50 likes | 145 Vues
Explore the key themes discussed at the 8th European Conference on Information Warfare, including human factors, technical issues, and security paradox. Learn about military perspectives on information warfare, security frameworks, and the importance of adapting to changing environments. Discover insights on regulations, security controls, and threat mitigation strategies in the digital age.
E N D
Universityof Minho 8th European Conference on Information Warfare - ECIW 2009 Military Academy / University of Minho Lisbon, Portugal 6-7 July 2009
Summary-1 Universityof Minho • Awareness is a key word we heard very often • How to make people aware of security/privacy issues? • Security paradox: when there are no evidences the motivation to act is very low! • Human factors are critical • Technical issues: e.g., usability
Summary-2 Universityof Minho • Information warfare and Military issues – vision from the military side • New IS frameworks addressing information warfare/Competitive Intelligence • InfoSecas a Management process • Multilevel Security for network centric communication and info sharing • Multi-tier Decision Support system for network centric Warfare environments • Application examples of the network centric operations concept at a Portuguese and European level • Changes in the environment requires military organizations to adapt (e.g. new “military language”); human factor is critical • Net Centricity is a main concept: involves system integration and requires a lot of analysis and learning by experience. It also demands new collaborative capabilities concerning C2. • Tactical military decision based on poker rules and skills • Technological aspects of the warrior of the future (communications, power, nature,…)
Summary-3 Universityof Minho • Regulations (lack of): new e-enterprises are self-regulated, which is threat (some kind of “cyberlaw”) • Security Controls • Models for IT Security • Security in broadband communications • Threats concerning RFID technology: physical attacks; privacy attacks • Critical infrastructures are a specific environment requiring (much more) attention. • Analysis • Architectures • Case studies
Universityof Minho Thank you for attending ECIW 2009 Hope to see you next year at ECIW 2010 With news ideas and your friendship