferences and workshops. CCIS and NorSIS will in collaboration continue to deliver the Top Level Security Meeting which brings together security chief executives for discussions un-der 28 29 Chatham House Rule. Electro Section CCIS shares campus with the Section of Elec-tronics at GUC. In particular, the Electro Section supports CCIS in a number of security areas, including investigations of electronic equipment in criminal cases, electronic implementations of biometrics methods, combination of biometrics, Near Field Communication and mobile phones, and random number generation in programmable logic. The Electro Section has several associ-ate professors with PhD degrees in information security. Health Care and Nursing CCIS shares campus location at GUC with the Faculty of Health Care and Nursing, which devel-ops expertise in patient safety and security, includ-ing information security in the health sector. FRISC CCIS works in close collaboration with the Forum for Research and Innovation in Security and Communications (FRISC), a value network supported by the Norwegian Research Council. The mission of FRISC is to create meeting places for research and innovation in information securi-ty where information sharing and the value-added utilization of results can happen with an interna-tional perspective. Health Care The Norwegian Biometrics Laboratory Center for Cyber and Information Security CCIS Critical Information Infrastructure Protection Group Information Security Management Group Testimon Forensics Research Group Media Technology Laboratory FRISC Forum for Research & Innovation in Security and COINS Research Communications School Electro Section NorSIS Norwegian Centre for Information Security Norwegian Cyber Defence Research Group
  • 16. 30 31 CCIS 50% presence at CCIS Developing cross-sectoral projects Developing curricula Identifying student resources Developing research networks Attracting team members Partner-funded researchers develop the col-laboration between CCIS, its partners and networks and the funding partner organiza-tion. “Partner researchers” have the responsi-bility to help recruiting talented students for partner institutions, influence the develop-ment of degree programs in a direction that best supports the partner institution’s needs, and connect partner organization to the Centre’s other partners and to international networks. Scientists who build bridges THE PARTNER INSTITUTION 50% presence at the partner institution Identifying skills and competence needs Identifying potential projects Mobilizing the partner’s professional network Attracting team participants Partner researchers will support the partner institutions in their long term strategic development, and are responsible for identifying their needs for competence development and research. Partner researchers recruit resources and networks to CCIS projects.
  • 17. A partner researcher shall draw on resources at the partner institution and CCIS to develop a team that will contribute to activities and projects that will further the ob-jectives of the partner and CCIS in the particular focus areas of the partner. Team members comes from the partner institution, as well as doctoral candidates, researchers, PhD students, master students, bachelor students and experts, at CCIS and among CCIS’ partners and their networks. The partner researcher is expect-ed to spend some time doing fundraising and write CCIS emphasizes good collaboration in an excellent PhD-student Master student Domain Expert from partner organization 32 33 proposals to finance the team. PhD-student Guest researcher Associate professor Professor Post-Doc candidate Researchers who build teams research environment, where social challenges, professional dialogue, and cooperation are central. CCIS focus on eminent research and professional development that connect partner organizations, engineers, security experts, leading expertise and top scholars. It also closely connects applied research, teaching and real world information security experience and needs. This calls for a good organization that include research groups, focus laboratories, professional groups, and a good cooperation rhythm. Technician
  • 18. MORE REASONS WHY CCIS IS IMPORTANT CCIS is important because society as a whole and its critical infrastructure have become completely dependent on ICT, and therefore dependent on ICT security - from command and control systems, financial structures, food production, food distribution, banking, payroll and electricity distribution to hospital management, and transportation. CCIS is important because the consequences of security breaches have become very high. CCIS is important because inadequate information security costs society large amounts of financial resources. The global cost of cyber crime is estimated to be between 0.4% and 1.4% of global GDP. CCIS is important because an arena for knowledge exchange across information security actors, including defence, law enforcement, police, administration, finance, and business, is necessary for developing effective security capacity. CCIS is important because effective information security measures rely on under-standing the security interdepence of technological, economical, legal and political measures. CCIS is important because information security actors, including security agencies and businesses, have much to gain from collaborating with long-term research, while research has much to gain from learning from the so-called “real world”. CCIS is important because security has become a necessary part of products and services. Insufficient security can drive products and firms off the market. High cyber security gives manufacturing companies higher uptimes, shorter delivery times and improved margins. CCIS is important because information security in itself is a large global market, both for products and services. CCIS is important because it will give its participants, who have significant national importance, increased cyber and information security competence. CCIS is important because it will increase the number of students in information security at all levels. 34 35 7 89 10 11 12 13 14 15 16 Delivery 2 years CCIS will have -established a research group on cyber crime -established a research group on cyber defence -established a research group on cyber security of critical infrastructure -strengthened and integrated degree programs in information security -started an experience-based master’s program on cyber crime investigation -established the presence of 25 PhD students at the centre and 64 associated via COINS, two post-doc-toral candidates, 40 master students and 240 under-graduates 4 years CCIS will have -become a strong support for the Norwegian authori-ties in their national and international work on cyber security -established a research group in privacy and cyber aspects of rule of law - established a Nordic Cen-tre of Expertise in Cyber Crime Prevention and Inves-tigation -recruited 30 PhD students at the Centre and with 90 associated via COINS, and 10 postdoctoral candidates -recruited 25 partners 8 years CCIS will have -been on track to eliminate society’s critical shortage of experts -led the Norwegian re-search in cyber security from being fragmented into being a national consolida-tion of meeting space for the dissemination of re-search and innovation -established a centre for cyber security innovation to help industry partners turn the results from CCIS into commercially successful products and services The Center for Cyber and Information Security (CCIS) works continually to obtain additional financing for projects and research groups and laboratories.
  • 19. Š 2014 Center for Cyber and Information Security Contact information: Morten Irgens, Chair of the interim board morten.irgens@ccis.no, +47 46 54 19 41 Nils Kalstad Svendsen, Dean of IMT, Gjøvik University College (NISlab), nils.svendsen@ccis.no, +47 454 92 425 Thank you for your interest. CCIS is a resource for its partners and collaborators. Your comments and ideas on how CCIS can be made even better will be most appreciated. CCIS invites your organisation to participate as partner. www.ccis.no facebook.com/centerforcis twitter.com/ccisno 36