Print Layout 1
Transcription
Print Layout 1
FuturIT_borito_eng.qxd 07/10/26 17:29 Page 2 2007 Annual Report 2007 futurIT National Office for Research and Technology Estabished by the support of the National Office for Research and Technology FuturIT_eng_ok.qxd 07/11/5 9:40 Page 2 futurIT „Information Security Knowledge Centre” FuturIT_eng_ok.qxd 07/11/5 9:40 Page 3 contents Contents III. IT security qualification and development of devices 29. Executive summary 1. Mission statement 3. 1. Security certification of IT solutions 30. Organisational structure 4. 2. Development of information security tools 31. Management structure 5. IV. Implementing information security training system 32. The consortium members 6. 1. PhD education and research in Information Security 33. Our activities 8. 2. MSc education in information security 34. Research Programmes 3. Raising awareness and professional standards National and industry-specific information security systems 12. of information security in Hungary 36. Organisational and human security research 13. Indicators Data recovery and data storage research 14. PhD dissertations 38. Knowledge management programme 15. PhD, post-doctorate and university research positions 39. Students partnership program 40. Results Accounting period 18. 24-hour programming competition sponsored by futurIT 41. Results achieved in the last reporting period 19. Adult training 42. I. Project preparation 20. Technology transfer 43. 1. Supporting infrastructure 21. Conferences 44. 2. Procurement of the resources necessary for R&D 22. Resources 46. 3. Organisational structure 23. Indicators 47. 4. Financial management system 23. Media appearances 48. II. Creating an uniform methodology background for it security Professional programmes 50. solutions 24. Financing, summary of financial indicators 53. 1. A planning and rating methodology for IT solutions 25. Monitoring 55. 2. A national information security regulatory system 27. Contact information 56. Our team 56. 3. Assessment, analysis and management of IT threats and risks 28. FuturIT_eng_ok.qxd 07/11/5 9:40 Page 4 summary Executive summary Our mission is to deliver first class standing staff members to work on the project, all with a dedicated research, develop and educate team spirit. The consortium members have a proved track record advanced value-protection meth- of cooperation that predates the establishment of futurIT. They strongly ods securing information assets. consider each other as strategic partners having already completed In the year 2006 University of several successful collaborative projects. The successful operation Pannonia won support from the of the Knowledge Centre demands a close collaboration to secure National Office for Research and a number of organisational and cultural challenges. This includes Technology in two areas related to information security. reconciliation of a variety of problem-solving processes and different types of work. The building trust at every organisational level and The members of the consortium are Albacomp Co., KÜRT Co. and in every collaborator body towards the targets is crucial. For this the University of Pannonia. very reason one of the most important results of the first phase of work will the creation of an advanced management model. This The leading staff members responsible for the Project are: will serve as a basis for the organisation of effective operation in The Manager of the futurIT Information Security Knowledge Centre the years to come. is Tamás Kürti. The founder of the ÖkoRET Environmental Safety Information The Research Steering Committee will provide the direction in which Technology Knowledge Centre is Prof Dr Ákos Rédey and its the consortium will operate. This will include the approval of work manager is Prof Dr. Gyula Marton. progress and interim results, providing professional consultation The director of the Knowledge Centre is Prof. Dr. Ferenc Friedler, and advice, and promoting the pursuit of professional and scientific the founder and Dean of the Faculty of Information Technology, work. The RSC will meet whenever necessary, but at least once University of Pannonia. every two weeks. The Project Committee will monitor the fulfilment of the Knowledge This report gives an account of the work of futurIT. Centre operative goals and strategy. Each consortium member will be represented there. The PC will be empowered to pass resolutions The consortium members have been fully dedicated and highly regarding the evaluation and exploitation of the project results. The motivated in their pursuits by a common set of values and goals. research and development work will be carried out by Research They are leading researchers and experts in their fields, covering Laboratories, each of which is geared towards addressing a specific the science, business and innovation. All three partners have topic of research. The Project Committee has approved so far the assigned reliable, trustworthy, committed and professionally out- establishment of the following Research Laboratories: 1 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:40 Page 5 1. Development of national 3. Data storage and data recovery and industry-specific information The rapid pace of development with growing the complexity of security systems data storage media, and the logical structures they use, is greatly The aim of this research and increasing the risk of data loss. Our program is aimed to reduce development program is to create this risk, and is being conducted in collaboration with our key IT security procedures, method- strategic partner, KÜRT Co., the founder of Hungarian data recovery ologies and tools tailored to suit industry. The purpose of the program is not only to solve the problems the specific requirements of the various specialist fields and of rescuing data from existing devices, but also to conduct research sectors of industry, and to support their practical use. It will be into the risks inherited in future generations of storage media. done using the latest theoretical findings and practical experience 4. Knowledge management from science and industry The Knowledge Management program is a horizontal activity, 2. Organisational and human security research involving the collation and presentation of the technical results of The purpose of this program is to develop a methodology for research programs carried out under the various projects. It includes analysing the IT and information management risks related to the publication of best practices established this activity. The human (and organisational) resources. This will include assessment Knowledge Management program will serve to strengthen futurIT of the risks associated with these factors, and, by incorporating professional foundations and its recognition in academic and business the results of this research into a system. A reliable, automated circles. This will contribute to the core aims of the project. early detection and alerting solutions will be developed. It would be our pleasure to discuss specific issues with you and provide you more information about our work. Veszprém, 30 September 2007 Prof. Dr. Ferenc Friedler Tamás Kürti Director Manager Pannonia Regional futurIT Information Security Knowledge Centre Knowledge Centre 2 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:40 Page 6 mission Mission statement FuturIT Information Technology Security Research and Development FuturIT will contribute to increasing innovation and R&D capacities Centre (“futurIT”) will become a leading IT security research and in the region, create a ready workforce for local knowledge-inten- training centre in the Central Transdanubian Region, in Hungary sive SMEs through vocational training, and create appropriate jobs and in Central Europe, by providing cutting-edge training to leading for qualified workers through the R&D activity of the spin-off theoreticians and practical experts in the field and by utilising their companies and consortium members. expertise. The end-products of its developments will be IT security processes, methodologies and tools of a world-class standard. FuturIT’s education and training programme will allow students of Pannon University’s Faculty of Information Technology to acquire As futurIT, set up jointly by the Faculty of Information Technology cutting-edge knowledge of lasting importance in the technical (FIT) of Pannon University (UP), as well as KÜRT Co. (KÜRT) and IT field, and will provide PhD students with appropriate research ALBACOMP Co. (ALBACOMP), becomes a Regional Knowledge topics. In addition to international academic publications and Centre, it will provide advanced training acknowledged as unique conferences, it will make use of the results of its basic and applied in the central European region, and of a standard that research projects through its products and through the provision is at the cutting edge internationally, to Hungarian and foreign IT of training to foreign students. security experts, while at the same time conducting IT-security research and development projects that closely track the latest technological and societal changes. FuturIT will maintain close contact with local businesses collaborating in its development projects or in the utilisation of its futurIT research findings, as well as with the educational institutions „Information Security Knowledge Centre” involved as international partners in its research and advanced training programme. FuturIT’s activities will range from basic research to the sale of products through spin-off companies. In addition to this, it will function as an international knowledge base and conference centre for matters related to IT security. 3 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:40 Page 7 organisational Organisational structure PANNON REGIONAL KNOWLEDGE CENTRE MANAGEMENT COMMITTEE futurIT Operative Manager Consortium Coordinator PROJECT COMMITTEE University of Pannonia KÜRT Co. Albacomp Co. University of Pannonia KÜRT Co. Albacomp Co. RESEARCH WORKING COMMITTEE Research laboratories Research topics - Lab n Research topics - Lab 2 Research topics - Lab 1 Topic Managers Staff member Staff member Staff member Staff member Student Student 4 Annual Report 2007 futurIT ÖKORET Operative Manager FuturIT_eng_ok.qxd 07/11/5 9:40 Page 8 management Management structure The futurIT research and devel- development goals, debating work opment centre operates as a processes, approving research partially autonomous, separate results, facilitating compliance budgetary unit of the Information with scientific professional stan- Technology dards, and overseeing the deve- Faculty of the University of Pannonia. lopment and running of training programs held within the frame- The supreme decision-making body of futurIT is the Project work of the futurIT project. Committee (PC), on which all the members participating in the project are represented. The PC is responsible for ensuring The Operative Head of futurIT is responsible for implementing the operating conditions for the futurIT project, providing the the strategic goals and R&D programs designated by the Project necessary infrastructure and organisation in accordance with Committee, using the available resources. The Operative Head the schedule of project tasks. The PC oversees the fulfilment bears ultimate responsibility for the day-to-day running of futurIT’s of cost targets and deadlines, ensures that procurements are operations and activities. He is also charged with ensuring that made in compliance with the relevant statutory provisions, and the results of R&D programs are put to practical use, and with implements or approves any changes. The PC reports on a regular building and monitoring partnerships for the utilisation and com- basis to the directors of futurIT regarding the project’s internal mercial exploitation of R&D results. operation, compliance with internal regulations, and any revealed operating or management problems. We place particular empha- The directors of futurIT regularly meet - primarily in a consultative sis on ensuring that the PC does not merely reveal deficiencies capacity - with recognised leading information security experts related to operation and management, but also formulates suitable from Hungary and abroad, for the purpose of discussing strategi- recommendations for eliminating such problems. cally important decisions and professional strategic guidelines, as well as with university educators and the representatives of The operative management body of futurIT is the Research enterprises engaged in similar fields, all of whom assist in the Working Committee (RWC), which consists of the consortium preparation and researching of decisions through the provision members’ delegated representatives. The RWC is responsible for of position statements, recommendations and analyses. coordinating implementation of the professional tasks related to the basic and applied research conducted in the futurIT research laboratories, ensuring the achievement of research and 5 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 9 consortium The consortium members Faculty of Information Technology, University of Pannonia erable acclaim as a leading information security specialist, with The degree courses in Information Technology were originally a comprehensive data protection and data security methodology and launched in 1991 at the University of Veszprém’s Engineering Faculty. team of auditors that comply with all the relevant international and The Information Technology Faculty, in its current form, was estab- Hungarian standards. As one of Europe’s leading data recovery lished on 1 September 2003, and operates within the framework of firms, KÜRT has achieved worldwide recognition with its ground- a flexible “Department” system, with research carried out in scientific breaking data recovery technology. The company’s preventive workshops, independently of the individual departments, under the information management system encompasses over 40 different supervision of an internationally renowned teaching staff. These products, each of which can also be used individually. KÜRT has research laboratories, and the faculty’s staff of twelve DSc-level operated profitably from the outset, and has initial capital of HUF 20 professors, have also enabled the faculty to establish two PhD schools. million, and equity of HUF 800 million in addition to its initial capital. The research laboratories at the IT Faculty include, for example, At present, the company employs almost 100 people. In the second the Bio-Nanosystems laboratory, the Network Optimisation laboratory, half of the 1990s KÜRT began the research and development of its the CNN Applications laboratory, the Nanosensors laboratory and the ISyS(r) framework for information security technology, for which it Telecommunications laboratory. The organisation of teaching work received the Ministry of IT and Telecommunications’ Innovation Award is the responsibility of the individual departments. The faculty offers IT in 2002. KÜRT’s first foreign subsidiary, KUERT Datenrettung Deutsch- engineering training at all levels of higher education. In the 2006/2007 land GmbH, commenced operations in the German market at the academic year the student body numbered more than 2,000. The beginning of 2003, and in 2004 KUERT Information Management faculty has established a number of separate organisational units GmbH opened for business in Austria. From 2007 KÜRT began to move for the purposes of conducting R&D work on a professional basis. These into the Middle-Eastern markets, opening a subsidiary in Dubai under include the Information Security and the Medical IT Systems research the name of KÜRT Information Security LLC. This was also the year in and development centres. The faculty also maintains close relations which KÜRT Security LLC was established in the United States of America. with a great many industrial partners, and its researchers contribute KÜRT’s operations have complied with the ISO 9002 standards to the scientific work carried out by the working committees of the since 1997, and with the ISO 9001-2000 standards since 2002. Veszprém Regional Committee of the Hungarian Academy of Sciences. The company is also an approved NATO supplier. KÜRT Co. Albacomp Co. KÜRT was established in 1989. Since then it has since grown from ALBACOMP Co. is one of the longest-established and most successful a Hungarian-owned small business into an international corporate companies in the Hungarian IT market, and therefore a leading industry group. Owing to its wealth of accumulated experience, and its staff player. Currently employing a total of 440 people, in 2006 this Szé- of highly skilled and innovative experts, KÜRT has earned consid- kesfehérvár-based enterprise achieved sales revenue of HUF 15.5 6 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 10 billion. During this period a total of 37,300 personal computers were coordinated jointly by the faculty’s teaching staff and KÜRT’s team manufactured in the company’s assembly facility, of which 4,000 were of IT specialists. KÜRT’s participation in overseeing the research for export. Besides assembling computers, the name of ALBACOMP is work guarantees that the research topics are relevant to the also synonymous with a number of major network and systems industry today. integration projects. The company is an active participant in several • KÜRT and the University of Pannonia have jointly participated in, government-backed IT development programs, such as the Sulinet and successfully completed, a National Research and Development Expressz (School-Net Express) scheme jointly launched by the Program project in the framework of the Széchenyi Economic ministries of labour affairs, information technology and education. Development Plan. As a supplier of integrated IT solutions, ALBACOMP supports muni- • KÜRT’s senior employees, working together with the teaching staff cipalities in their efforts to develop local e-government infrastructure. of the University of Pannonia, have participated as joint topic The prime objective of ALBACOMP Co., as one of Hungary’s IT knowl- leaders in several PhD training courses, and have overseen the edge centres, is to enable creativity to flourish, and provide talented writing of numerous successful dissertations. specialists with opportunities and professional support for the • In 2005, within the framework of the Ányos Jedlik program, KÜRT development of new products. The ALBACOMP R&D Centre, estab- and the IT Faculty of the University, in a consortium led by KÜRT, lished in the early 1990s, is known for its many unique innovations. received a three-year funding grant to assist in the development These include, for example, the e-Infopont touch-screen terminal, or the of hybrid information security solutions that integrate human, Personal Monitor. In addition to the above, the Albacomp R&D team logical and physical security solutions, as well as the related has developed numerous software applications and other bespoke IT software and sensors. solutions. Following a quality assurance and environmental manage- • Previous collaborations between KÜRT and ALBACOMP have ment audit performed at the company, ALBACOMP has been granted primarily been aimed at the joint implementation of IT, systems ISO 14001:2004 environmental certification with respect to all its and network building projects. The two companies have worked operations, and had its ISO 9001:2000 accreditation renewed. together to perform IT risk assessments, as well to develop and Based on this the company has also successfully applied for install a variety of information security systems, at several major “NATO-approved supplier” status. corporations and state institutions in Hungary. • From the 2000/2001 academic year, accredited higher-education Past cooperation among the members of the consortium courses for the training of IT Engineering Assistants were launched • KÜRT’s management and specialists have participated in the off-campus, in Székesfehérvár. The teaching venue for these educational work of the IT Faculty, through the holding of lectures, courses is the regional headquarters of SZÜV Co., where, in the since the year 2000. By giving these presentations the represen- 2002/2003 academic year, additional state-accredited degree tatives of KÜRT impart, to the students, a unique set of practical courses were launched for the training of Accounting Adminis- IT skills that tie in closely with the theoretical content of the courses. trators, Financial Administrators, Logistical Technology Mana- The PhD research programs implemented at the IT Faculty - and gement Assistants, Machine Industry Engineering Assistants and those to be run within the framework of the futurIT project - are Tourism Managers. SZÜV is a solely-owned subsidiary of ALBACOMP. • 7 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 11 activities Our activities The past few decades, and in particular the last few years, have and business organisations, and at the same time represents seen a sea-change in attitudes towards security. Today, it is a growing source of value. Information is an asset, and, like other perfectly natural for the issue of risk-based information security assets, it represents value - often irreplaceable or inestimable to be approached as a matter of key concern in a wide range of value - to its owners or users. sectors and situations - from public transport, to the protection of personal data, to the management of bank data. Organisations The value of the information stored and managed in IT systems these days no longer require products, but the continuous mainte- is growing exponentially with each passing year. All forms of infor- nance of the security level they need; it is not security devices they mation may carry value - and this value must be protected, by pre- want, but a secure operation, not alarms, but burglar-proof infra- venting the information from falling into the hands of unauthorised structure, not virus killers, but a virus-free operation. This state persons, or from being lost or perhaps rendered unusable, can only be achieved and maintained through the application whether due to deliberate action or by accident. (It’s enough just of appropriate security solutions that are comprehensive and at to think of a database that contains medical dosages prescribed the same time compatible with the organisation’s systems. for patients at a hospital, or a disk containing an accountancy firm’s client data, or a military commander’s notebook containing confidential information.) The confidentiality, integrity and availability of the information stored in or accessible through systems is of critical importance in maintaining competitiveness, profitability and growth. With the proliferation of computers, enormous changes have taken place not just in terms of the protection of information, but also in terms of the information that needs to be protected. The emergence and development of computer network systems has radically changed the collection, processing, management and storage of information. Information has become one of the key sources of innovation, and As technology develops, so information - whether in the form of stored as such, its value has grown considerably. The information data and documents, or perhaps uttered in the course of meetings systems and networks of organisations are increasingly facing or telephone calls, or embodied in specific products or prototypes a wide range of threats to their security, including computer fraud, - is playing an increasingly important role in the life of institutions spying, sabotage or deliberate abuse, as well as various environ- 8 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 12 mental threats. Incidents of damage (whether caused by computer risks involved. viruses, hacking or unintentional breakdown) have become more FuturIT’s aim is to become a leading IT security research and frequent and more serious in nature. About 80% of the security training centre in the Central Transdanubian Region, in Hungary incidents that affect operations are of an information technology and in Central Europe, by providing cutting-edge training to leading nature, and of these, more than 70% can be attributed to human theoreticians and practical experts in the field and by utilising their error or negligence. expertise, as well as by developing IT security processes, methodologies and tools of a world-class standard, while closely moni- As regards the state of IT security today, institutions, businesses toring the latest technological and societal changes. and individuals now generally possess data and databases of often inestimable value, and many of them already use various tools and The most effective means of reducing losses is to provide training solutions designed to protect data and to prevent damage to it, but and education, and to develop and ensure the uptake of suitable very few are applying these in a rational, integrated system and regulations, IT security methodologies and tools. The research and using them to regulate their operations accordingly. development activities and the training programmes of the Regional Information Technology Security Knowledge Centre focus The range of tools that can be used as building blocks for on IT security, and it has been a basic criterion in designing the constructing systems for attaining an optimum level of IT security programmes that the R&D and the training projects should be is wide and constantly expanding. There are also a growing number closely related to IT security and information protection as well as of standards and procedures with which these systems can be to the latest international trends in the field, both in academe and rated and certified. However, there are no systematic planning in the market. The information security knowledge attainable methodologies out there that could be used to achieve IT security through the training programmes represents up-to-date, recog- of a guaranteed quality using the tools available. There is an nised and marketable expertise, and therefore the know-how essential need in the field for such methodologies to be developed. concentrated and generated here will also benefit the region’s The growing plethora of IT systems and tools available in Hungary economy as a whole. as elsewhere, and the increasing mass and concentration of the information being generated, represents new security challenges. The very purpose of security systems dictates that they should be Therefore, futurIT regards its most important tasks as being to continuously upgraded in order to counter the constant advances render the management of information secure and thus to develop that are being made in the methods of attack, and to meet newer methods and tools for protecting information, as well as to deter- and ever-greater challenges. The security of a system is essentially mine the extent of the potential benefits relative to the security determined by how fast it can respond to new threats. It is for this 9 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 13 reason that futurIT has set, as the ultimate aim of its research, the solutions to be developed as well as the methods and tools to design and provision of IT security-development solutions that are support the developments should be the usefulness of the function capable of effectively maintaining risk-based security for the long term. relative to the risk factors involved. FuturIT’s R&D programmes focus on three essential IT security tasks: With the spiral-model approach, the initial task is to determine the requirements and to specify the risks involved. This is followed • Preventing the loss (or destruction) of information by drawing up the plans for the developments, estimating the • Preventing information from falling into unauthorised hands costs and preparing feasibility alternatives. The plans drawn • Ensuring business continuity. up initially will serve as the basis for the developments of prototypes that can be certified on the part of users as well, and then FuturIT supports the attainment and maintenance of IT security by: for the implementation and testing work. Applying the principle of preparing prototypes greatly reduces the uncertainty of R&D • developing IT security standards and methodologies activities, since it allows us to develop the desired models on the • creating an IT security knowledge base basis of the users’ broadly outlined ideas and of the information • providing education and training in the use of IT security that has been obtained regarding the system. standards, methodologies and tools • developing IT security tools FuturIT maintains close contact with local businesses collaborating • designing, operating and certifying IT systems. in its development projects or in the utilisation of its research findings, as well as with the educational institutions involved as FuturIT’s R&D activities are implemented through a risk-focused international partners in its research and advanced training spiral lifecycle model. Applying the model ensures a clear structure programme. FuturIT’s establishment has created an opportunity and straightforward means of implementing the various activities, to create a concentrated repository of information technology and as well as a solid basis for carrying out planning-phase tasks information security expertise - expertise that is unparalleled not through a uniform approach. When drawing up the concepts for only in the region and in Hungary, but in the neighbouring countries research projects, the aim is always to base the development work as well. Thus, it should greatly increase the attraction of the on our own ideas, and in the planning phase, our aim is to ensure technical training offered here, and, due to the unique findings of its that the system based on our ideas will be feasible, and that the research and development, it should, through the activities of local solutions will fully meet the needs of the end-users. It is an important businesses, boost the region’s positive impact on the economy characteristic of the spiral model that the criterion for selecting the by increasing the value of the know-how of these companies. 10 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 14 RESEARCH PROGRAMMES FuturIT_eng_ok.qxd 07/11/5 9:41 Page 15 information security National and industry-specific information security systems Information and the procedures This specialist field, and the research and development tasks that for obtaining, storing and mana- it entails, require special expertise. No other research programs ging it, as well as the related of this nature, aiming to formulate industry-specific information IT systems and networks, are security solutions in partnership with universities and industry all important business assets. operators, are under way in Hungary at this time. A study of the The rapid advancements being current trends both in Hungary and abroad reveals that, while made in IT in Hungary as well similar concepts do exist with regard to specific areas of regulation, as elsewhere, the growing mass of information generated and its no comprehensive, IT-related methodologies such as those targeted increasingly concentrated nature, are giving rise to a new set by the futurIT research program are yet available. of security challenges. For this reason, the objective of our research and development program is to use the latest theoretical Our research program also has the objective of consolidating and practical results of scientific and industry research to develop Hungary’s existing, heterogeneous information security regula- IT procedures, methodologies and tools specifically to suit the tions, and providing legislators with a set of recommendations that requirements of the various specialist fields and sectors of industry, take into consideration the latest advances in information technology, and to provide support for their practical implementation. and which also make it possible to take an integrated, holistic approach to the management of information security. As a result of the program, a range of security protocols, methodologies, tools and regulations with genuine practical value will be created for the mapping, assessment and management of threats and risks related to the use of IT resources, initially in those areas of the economy where they are most urgently needed owing to the scale of potential losses or high levels of vulnerability (e.g. the health sector, civil administration, critical infrastructure, internal security, national security, defence). Some of the research projects focus on the prevention of losses resulting from flawed or erroneous information management and information security, while others aim to minimise and manage any losses that do occur. 12 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 16 human security Organisational and human security research Our research project into organi- procedures into business and operating process, and incorporate sational and human resources them into an all-encompassing security system. Our research and security starts out from the development in this area makes it possible to achieve the integrated premise that although general management and prevention of the security weakness inherent in research into operational risks organisational processes, and of the cognitive, causative and does place emphasis on organi- behavioural factors underlying human risks, as well as the imple- sational and human risks, and mentation of automatic security alerts with respect to threats their implications with respect to business processes and potential of this nature. damage; it is incapable of providing satisfactory methodological Our team of researchers, headed by Professor László Mérô, are proposals for the system-level management of these risks. Our working to ensure the predictability of human threats through market research carried out in this field also provides evidence a comprehensive analysis of communication processes, as well as that, in today’s fiercely competitive environment, human resources quantifying the potential damages resulting from a failure to have taken on a special importance, which is accompanied by eliminate human security risks. The research topics addressed a corresponding increase in the significance of the risks arising within the framework of the program are intended to assist in from this source. The purpose of our research and development identifying the security risks of organisational processes, and project, launched jointly with human resources auditing specialist assessing the human security implications of risk-courting and ANIMA Polygraph Psychological Consulting Ltd, is to develop risk-avoiding behaviour, as well as detecting instances of misleading a methodology for analysing the risks related to human (and communication and manipulative behaviour, and formulating organisational) resources and assessing the role that these factors methodologies for intervening in such cases. play in company processes, and, through the systemisation of this information, to develop reliable, automated systems for forecasting and detecting human risks. The existing human security solutions are not system-based; indeed, they are often highly subjective in their nature, attempting to assess levels of human security risk without first performing a comprehensive analysis of the related processes. In Hungary, futurIT was the first to initiate the analysis of human security risks based on an objective methodology, to integrate these analytic 13 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 17 data recovery Data recovery and data storage research Data storage is undergoing a re- features that would make it possible to carry out complex data volution. Conventional magnetic recovery assignments. • media are beginning to reach “Storage” theory - This research explores the complex struc- their technological limits, with tures, risks and methodologies of data storage; how to a variety of tricks being used to structure a storage unit in order to facilitate easy data recovery, further stretch these boundaries, and how to restore the structure of a corrupted data storage unit. • while the use of flash-based Solutions for the decrypting of Flash media. The data storage devices is on the rise. structure of flash devices is not standardised, with manufac- However, it now appears unlikely that even flash will be the data turers using a different solution for virtually every type of storage technology of the future. One thing is certain: mankind device. It is often impossible to determine the structure of wants to store a growing mass of data, and some of this will a faulty device simply by examining it, which means that always be lost. There will always be data to recover. another device of the type has to be decrypted, to ascertain In the course of its data recovery operations KÜRT deals with storage the storage structure. This is a highly complicated and labour- devices and technologies that are constantly changing and evolving, intensive mathematical and technological task. The aim of the and so the company has to continuously develop new techniques research is to automate this work, and provide software or in order to achieve the required standards. However, despite these other support for it. • efforts there are aspects of the existing technologies that even Restoration of the internal structure of JPG files - The boom in KÜRT is unable or reluctant to deal with, owing to a lack of time or digital photographic technology means that the problem of the requisite skills. Students participating in the Data Recovery repairing corrupted jpeg files, and developing algorithms for and Storage laboratory first received theoretical training in KÜRT’s this purpose, is encountered on a daily basis. Owing to the Data Recovery Know How(tm), to familiarise them with KÜRT’s high compression rates used, this represents a difficult ma- current technological capabilities and main development areas. thematical and logical challenge, even if only a few bytes Then we involved them in specific research tasks. of data have been corrupted. Research areas • The logical structure of the latest NSS file system used by Novell Netware, and methods for its recovery. Software-based partial data recovery solutions are available in the market, but they do not even come close to offering the broad range of 14 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 18 knowledge management Knowledge management programme communication with clients, academic partners and visitors. The Knowledge Management programme supports the technical 2. Organisational development, including the creation of the orga- activities conducted in the frame- nisational units that will perform the various activities, after work of the futurIT programme. the infrastructure has been set up. Its main objectives and the key 3. Establishing day-to-day operative processes that will enable the functions it plays are as follows: research teams and other internal and external experts to connect with elements of the organisation’s knowledge base • and technical infrastructure. Sharing the information and expertise gathered in the course of the individual research programmes between the various Currently, we are working on setting up the server infrastructure; research projects the server processes have been launched, and we are uploading Central assessment and storage of the results generated by the technical materials into the system as they are being prepared. the individual research programmes Key areas of the futurIT Knowledge Management programme Finding the human resources required for the research The Knowledge Management programme runs in parallel with programmes and ensuring their availability futurIT’s other activities, summarising and publishing the profes- Seeing to the professional development of the researchers sional findings of the various research programmes carried out as and experts involved in the programme and providing career a part of the overall project. The key areas that it will concern itself counselling for them with are as follows: Communicating the findings of the research work to the academic • futurIT website community and to the business sector as effectively as possible • security forum Maintaining contact with other research centres and trade • journal, thematic and periodical publications organisations • scientific articles The Knowledge Management programme will strengthen futurIT’s • professional and educational articles professional foundations and recognition in academic circles and • studies and analyses the business sector alike, thereby contributing to the achievement • conference lectures of the project’s key goals. • critical reviews for competitions and tenders • materials for competitions and tenders Sub-tasks • membership in organisations 1. Creating the infrastructure that makes up the physical environment • futurIT talent management programme (in co-ordination with • • • • • necessary for operation, securing a presence on the internet, University of Pannonia’s FIT talent nurturing programme) 15 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 19 futurIT „Information Security Knowledge Centre” FuturIT_eng_ok.qxd 07/11/5 9:41 Page 20 RESULTS Task II. Development of a standard methodology for information security solutions 18 Annual Report 2007 futurIT Subtask 3: Raising the standards and awareness of information security in Hungary, communication Organisation, management and implementation of vocational education, adult trainig programs and social events Launch, management and promotion of scientific journal with review content (1 year) Adult training and vocational further training materials Publication of first issue of the professional journal on the futurIT portal, in PDF format Documentation of conferences Organisation and management of domestic and international information security conferences Documentation of the Student’s Partnership Program Up-to-date futurIT website, description of the portal’s service Formulation of the MSc training system, compilation of syllabus, preparation of teaching materials, launch of information security MSc training, final examinations, dissertation Subtask 2: Launch of information security training within the framework of engineering MSc degree courses Methodology for planning secure IT systems Documented risk analysis methodologies and threat maps Comprehensive system of information security protocols Documented planning and rating methodology Product UP FIT UP FIT KÜRT - - UP FIT - UP FIT - UP FIT - - - KÜRT KÜRT KÜRT KÜRT KÜRT - KÜRT KÜRT KÜRT Responsible 15. OCT. 15. OCT. 5. NOV. 5. NOV. 15. OCT. 15. OCT. 15. OCT. 15. OCT. 15. OCT. 15. OCT. 15. OCT. 15. OCT. Deadline Results (research papers/ procured equiment) Setting up, continuous updating and development of an information security internet portal (3 years) Compilation of information security systems development methodology Drawing up of an information security threats map Compilation of IT and information security protocols (by industry, resource, threat) Subtask 2: Development of information security tools Subtask 3: Assessment, analysis and management of IT threats and risks Establishment and continuous updating of a national-level information security knowledge base Subtask 2: Formulation of a national information security regulation system Formulation of risk analysis methodology and specialist-area risk management methodologies Formulation of information security rating procedures Professional content Subtask 1: Development of IT solutions security planning and rating methodology Subtask Task RET - stage 1 report materials 9:41 III. Information security rating system and tools development 07/11/5 IV. Development of an information security training system FuturIT_eng_ok.qxd Page 21 Accounting period accounting FuturIT_eng_ok.qxd 07/11/5 9:41 Page 22 results achieved Results achieved in the last reporting period As a Regional Knowledge Centre, futurIT, brings together the The futurIT research, development and training programs concen- expertise, research, education and development capacities of its trate on three main aspects of information security: partners, while also consolidating its network of international relationships and base of practical experience, within the frame- • Preventing the loss (destruction) of information work of close scientific, professional and business cooperation. • Preventing information from falling into the hands of unautho- The results achieved in the first working stage of the project have rised parties contributed to boosting innovation and R&D capacities in the field • Ensuring business continuity of information security. Meanwhile, through the organisation of training programs, the project is generating a pool of qualified The results of the project work will be used partly to devise means labour for knowledge-intensive small and medium-sized enterprises, of prevention, and partly - following the occurrence of a security while spin-off companies and consortium members, through their event - to develop ways of minimising the resulting damage. own R&D activities, are creating new jobs for the graduating Accordingly, futurIT supports information security, defined as the specialists. As a result of the Centre’s basic and applied research, achievement and continuous maintenance of a given state of oper- businesses operating in the region are gaining access to marketable ation, through implementation of the following tasks: products and services, and new jobs are being created. The results of the project are announced to the international • Creation of an information security knowledge base community through specialist publications and at conferences. • Formulation of information security standards and methodologies Through these - with the participation of renowned educational • Development of information security tools institutions, as well as international industry organisations, specialist • Design, operation and certification of IT systems authorities and enterprises - a global network of relationships is • Education, and promoting the use of information security standards, methodologies, and information security tools being formed, which will help to further improve the professional • standards, recognition and accessibility of the futurIT project, broaden Raising the professional standards of information security in the scope of research and development work, and generate new Hungary, communicating and promoting a general awareness opportunities for the practical application of research results, at of such standards a regional and even international level. 19 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 23 preparation I. Project preparation 20 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 24 infrastructure 1. Supporting infrastructure Launching of the planned conditions, futurIT will renovate the university premises that have R&D activities of the Regional been placed at its disposal using its own funds, and will create Information Technology Security the technological conditions and infrastructure required. Selection Knowledge Centre assumes the of the contractors and the implementation of the work will take existence of a range of tools and place in the context of a public tendering procedure. resources that were not previously available to the consortium members. Therefore, the initial setting up of the requisite infrastructure offers an opportunity to create a solid basis - one that will constitute the foundations for the successful implementation of later phases of the project. The investment plans are essentially based on the infrastructuredevelopment tracks set by the R&D project entitled “Development of a methodology for integrating logical, physical and human security technologies through the application of tools based on intelligent agents”, launched in 2005 as a part of the Ányos Jedlik programme. Our aim is to create a working research environment of an international standard, acknowledged and respected in academic as well as professional circles. Therefore, the premises in which the centre is housed are currently being developed accordingly, including the upgrading and expansion of the range of furnishings and equipment. No new property has been purchased for futurIT; the premises were made available by Pannon University, in a central, muchfrequented location at the university campus (Building “I”). Due to the technical condition of the premises and to the shortcomings of the current equipment, in order to provide appropriate working 21 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 25 resources 2. Procurement of the resources necessary for R&D The aim of the project is to set up research facilities that conform to the exacting standards of the international scientific community, in which all the computer equipment and other resources necessary for performing the research and development and creating a safe environment, as well as for analysing the developed IT and information security solutions, are available. Accordingly, modernisation of the Centre’s premises, and expansion and upgrading of the equipment and resources at its disposal, is currently in progress. The procurement of new equipment has also commenced, within the framework of a public procurement tender. In the first stage, this equipment is comprised of the following: • PC-type computers (workstations and data recovery machines) • File servers • Network printing devices • Devices necessary for developing a computer network • Physical security devices (entry system, motion sensors, video surveillance equipment) • Software (in the first phase, primarily software supporting the working group’s activities, and training) • Office and training software packages • Risk analysis support software 22 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 26 organisation 3. Organisational structure The targets of futurIT’s research and development organisation are research into their given field. The heads of the laboratories are determined partly by the objectives of futurIT’s long-term strategy, recognised experts in their academic field, and usually oversee and partly by the expectations arising from the special characteristics research teams of 4-10 specialists - researchers and PhD of the individual research programs, and the specific tasks necessary students - per laboratory, and are allocated clearly defined objectives for their implementation. The research and development work is and resources for the achievement of the tasks set forth in the organised along the lines of the departmental system that has been individual subprograms. successfully applied at the University of Pannonia’s IT Faculty for many years. Specialists from the various fields, and the participants It is also possible for two or more research laboratories to cooperate in specific research subprograms, carry out their work grouped in the implementation of a given program, or individual projects into “research laboratories”. Each of the research laboratories within it. Or, if necessary, a single laboratory can participate in focuses on a clearly-defined field of research or set of scientific several R&D projects simultaneously, and the same applies to the questions. The laboratories carry out both basic and applied participating researchers and PhD students. financial system 4. Financial management system The system for regulating the financial operations of futurIT (planning, evaluating the success of research and development programs; accounting, controlling) builds on the currently effective Financial and a system of individual performance appraisal, for assessing Management Regulations of the University of Pannonia, since the achievements of individuals participating in the work of futurIT. futurIT functions as a partially autonomous separate budgetary This financial management system makes it possible to measure unit of the university. the achievement of set strategic, operational and management The monitoring, controlling and evaluation of futurIT’s financial targets within a consolidated controlling framework. An additional performance is performed using a three-level Balanced Score Card benefit of the system is the ability to judge, based on the indicator system of interrelated indicators: strategic-level performance values at any given time, whether and to what extent it is necessary ratios for the comprehensive measurement of performance in terms to make changes to the entire project, the individual programs of the achievement of long-term goals; project-level indicators for or procedures related to their operative management. 23 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 27 it security II. Creating an uniform methodology background for IT security solutions 24 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 28 planning 1. A planning and rating methodology for IT solutions Systems and software develop- At present, security solutions are typically regarded as a cost ment is a key issue in Hungary factor, although recent research suggests that money spent on today, owing to the pivotal role security is an investment. that IT plays in the economy and government administration. The The gradual emergence of security-aware development and ope- development and maintenance of rating methods, and their increasingly widespread use, is leading competitive systems and a soft- to a shift in focus towards proactive (as distinct from reactive) ware development industry is indispensable for enabling methods of protection. Several methodologies already exist for Hungarian enterprises to participate in the global economy. ensuring that sufficient attention is paid to the management of security problems that arise in the course of designing computer The management of security problems can no longer be regarded equipment, applications and systems. These are expected become as simply an IT-related question. Today, the use of IT resources is widely available in the market by 2010, which means that the integral to administrative processes, which means that besides timing of our efforts to develop resources of this type could not protecting the technologies themselves, it is also imperative to be better. protect the information management processes that they support. Over the coming 5-10 years, the software development methodologies, architectural solutions and operating practices that enable IT devices and systems to be used more securely will be introduced, and their use will become more widespread. In terms of increasing the general level of security, the appearance of methodologies that enable more secure software development will have an especially pronounced impact. The majority of security problems can be traced back to software development flaws. Currently, no comprehensive set of methodologies and resources is available for the development of secure software at anything like the speeds demanded by the market. It is important to recognise that just because a software applica- 25 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 29 tion has adequate functionality, it is not necessarily secure. Although quality software development does help to eliminate security problems, the production of secure software entails additional cost. There is a need for strict controls on the project and support environments; the managers with responsibility for user systems must take responsibility for the security of the project and its support environment. They will have to ensure that all proposed changes to the system are investigated to establish how they will affect the security of the system or its operating environment. It is also necessary to formulate an effective set of development regulations. Since the security of IT equipment and systems is largely dependent on the skills and knowledge of their operators and users, we also need to list, among the prerequisites for secure operation, the raising of users’ and operators’ awareness of security issues. Ensuring the security-awareness of users and operators is primarily a question of training. In the course of the project we have studied the most important systems development methodologies and software solutions in use, which could serve as a basis for security awareness development. The systems development methodology used in the project combines the most important elements, performance indicators and documents of the various systems-development methodologies analysed (SSADM, RUP, MSF, SPICE, CMMI - Safety Extension), and integrates them to form a target-oriented solution. 26 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 30 regulatory system 2. A national information security regulatory system The emergence of computers with a set of recommendations that take into consideration the has not only led to an increased latest advances in information technology, providing them with demand for information security, a set of guidelines for the comprehensive regulation of infor- but the nature of the informa- mation security. tion to be protected has also undergone a series of profound The purpose of developing a national information security changes. The development and regulation system is to formulate a comprehensive and consistent evolution of networked computer systems has fundamentally measurement, analysis, regulation, testing, rating and certification transformed the ways that information is gathered, processed methodology, which can serve as a basis for making the operation and stored. Various organisations find themselves faced with the of IT and information systems more secure, reliable, transparent, problem that their stored information is vulnerable to threats straightforward and efficient. such as data theft, computer fraud and espionage, as well as fire, flood and other environmental hazards. In future, the completed regulatory system could function as a set of guidelines for the complex management of information The complex and diverse nature of security threats makes it security at organisational level. These could be used to implement necessary to simultaneously employ numerous protective mecha- a set of Hungarian regulations for ensuring information security, nisms, which, at the same time, need to be interoperable and based on consistent principles and in compliance with international seamlessly integrated with each other in order to ensure effective standards and recommendations. protection. However, there is a limit to the level of security that can be achieved exclusively through technical means, which is The consolidated regulatory system will also provide the manage- why support must be provided in the form of effective regulatory ment and specialists of organisations with a comprehensive and controlling methods. overview of information security-related expectations and requirements, as well as offering guidance, in all stages of Through the development work to be performed at futurIT, in IT developments, for the planning, implementation, assessment the interests of consolidating Hungary’s existing, heterogeneous and maintenance of information security. information security regulations, we aim to provide legislators 27 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 31 risks 3. Assessment, analysis and management of IT threats and risks The likelihood of risk factors Our research shows that threats to the security of IT systems have impacting the operating processes now become so complex that the general application of formal risk of companies and organisations, analysis methods to analyse IT risks gives rise to a number of and the potential resulting dam- serious problems. Such techniques are unsuitable for resolving ages, are varied. Organisations the problems related to raising security levels, especially with in Hungary and the central-eastern regard to protecting against new threats. However, IT risk analysis European region are increasingly can also be performed using methods that focus directly on IT dependent on information technology, which raises the question security measures, making it possible to achieve more easily of how to develop secure IT systems. One of the most important interpretable results at a much lower cost. aspects of this is the assessment, analysis and management of IT threats and risks. To ensure their own security, organisations Our research shows that, to ensure successful implementation, must be aware of the weak points and risks inherent in their risk analysis processes need to focus - even in the short term - on own IT systems, as well as the security measures that they can ensuring that available resources are always channelled to where implement in order to minimise such risks. they are most effectively capable of reducing security risks. Accordingly, within the framework of the futurIT project, we aim Our analyses reveal that locally available resources and security to develop comprehensive, consistent methodologies for the measures are usually insufficient to deal with the new types of efficient and effective assessment, analysis and management challenges and threats that have to be surmounted in order to of IT threats. strengthen and develop security at a given organisation. A common problem is that certain factors which are critical at local level, say, for a given organisational unit or specialist department, may not be regarded as important by the rest of the organisation. To compound the problem, the organisation often does not possess accurate information in this regard, since professionally prepared, scientifically grounded and comprehensive threat assessments and risk analyses are few and far between. 28 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 32 it security III. IT security qualification and development of devices 29 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 33 certification 1. Security certification of IT solutaions International industry associations information security differs, as do the procedures for IT operation, and standards organisations, as the regulation of matters related to information security technologies, well as their counterparts at the and the management and controlling of information security systems. appropriate national and local levels, are constantly developing To ease the interpretation and management of the various guide- and expanding the standards and lines, we have begun analysing the key elements and conclusions guiding principles related to infor- of the following key standards and recommendations: mation, its management, information security, and the related • ITIL (IT Infrastructure Library) procedures and devices. • COBIT (Control Objectives for Information and Related Technology) In this regard, it is essential for us to be able to negotiate the tangled • ISO/IEC 15408 (CC-Common Criteria) web of standards, standardised procedures, guiding principles, • BS7799 - ISO/IEC 17799:2005 and measurement and auditing procedures. Professionals working • ISO/IEC TR 13335 in this field are expected, as a basic requirement, to be capable of • ISO/IEC 27001:2005 using the most appropriate procedures in every area and for every • NIST SP 800 (National Institute of Standards and Technology, task. The applicability of standards pertaining to IT, security and Computer Security Resource Center) • MEH ITB recommendations 8 and 12 • MIBÉTS guidelines • MIBIK guidelines 30 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 34 development 2. Development of information security tools In light of the methodological does help to eliminate security problems, the production of principles applied in the project, secure software always entails additional cost. There is over the coming 5-10 years it is a need for strict controls on the project and support environments. likely that the software develop- Under the standards analysed in the course of our research ment methodologies, architec- (especially the CMMI - Safety Extension), the responsible tural solutions and operating managers must ensure that all proposed changes to the system practices that enable IT devices are investigated to establish how they will affect the security of and systems to be used more securely will be introduced, and that the system or its operating environment. It is also necessary to their use will become more widespread. formulate an effective set of development regulations. Our research has shown that the majority of security problems Since the security of IT equipment and systems is largely can be traced back to software development flaws. Currently, dependent on the skills and knowledge of their operators no comprehensive set of methodologies and tools is available for and users, we also need to list, among the prerequisites for the development of secure software at anything like the speeds secure operation, the raising of users’ and operators’ awareness that the market requires. It is important to note that just because of security issues. Ensuring the security-awareness of users a software application is adequate in terms of functionality, it is and operators is primarily a question of training. not necessarily secure. Although quality software development 31 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 35 training IV. Implementing information security training system 32 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 36 PhD education 1. PhD education and research in information security FuturIT actively involves students Among the research topics related to the knowledge centre, at the Information Technology students displaying exceptional talent and academic ability are PhD School of the University of currently invited to apply to conduct research into the Pannonia in its research and “Synthesising of integrated security systems”. development work. During the recent period, three PhD students defended their The purpose of the training is dissertations on subjects related to information security. (The relevant to provide exceptionally talented data is included in the indicator spreadsheet.) At present a total students with the opportunity to gain practical experience, through of four students are engaged in studies based on an individual participation in cutting-edge research into information security, syllabus, but one that is closely tied in with futurIT’s research and and to receive comprehensive specialist training that will enable development activities and objectives. them to eventually become leading experts in the fields of In the long term we plan to extend the PhD training abroad, information security and data protection, with an outstandingly through cooperative partnerships with other universities engaged high theoretical understanding of these subjects. in similar activities elsewhere in the European Union. 33 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:41 Page 37 MSc education 2. MSc education in information security The training and education courses program are making excellent progress, and during the current launched by futurIT are closely tied period three dissertations have been defended. in with the Knowledge Centre’s research and development pro- Accredited Bachelors (BSc) and Masters (MSc) courses in infor- grams. The results of research mation security and development work are incorporated into the training materials, The need to raise the profile of information security, as well as the thereby ensuring that the skills imparted are as up-to-date as possible. growing demand for appropriately qualified IS professionals, has led The involvement of PhD students in the research and development us to launch programs of accredited higher-education training, projects ensures that, besides acquiring theoretical knowledge, provided at two levels within the national education system. The they also gain the necessary academic and practical experience. scientific work carried out at the Centre, and the use of its results, The training programs also draw on the “know-how” knowledge ensure that the study programs will produce highly skilled profes- base related to the project’s research and development programs. sionals. The BSc course in information security has already been The Centre’s education and training program is comprised of the launched, while the syllabus and lectures for the MSc course have following types of courses: been prepared, and are awaiting approval by the Hungarian Accreditation Committee. The study programs impart the very latest PhD (post-graduate education in Hungary and abroad) skills in this field, with special regard to information and areas of theoretical and practical research that are highly relevant even internationally. The purpose of the training is to provide exceptionally talented students with the opportunity to gain practical experience, through participation in cutting-edge research into information security, and to receive comprehensive specialist training that will enable them to eventually become leading experts in the fields of information security and data protection, with an outstandingly high theoretical understanding of these subjects. In the long term we plan to extend the PhD training abroad, through cooperative partnerships with other universities engaged in similar activities elsewhere in the European Union. The first participants in the PhD 34 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 38 Vocational training, adult education For organisations, besides being able to draw on the specialist FuturIT communicates knowledge, protective techniques and expertise of information security professionals, the general promotion guidelines related to information security risks, risks that of information security awareness is also a priority. In response to are growing in parallel with technological development, this need, we develop a variety of vocational and adult training through the publication of scientific results and the holding of courses, either on a regular or one-off basis. The training materials lectures and seminars, in order to draw society’s attention to are largely built upon the results of the Centre’s research and the potential dangers. development work, as well as the training experience accumulated • by the participating consortium members, and our university and Organisation of conferences For the purpose of ensuring that the results of scientific industrial partners. research can be more effectively utilised and marketed, and to The Centre also performs the following activities, which are tied in promote information security awareness, the Centre regularly closely with its education and training program: organises conferences with the participation of leading Hungarian and visiting foreign specialists in both theoretical • Promotion of information security awareness, communication and practical fields of information security. 35 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 39 awareness 3. Raising awareness and professional standards of information security in Hungary The objective of the futurIT project is to lead the way in information conferences on a regular basis, the Centre holds workshops both security research, development and education in the central Trans- at home and abroad, and publishes specialist journals to present danubian region, in Hungary and central Europe as a whole, through the latest results of specific research areas. the high-level theoretical and practical training of senior industry The futurIT research, development and training programs concentrate professionals, the development of world-class information security on three main aspects of information security: preventing the loss procedures, methodologies and tools, and the provision of support (destruction) of information, preventing information from falling for their practical implementation. The scope of activities extends into the hands of unauthorised parties, ensuring business continuity from the conducting of basic research to the sale of fully developed Besides leveraging the benefits of its unique position, in the long products through spin-off companies. In addition to all of this, futurIT term futurIT aims to build a global network with the participation aims to become an international information security knowledge of renowned Hungarian and foreign educational institutions, inter- base and conference centre. national professional associations, specialist authorities and enter- The futurIT project will help to stimulate innovation and boost R&D prises. With the assistance of this network, the quality, recognition capacity in Hungary, and through the vocational training programs and accessibility of the training program can be further improved, will generate a pool of qualified labour for knowledge-intensive research and development operations expanded, and additional small and medium-sized enterprises, while the spin-off companies opportunities created for the practical application of research results and consortium members, through their own R&D activities, will at a local, regional and even an international level. create new jobs for the graduating specialists. By developing IT security methodologies and tools, assisting in the The education and training program of the futurIT project will development of knowledge-intensive industries, and concentrating enable the Information Technology Faculty of the University of R&D capacities, and, through this, by increasing competitiveness, Pannonia to impart the latest skills in fields that are expected to the Knowledge Centre’s activities also complement the EU’s current retain their importance over the long term, and to provide its PhD research framework program (EU FP 7). students with highly relevant technological research topics. The We are especially keen to form partnerships with leading international Centre’s basic and applied research work will help businesses organisations that are active in the following areas, which are cur- operating in the region to develop saleable products and services, rently being afforded priority globally and in the EU in particular: thereby stimulating job creation. • Protection of infrastructure and services Besides its specialist publications and conferences, the results • Restoration of security and operation in emergencies achieved by the knowledge centre will also be presented and propa- • Integration and interoperability of security systems gated, both internationally and in Hungary, through its products • Security and society and the work of foreign students. As well as organising industry • Coordination and structuring of security research 36 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 40 INDICATORS FuturIT_eng_ok.qxd 07/11/5 9:42 Page 41 dissertations PhD dissertations Three students completed their Ph.D. dissertations in 2007. The table below presents the key data related to their doctoral work: Name Subject Institution Consultant Time of defence Péter Ludik Methodological and technical ELTE University Tibor Remzsô May 2007 opportunities for creating and imple- Faculty of IT Department Pannon University menting a virtual learning environment for Information Systems Information Visualization ELTE University Tibor Remzsô Faculty of IT Department Pannon University Andrea Major June 2007 for Information Systems István Heckl Synthesis of separation networks: University of Pannonia’s FIT Ferenc Friedler simultaneous application Department for Applied Pannon University of separation methods based Computer Technology June 2007 on various attributes Their results are expected to be applied in various phases can be applied in designing educational computer applications and of the project. The findings related to the virtual learning environment in disseminating the completed materials. (Péter Ludik) can be used in creating our electronic education István Heckl’s results can be used in our educational activities systems and distributing adult education materials. Similarly, the and in developing optimal network (e.g. information security) results relating to the visualisation of information (Andrea Major) applications. 38 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 42 university research PhD, post-doctorate and university research positions Since the 2006 academic year, Information Security has been referencing of the developed synthesis procedures with the results included among the PhD subjects taught at the PhD School of the of existing security certification procedures. University of Pannonia’s IT Faculty. The course involves designing Several researchers with a background in mathematical modelling a methodology for the mathematical description, synthesis, certi- are contributing, on a part-time basis, to developing the theoretical fication and development of security systems. Two PhD scholars, background for the security systems. The internationally renowned and two PhD candidates who have already gained their pre-degree professor of operational research, István Maros - who has recently certificates, are currently studying this topic at the University of left his post at the Imperial College, London, to return to Hungary Pannonia. Their work includes the formal description and modelling - is also contributing his expertise to the research conducted within of business processes and the IT systems supporting them, defining the framework of the futurIT project. We succeeded in attracting the relationship between existing information security certification Maros back to his home country in September 2006 to participate procedures and process engineering procedures, the development in the implementation of a research project funded through the of an algorithmic method for the optimal synthesis of business Ányos Jedlik program, and he currently holds a professorial chair processes from an information security standpoint, and cross- at the IT Faculty of the University of Pannonia. 39 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 43 students Students partnership program The aim of the student a sound knowledge of the English language, as well as a high level partnership program of commitment to the field of information security. All of these is to involve some of attributes are essential for fulfilment of the high professional the most promising standards and ambitious targets of the project. university students For participating students, the student partnership program in the research and provides an opportunity to conduct pioneering research in the field development activities of information security, while the publications and other forms of the futurIT project. This provides them with an opportunity of communication engaged in by the Centre place particular to gain first-hand experience of the world-leading development emphasis on raising awareness, within society, of information work carried out at futurIT, and to acquire skills that will enable security and other related matters. The program is closely them to work to the highest professional standards after graduating. integrated with the unique talent-nurturing system of the The program begins with a strict selection procedure, during University of Pannonia’s Information Technology Faculty. which we assess the applicants’ commitment to research and The 11 students who are currently participating in two research development, gain a picture of their personal abilities, commitment, programs - the development of a Data Recovery Technology and and the quality of work that they can be expected to contribute to an Integrated Security product range - began their work within the the project. Naturally, students joining the program are also framework of the program at the start of the year. expected to achieve outstanding academic grades, and have 40 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 44 competition 24-hour programming competition sponsored by futurIT University of Pannonia, Faculty of Information Technology, The students were given 24 hours to meet the challenge. The nec- 27-28 March 2007 essary hardware was provided, but the software had to be written or else gleaned from the internet by the competitors themselves. The Faculty of Information Technology at the University of Pannonia For the purposes of addressing the problem, the teams of students traditionally endeavours to train high numbers of competent IT also had to create an optimal test environment. professionals, while ensuring that those who display outstanding ability are given every opportunity to excel. One means of achieving this is to hold a range of competitions that provide an opportunity for participants to showcase their expertise and abilities outside the classroom environment, by solving complex practical tasks while working to a short deadline. To summarise their results, the participants had to hold a theoretical presentation and a live, practical demonstration, each lasting five minutes. Many of the members of the winning team are now working on research and development projects at futurIT. The competition was sponsored by the University of Pannonia, This year’s competition focused on bringing students face to face KÜRT Information Security and Data Recovery Co., the futurIT with an increasingly relevant and practical issue related to IT secu- Integrated Security Research and Development Centre, the rity: how much time is needed to steal data from a computer using Ministry of Education, Sicontact Ltd. and Continental Teves only a camera aimed at the computer’s monitor? Magyarország Ltd. Further information and images: http://www.irt.vein.hu/verseny/ 41 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 45 adult training Adult training As part of the adult training The trainers were all senior consultants from KÜRT, with decades programme, KÜRT held a number of practical experience behind them (Norbert Oroszi, Attila Papp of 3-day practical IT risk- and Ferenc Frész). management training sessions The training course was based around the following key topics: in October and December 2006, in partnership with the IQSOFT John Bryce Training Centre. Day 1 - Assessing the state of an IT system: The participants on the courses - professionals with theoretical knowledge - had an opportunity to learn from practical experience • Project launch (on the IT side) gained from dozens of risk management projects. • Analysing the information technology • Analysing the IT processes The training course focused on reviewing the theoretical back- • Analysing relevant threats ground, implementing risk management solutions, determining possible errors that can arise and how to avoid them, analysing the Day 2 - Assessing the expectations of the business side: difficulties and the various ways of tackling them, and discussing and solving specific problems through case studies. • Project launch (on the business side) • The practical tools of assessment The aim of the training course was to present the practical • Determining parameters application of risk management to theoretical experts and • Assuring that life goes on without IT decision-makers. The sessions primarily focused not on theoretical knowledge, but on practical difficulties and how to solve them, Day 3 - Creating the optimum security level: while also emphasising the importance of performing the essential paper work that accompanies the associated regulatory tasks. • Implementing the project • Evaluation scales Participants also had a chance to practice preparing and using work • Determining the optimum risk level materials related to the implementation of risk management solutions. • Risk management at work in an organisation 42 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 46 transfer Technology transfer The purpose of technology transfer is to ensure the practical Demand for the developed methodologies, and for software and application of results achieved within the context of futurIT, and hardware products, is high among large corporations, who benefit the localisation of existing international research findings that from leveraging the technologies produced by the subprojects. futurIT requires for its operation. The technology transfer activities This means that the results of the research are highly marketable performed at futurIT draw on the work of the Knowledge in Hungary, the European Union and even globally. A good example Management laboratory, which performs the collation and presen- of this is the recent signing of a declaration of intent between tation, in a professional context, of the results of research futurIT and the European-US-Middle-Eastern security conglomerate programs carried out within the framework of the projects, and Alacera International (www.alacera.com), which plans to purchase publication of the best practices developed. the results of the laboratories’ research. The target groups of stakeholders who will benefit from technology In the future, it will be possible to sell the spin-offs to a variety transfer, and the techniques employed during the transfer process, of target groups at various stages in the companies’ life cycles. differ greatly depending on the nature of the different types of research and development results. We primarily intend to raise the initial capital for the spin-offs through the involvement of “angel investors”. In this case, a small The results of basic research are utilised by futurIT through its equity stake would be offered in exchange for a low investment share. publications and the elaboration of methodologies. The results of applied research and product development are not commercially We plan to make the successful spin-offs - those that already have exploited by the laboratories themselves, since they are geared a number of successful reference projects under their belt - avail- exclusively towards the development side of operations, which able to industry investors and venture capitalists, thereby attracting is what gives them their comparative advantage in this respect. substantial capital investment to ensure the long-term sustainability Instead, futurIT establishes spin-off companies specifically to of the development work commenced. perform the sales of developed products. The scientific knowledge that these spin-offs require in order to sell the products is received from the university, while the business and professional skills are provided by specialists from the commercially-oriented consortium partners. 43 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Process based IT security applied research Page 47 IT security methodology integration IT security research laboratory IT SECURITY KNOWLEDGE BASE Functional and security requirement system IT security qualification methodology IT security auditing methodology IT Security Certification Center IT risk analysis methodology Supporting authorities in IT related issues Preparing IT security draft Security qualification of IT devices and systems IT security system methodology Development IT security devices IT security methodology Device based IT security applied research INVENTION IT security certification IT security PhD programme IT Security Education Centre School-based higher education of IT security Education and training of IT security professionals INNOVATION DIFFUSSION Social awarness of IT security communication conferences Conferences On 23 November 2006 the conference entitled Intelligent Systems Systems. The symposium also provided an opportunity to discuss - Symposium of Young Researchers 2006, was held in Budapest and debate our results to date, as well as ongoing research projects. by the Artificial Intelligence department of the John von Neumann Computer Society. The purpose of this one-day symposium, held KÜRT held its highly successful industry conference entitled: in the main hall of the Hungarian Academy of Sciences Computer Hey! Do we still have time for that? - The relationship (or lack “H and Automation Research Institute (MTA SZTAKI) in Kende utca, there of) between business processes and information manage- was to give an overview of the work of researchers into theoretical ment” on 17 May 2007. The conference aimed to highlight the and practical questions related to intelligent systems, to provide an need to improve communication between business and informa- insight into the current state of Hungarian workshops established tion technology, in order for IT to provide optimal support for enter- for this purpose, and to debate the challenges and problems prises and the achievement of business goals. Within this frame- currently faced by researchers, educators and IT professionals. work KÜRT presented its new business solutions and various ele- At the conference, researchers from the IT Faculty of the University ments of its product range designed to facilitate the strengthening of Pannonia presented the results of their research into multi-agent of such relationships. systems and applications. The title of their presentation, which attracted a great deal of interest, was: Combinatorially Accelerated On 7-9 June 2007, the Hungarian Operational Research Society, Branch and Bound Algorithm for the Synthesis of Security the Bolyai János Mathematics Society and the Economic Modelling 44 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 48 Society, jointly organised the 27th Hungarian Operational chains, the design, management and risk analysis of information Research Conference at Balatonôszöd, attended mainly by scien- security systems. tists conducting research into the theoretical and methodological University of Pannonia, Faculty of Information Technology branches of operational research. The conference’s organising Hungarian Academy of Sciences, Veszprém Regional Committee committee placed particular emphasis on the presentation of applications and case studies, and lectures about the results Guest speakers of completed or ongoing operational research. At the conference, • researchers from the IT Faculty of the University of Pannonia Lorenz T. Biegler, Department of Chemical Engineering, Carnegie Mellon University presented their model for the specification and optimisation • of security systems in the P-graph methodology applications Hans Georg Bock, Interdisciplinary Center for Scientific Computing (IWR), University of Heidelberg section. The title of the presentation was: The Use of P-graph • Methodology for the Definition and Synthesis of Security Systems. J. Frederic Bonnans, The French National Institute for Research in Computer Science and Control (INRIA) The conference provided an opportunity for peer assessment • of the developed mathematical model, and thus represented Dorit S. Hochbaum, Haas School of Business and Department of IE&OR, Etcheverry Hall, University of California an important landmark in the research program. • Etienne de Klerk, Department of Econometrics and Operations Research, Faculty of Economics and Business Administration, Veszprém Optimization Conference: Advanced Algorithms (VOCAL Tilburg University 2006), Veszprém, 13-15 December 2006 • The VOCAL conference presents the latest findings into optimization Yurii Nesterov, Center for Operations Research and Econometrics (CORE), Catholic University of Louvain (UCL) algorithms, through a series of presentations held by internationally • acclaimed researchers. The guest speakers give an overview of András Prékopa, Rutgers Center for Operations Research (RUTCOR), Rutgers, The State University of New Jersey the current state of continuous and discrete optimization, including • the complexity and convergence characteristics of the algorithms, Annick Sartenaer, Departement of Mathematics, Notre-Dame de la Paix University (FUNDP) and their fields of application. The purpose of the event is to create an opportunity for researchers and developers working in theoret- Participants ical and practical fields to meet and share their expertise in the Researchers from numerous countries on four continents have context of a prestigious international conference. submitted presentations for the 2006 conference (Algeria, Besides introducing the mathematical theory behind the proposed Belgium, South Africa, United States, United Kingdom, North optimization methods, the presentations also explore the potential Cyprus, France, the Netherlands, India, Iran, Canada, Hungary, areas for their application in an engineering setting. These include, Nigeria, Norway, Slovenia, Turkey). for example, complex industrial processes, logistical supply 45 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 49 resources Resources Key person Consortium member Tasks Time expenditure (day) Chief Researhcer Dr. Sándor Kürti Zoltán Homola József Kmetty János Kürti Attila Papp Tibor Remzsô Botond Bertók Ferenc Friedler Tamás Terlaky Thokozani Majozi Zoltán Kovács István Maros Gyula Simon Zsolt Tuza Sándor Dominich JúliaGóth Rozália Lakner KÜRT Co. KÜRT Co. KÜRT Co. KÜRT Co. KÜRT Co. University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia II/1,2; III/2 II/3; III/2 II/1,2; III/2 II/1,2; III/2 II/3; III/2 II/1,2; III/2 IV/2,3 IV/2,3 IV/2,3 IV/3 II/3 II/1,2; III/2 IV/2,3 IV/2,3 II/1,2; III/2 II/1,2; III/2 II/1,2; III/2 100 100 100 100 100 75 50 25 20 13 10 10 10 10 5 5 5 Researcher Krisztián Harnos Zoltán Kertész Ferenc Kovács Michael Wellington KÜRT Co. KÜRT Co. KÜRT Co. KÜRT Co. II/1,2; III/2 II/1,2; III/2 II/1,2; III/2 II/1,2; III/2 100 100 75 75 Research and development associate István Megyeri Róbert Nemkin Gábor Szekeres Tamás Kürti Róbert Adonyi László Halász Attila Keresszegi Károly Kalauz Károly Sarkadi Zoltán Süle Tünde Tarczali Orsolya Ujvári KÜRT Co. KÜRT Co. KÜRT Co. University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia University of Pannonia II/1,2; III/2 II/1,2; III/2 II/1,2; III/2 IV/2,3 IV/2,3 IV/2,3 IV/2,3 IV/2,3 IV/2,3 IV/2,3 IV/2,3 IV/2,3 100 100 100 75 37 30 30 25 25 25 25 25 46 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 50 Key person Consortium member Tasks Time expenditure (day) Orsolya Kristóf Anita Stahl Csilla Raffai University of Pannonia University of Pannonia University of Pannonia IV/2,3 IV/2,3 IV/2,3 13 13 6 Administrative staff Katalin Virág Cziráki Júlia Sárossi Timea Blaskó KÜRT Co. KÜRT Co. KÜRT Co. 50 50 25 Other (student) Sum II/3 26 Sum: Full time equvalent number of staff 1867 7.78 people Activity distribution Administrative staff: 7% Other (student): 1% Chief Researcher: 39% Research and development associate: 34% Researcher: 19% 2006-2007 Indicators 2006-2007 Indicators/Publications Planned National publications 25pcs Actual technical 6pcs general 48pcs International publications 1pcs technical 2pcs 47 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 51 Indicators/Positions Planned Actual PhD researcher jobs 6 people 6 people Postdoctoral jobs 4 people 4 people Researcher jobs 5 people 7 people PhD dissertation 3 people 3 people BSc and MSc students 20 people 20 people Training students 20 people 14 people Indicators/Professional Programmes Planned Actual Conference lectures 25pcs 26pcs Conferences 3pcs 2pcs KÜRT 2007 Conference Veszprém Optimization Conference: Advanced Algorithms (VOCAL) media Media appearences RET professional 22.11.2006 • Attila Papp • Integration of security systems • Hadmérnök special 2006 23.11.2006 • Z. Süle, B. Bertók, F. Friedler • Combinatorially Accelerated Branch and Bound Algorithm for Process Synthesis, Symposium of Young Intelligent Systems Researchers • SZTAKI 01.05.2007 • Simon, G., M. Molnár, L. Gönczy, B. Cousin • Dependable k-coverage algorithms for sensor networks • CD-ROM ISBN 14244-1080-0 Proceedings of the Instrumentation and Measurement Technology Conference - IMTC 2007 08.05.2007 • Attila Papp • Dock leaves to cure nettle stings • Computerworld XXXVIII évf 19 sz 07-09.06.2007. • Z. Süle, B. Bertók, F. Friedler • The application of P-graph methodology for the definition and synthesis of security systems • 27th Hungarian Operations Research Conference, Balatonôszöd 15-17.10.2007. • Simon, G., L. Szabados, A. G. Tóth • Model-based code generation for fast-deployment security applications • 2nd International Workshop on Secure Information Systems (SIS’07), Wisla, Poland Attila Papp • Integration of security systems • Computerworld XXXVII évf 40 sz 48 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 52 media Media appearences RET PR 16.02.2006 • Tamás Kürti • Veszprém knowledge centre • Gazdasági Rádió • 16.02.2006 • Sándor Kürti, József Kmetty, Zoltán Gaál Dr. • More secure information handling • Piac & Profit 17.02.2006 • József Kmetty • KÜRT in development project with university • Népszabadság 17.02.2006 • Sándor Kürti, József Kmetty, Tamás Kürti, Zoltán Gaál Dr., Ferenc Friedler Dr. • Researchers for security - partnership between KÜRT Co. and Veszprém University • Veszprém Megyei Napló 21.02.2006 • Zoltán Gaál Dr., József Kmetty • Information Security R+D Centre opens under partnership between KÜRT and Veszprém, University (www.terminal.hu ) • www.terminal.hu 02.03.2006 • Tamás Kürti, Zoltán Gaál Dr. • Top security for information • Népszabadság 19.05.2006 • Miklós Boda, Tamás Kürti, György Beck • Support depends on results • NKTH 01.06.2006 • Ferenc Friedler Dr. • Contributing to the region’s development • Veszprém Megyei Napló 14.06.2006 • Sándor Kürti • Esti Judit • Integrated Information Security • Kossuth Rádió 15.06.2006 • Sándor Kürti • Fehér Mariann • Fidesz hacks Socialist Party’s server • Klub Rádió 03.08.2006 • Sándor Kürti • Veszprém knowledge centre 25.02.2007 • Tamás Kürti • Like the American dream - in Hungary (Veszprém Megyei Napló, 25 February 2007) • Veszprém Megyei Napló 01.04.2007 • István Megyeri, Zoltán Kertész, József Kmetty • Flash data recovery • M1/Delta • 10.05.2007 • University participates in program • Veszprém Megyei Napló 08.06.2007 • Tamás Kürti, Árpád Tóth G., Ferenc Friedler Dr. • Tsec • Napló Online 08.06.2007 • Tamás Kürti, Árpád Tóth G., Ferenc Friedler Dr. • US-Hungarian cooperation - Security systems development centre being formed • Veszprém Megyei Napló 11.06.2007 • Tamás Kürti, Árpád Tóth G. • Tsec • Computerworld Online, Hirtv.hu, HWSW.hu, IT.News, Hirado.hu, Menedzsmentfórum, PC World, Portfolio.hu, Primonline, Terminal, MTI, EuroAstra Internet Magazin 11.06.2007 • Tamás Kürti, Ferenc Friedler Dr. • Tsec • Eduport.hu, Infovilag, EuroAstra 49 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 53 media Media appearences 12.06.2007 • Tamás Kürti, Árpád Tóth G., Ferenc Friedler Dr. • Tsec • Piac & Profit Online, Infomedia, Origo, Biztonsagportal, Computerworld, HR Portal, Veszprém index, Vilaggazdasag Online, Tranit-hu, aHirek.hu 14.06.2007 • Tamás Kürti • Girnt József • Tsec • Napi Gazdaság 14.06.2007 • Tamás Kürti, Árpád Tóth G., Ferenc Friedler Dr. • Tsec • Metro, FM Portal 16.06.2007 • Tamás Kürti, Ferenc Friedler Dr. • Tsec • Webbusiness 19.06.2007 • Tamás Kürti • Kováxs M. Veronika • Tsec, University of Pannonia/Security Systems • Metro 21.06.2007 • Tamás Kürti • Tsec • Echo TV 21.06.2007 • Tamás Kürti, Ferenc Friedler Dr. • Tsec • Echo TV 21.06.2007 • New technology centre established • METRO • 21.06.2007 • Tamás Kürti, Ferenc Friedler Dr., Árpád Tóth G. • New technology centre established • METRO KÜRT professional 11.01.2006 • László Csôsz • Sláger Rádió, Bochkor Gábor • Data recovery at Nasa • Sláger Rádió 13.01.2006 • György Dolánszky • Szilvay Balázs • Friday 13th virus • Kossuth Rádió 19.01.2006 • Géza Molnár • Beregi Nagy Edit • Why the lifespans of CDs and DVDs are getting shorter • Info Rádió 19.01.2006 • József Kmetty • Kárász Róbert • Is there currently a sure-fire form of protection against hackers? • Echo TV 23.01.2006 • Sándor Kürti, Géza Molnár • Kálmán Alida • Why the lifespans of CDs and DVDs are getting shorter • Duna TV 23.01.2006 • Géza Molnár • Lukács Csaba • Data storage media - data-loss rates • Magyar Nemzet 23.01.2006 • György Dolánszky • Girnt József • Free telephony - Skype • Napi Gazdaság 26.01.2006 • György Dolánszky • Obrusánszky Borbála • Internet hazards • Privát Kopó Magazin 02.02.2006 • József Kmetty • Bárány Róbert • Question marks surrounding CD data recovery • TV2 17.02.2006 • Sándor Kürti • Kósa Melinda • Fidesz hacks Socialist Party’s server • M1, M2, TV2 12.08.2006 • Géza Molnár • Data loss storm • Info Rádió 50 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 54 media Media appearences 14.08.2006 • Ferenc Frész • Litauszky Balázs • Biometric codes • Info Rádió 22.08.2006 • Sándor Kürti • Bercsény Luca • Finnish decree on company monitoring of employees’ emails, the risks of corporate email (data theft...) • Klub Rádió 10.01.2007 • Sándor Kürti Sándor, István Megyeri • Data recovery from flash memory • Kossuth Rádió-Digitális 06.02.2007 • György Dolánszky • Kránitz Balázs, P. Kiss Zsuzsa • Data loss / Data protection • Kossuth Rádió - Napközben 12.02.2007 • György Dolánszky • Kántor Endre • Radio Cafe 01.04.2007 • Ferenc Frész • Security awareness • Számítástechnika - CIO supplement 13.04.2007 • József Kmetty • Does IT make the state more transparent? • IT business 18.04.2007 • Géza Molnár • Demand for data • Interfax, EuroAstra, Hírvadász, SG, Digitalage, TRANZIT, Napló, MenedzsmentfórumStaféta, Veszprém Megyei Napló 19.04.2007 • Géza Molnár • Demand for data • Computerworld, Infovilág, Biztonsagportal.hu, 3hackers.hu, Hirfal.hu, Számítástechnika online 20.04.2007 • Dea Csuba • Data recovery • Magyar Computer Club 24.04.2007 • Géza Molnár • Demand for data • IT business 01.05.2007 • Cebit, log analysis • Chip 15.05.2007 • Gábor Szekeres • Demand for data • Echo Tv 08.06.2007 • Sándor Kürti • Vermes Péter • Data protection, data recovery • Asztallap (The monthly journal of Mensa Hungary) 19.06.2007 • Data recovery • Computerworld 06.07.2007 • Sándor Kürti • Kovács Anita • Data recovery, foreign expansion • Lánchíd Rádió 49 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 55 programmes Professional Programmes RET professional 23.11.2006 • Symposium of Young Intelligent Systems Researchers, Budapest, SZTAKI • Combinatorially Accelerated Branch and Bound Algorithm for Process Synthesis • Z. Süle, B. Bertók, F. Friedler 13-15.12.2006. • Veszprém Optimization Conference Veszprém, Hungary • Advanced Algorithms (VOCAL) • Botond Bertók, Zoltán Kovács 01-03.05.2007 • Proceedings of the Instrumentation and Measurement Technology Conference IMTC 2007 Warsaw, Poland • Dependable k-coverage algorithms for sensor networks • Simon, G., M. Molnár, L. Gönczy, B. Cousin 07-09.06.2007 • 27th Hungarian Operations Research Conference • Use of P-graph methodology for the definition and synthesis of security systems • Z. Süle, B. Bertók, F. Friedler 15-17.10.2007. • 2nd International Workshop on Secure Information Systems (SIS’07), Wisla, Poland • Model based code generation for fast-deployment security applications • Simon, G., L. Szabados, A. G. Tóth KÜRT professional 13.04.2006 • Microsoft • Information management, or: Beyond our capabilities? • Sándor Kürti, Ferenc Frész, Sándor Zsilinszky 19.09.2006 • HM presentation • Information management, or: Beyond our capabilities? • Sándor Kürti, Ferenc Frész, Sándor Zsilinszky 17.05.2007 • KÜRT Conference • The relationship (or lack thereof) between business processes and information management • Balázs Dakó, Richárd Pécsi, László Bartal, Balázs Balázs, Sándor Zsilinszky, Ferenc Frész, Norbert Oroszi, Attila Papp, György Kis 26.09.2007 • ITBN (IT Security Day) • Security intelligence: cure and prevention in IT • Tamás Kürti 08.06.2006 • Internet boat • 7th European Internet Boat - Hungarian innovation and skills export in IT • Kmetty József 50 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 56 financial indicators Financing, summary of financial indicators Cost categories Budgeted Aid Own resources Total Actual Staff compensation 44,260 42,000 86,260 20,256 Employer contributions 14,640 0 14,640 6,564 External contracting 30,000 16,000 46,000 32,722 Other financial expenditure 15,500 25,000 40,500 61,149 Purchase of intangibles 12,000 0 12,000 30,675 41,000 0 41,000 0 157,400 83,000 240,400 151,366 Purchase of machines, plant and equiment Total 53 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 57 Budgeted costs for the first phase of work Purchase of machine, plant and equiment: 17% Staff compensation: 36% Purchase of intangibles: 36% Other financial expenditure: 17% Employer contributions: 6% External contracting: 19% Actual costs of the first phase of work Purchase of machine, plant and equiment: 0% Staff compensation: 13% Purchase of intangibles: 20% Employer contributions: 4% External contracting: 22% Other financial expenditure: 41% 54 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 58 monitoring Monitoring RESULTS Commercially viable results of the project the project • Number of newly developed* 3pcs • Number of jobs created as a result of the project • Products 0pc • at enterprises • services 0pc • at research centres 6pcs • technologies 0pc • - of which: research posts 6pcs • applications 0pc • prototypes 0pc 0pc (Note: full-time equivalent) Economic value • Number of patents pending* • Hungarian 0pc • PCT 0pc • foreign 0pc • How many of the following were participated in the centre’s activities • Number of patents issued • research centres 3pcs • enterprises 2pcs • Number of new enterprises established 0pc • Hungarian 0pc • Revenue of newly established enterprises (HUF) 0pc • PCT 0pc • Were the results of the projects exploited commercially? NO • foreign 0pc • Generated as a result of the project: • Extra sales revenue • Number of other industrial property rights* (e.g. trademarks, design protection, etc.) 0pc 0 HUF - of which: export sales revenue 0 HUF • Cost reductions 0 HUF Scientific results Social value • Publications (including lectures) • Hungarian (number X impact factor) • Did the project contribute to 54pcs • international (number X impact factor) • sustainable growth and environmental protection? 2pcs • equal opportunities? YES • security? YES 0pc • reduction of regional disparities? YES YES • other (Y/N), please specify • Number of dissertations • PhD 3pcs • MTA Doctorate • Did the research lead to a new international project? YES NO • Have the results of the project been publicly announced (Y/N). (under review) In what manner?* Human resources • Are the results of the project being utilised for the purposes of education/training? YES YES • to the general public YES (in BsC Courses) Other, special monitoring indicators specific to the project • How many of the following were involved in the project: • university students • within the industry NO 20pcs • PhD students 6pcs • young researchers 6pcs • Number of researchers who gained a doctorate as a result of 55 Annual Report 2007 futurIT FuturIT_eng_ok.qxd 07/11/5 9:42 Page 59 contact Contact Information Tamás Kürti Prof Ferenc Friedler Balázs Minárovits Head of futurIT Head of Consortium Technical manager AlbaComp H-1112 Budapest, Péterhegyi street, 98 H-8200 Veszprém, Egyetem street, 10 H-8000 Székesfehérvár, Mártírok street 9. kurti.tamas@kurt.hu friedler@dcs.vein.hu info@albacomp.hu our team Our team 56 Annual Report 2007 futurIT FuturIT_borito_eng.qxd 07/10/26 17:29 Page 1 futurIT Information Security Knowledge Centre H-8200 Veszprém, 10. Egyetem street • Telephone/Fax: +36 88 624 025 This publication was prepared within the framework of the Péter Pázmány Program, with the assistance of the National Office for Research and Technology. Published by the Pannonia Regional Knowledge Centre - futurIT Information Security Knowledge Centre Publisher: Dr. Ferenc Friedler Grafic design: Arttom Grafika Printing: TradeORG Nyomda