print preview

Cyber Security and Data Science

Security organizations are increasingly reliant on reliable and secure communication and information-gathering means. Close attention, therefore, needs to be paid to technological developments and threats in cyberspace. This means that information security is not merely a matter of technology. Adequate effectiveness of protective measures need to be continuously verified and tuned with the responsible agencies for them to act quickly and effectively in care of a cyber attack. Attacks of this type occur soundlessly and without warning, and the slightest weak point can result in major damage.

WTF_FoPrgm2_TD2

Risk analysis of information and communication systems

armasuisse_GHH_3_026

The effectiveness of security plans and security measures needs to be constantly validated under operational and threat scenarios. Plans are reviewed and formal information system audits are conducted for this purpose. These can be supplemented by verification and penetration tests for assessing the suitability, robustness and reliability of measures for protecting the flow of information.

Information management and information security management

armasuisse_GHH_3_035

A central task performed by information management and information security management is to design and improve control and performance delivery procedures in the field of information and communication technologies (ICT). This includes continuously and comprehensively assessing strategy, objectives and outcomes, and the potential risks to the ICT function.

Developing «cyber-defence» expertise

armasuisse_GHH_3_054

The Armed Forces are reliant on precisely targeted monitoring of developments in technology with respect to threats. Scenarios which include possible courses of action and sustainable, risk-based protective measures are defined for the long term. To achieve this, we design and implement prototypes and demonstrators. This allows decision-makers, developers and users to close the gap between aspirations and specific requirements and to manage complexity.

Cyber-Defence Campus

Defence_Campus_Keyvisual

Thanks to its wide-ranging expertise and international competence network, the Cyber Defence Campus is the link between the DDPS, industry, academic institutions and hacker communities when it comes to all things related to cyber security. To be able to keep one step ahead of cyber threats and developments in this area, the CYD Campus works closely with academic institutions such as the ETHZ and the EPFL and, where possible, also involves partners from industry.

CYD Campus

Factsheet 1

SDR system architecture

Software

Software-defined radio (SDR) systems are ideally structured in the same way as conventional radios. The signal first passes through the RF front end, before being processed and finally output for the user. 

Read more...

Factsheet 2

Software which tells the hardware what to do.....

Software

The technological trend points to the decreasing specialisation of hardware components. For the most part, ICT systems will in future be controlled primarily by software.

In the past, hardware components tended to be replaced by cheaper and higher-performance hardware components: ever faster processors and larger memories were the order of the day. But now hardware components are controlled by software and hence one is networked with the other. The general virtualisation of all ICT resources promises greater flexibility at lower cost by dividing up the available resources appropriately and deploying them according to need. Rigorous specialisation through software configuration and control makes it possible, for example, to adapt the necessary processing, memory and network elements flexibly in line with functional and performance requirements. In figurative terms, it is thus possible to switch within a short time from a large auditorium to several separate classrooms – or vice versa – as capacity can be freely allocated. But this increased flexibility also means greater risks. The experts at S+T examine all types of software and hardware systems by regularly testing them, comparing them and checking their safety.

Factsheet 3

Practice makes perfect – the world of simulator training

Cockpit

S+T has produced a summary of existing training and simulator systems. Training facilities are a vital element in all security-related organizations – not least of all the Swiss Armed Forces, given the growing shortage of training opportunities, training periods and training staff. It is essential to keep developing these facilities with a view to optimizing the usefulness of the training results.

Read more

Factsheet 4

Methodical decision-making processes – a strategic core competency in a changing environment

Bereitstellung für Vorversuch
Practice-proven: equipment ready for preliminary testing

Organizations with security-related roles such as the DDPS, the police or the cantons are constantly confronted with the need to adapt to a rapidly changing environment. Here a methodical approach is beneficial to decision-making and also saves costs. In this context, S+T is conducting a multi-phase proof-of-principle trial. This covers the whole process from the initial on-screen simulation and the initial field trials through to full-scale exercises with armed forces personnel.

Factsheet 5

armasuisse - ETH Zurich team receives Best Paper Award

Best Paper Award
Best Paper Award

Vincent Lenders (armasuisse Science and Technology) together with David Gugelmann, Fabian Gasser and Bernhard Ager (ETH Zurich) have received an award at the annual Digital Forensic Research Workshop conference (DFRWS EU 2015) in Dublin.

Read more...


Sciences and technology Cyber Security and Data Science
Dr. Vincent Lenders
Feuerwerkerstrasse 39
CH-3602 Thun
Tel.
+41 58 468 27 52

E-Mail

Sciences and technology

Cyber Security and Data Science
Dr. Vincent Lenders
Feuerwerkerstrasse 39
CH-3602 Thun