School Work

DHS Cybersecurity Roadmap

Description
a guide to proper cyber security
Categories
Published
of 126
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
  November 2009  A Roadmap for Cybersecurity Research  i Contents Executive Summary ................................................................................................................................................iiiIntroduction ..............................................................................................................................................................v  Acknowledgements .................................................................................................................................................ixCurrent Hard Problems in INFOSEC Research1. Scalable Trustworthy Systems ...................................................................................................................12. Enterprise-Level Metrics (ELMs) ..........................................................................................................133. System Evaluation Life Cycle ...................................................................................................................224. Combatting Insider Threats ....................................................................................................................295. Combatting Malware and Botnets ..........................................................................................................386. Global-Scale Identity Management ........................................................................................................507. Survivability of Time-Critical Systems ..................................................................................................578. Situational Understanding and Attack Attribution ..............................................................................659. Provenance .................................................................................................................................................7610. Privacy-Aware Security ..........................................................................................................................8311. Usable Security ........................................................................................................................................90 Appendices Appendix A. Interdependencies among Topics ..............................................................................................A1 Appendix B. Technology Transfer ....................................................................................................................B1 Appendix C. List of Participants in the Roadmap Development .................................................................C1 Appendix D. Acronyms ......................................................................................................................................D1  iii Executive Summary Executive Summary Te United States is at a significant decision point. We must continue to defend our current systems and networks and at the same time attempt to “get out in front” of our adversaries and ensure that future generations of technology will position us to better protect our critical infrastructures and respond to attacks from our adversaries. Te term “system” is used broadly to encompass systems of systems and networks. Tis cybersecurity research roadmap is an attempt to begin to define a national R&D agenda that is required to enable us to get ahead of our adversaries and produce the technologies that will protect our information systems and networks into the future. Te research, development, test, evaluation, and other life cycle consider- ations required are far reaching—from technologies that secure individuals and their information to technologies that will ensure that our critical infrastructures are much more resilient. Te R&D investments recommended in this roadmap must tackle the vulnerabilities of today and envision those of the future. Te intent of this document is to provide detailed research and development agendas for the future relating to 11 hard problem areas in cybersecurity, for use by agencies of the U.S. Government and other potential R&D funding sources. Te 11 hard problems are:1. Scalable trustworthy systems (including system architectures and requisite development methodology)2. Enterprise-level metrics (including measures of overall system trustworthiness)3. System evaluation life cycle (including approaches for sufficient assurance)4. Combatting insider threats5. Combatting malware and botnets6. Global-scale identity management7. Survivability of time-critical systems8. Situational understanding and attack attribution9. Provenance (relating to information, systems, and hardware)10. Privacy-aware security 11. Usable security  For each of these hard problems, the roadmap identifies critical needs, gaps in research, and research agenda appropriate for near, medium, and long term attention.DHS S& assembled a large team of subject matter experts who provided input into the development of this research roadmap. Te content was developed over the course of 15 months that included three regional multi-day workshops, two virtual workshops for each topic, and numerous editing activities by the participants.
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks