A Roadmap for Cybersecurity Research: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 22: Line 22:
by agencies of the U.S. Government and other potential R&D funding sources.
by agencies of the U.S. Government and other potential R&D funding sources.
The 11 hard problems are:
The 11 hard problems are:
1. Scalable trustworthy systems (including system architectures and requisite
1. Scalable trustworthy systems (including system architectures and requisite
development methodology)
development methodology)
2. Enterprise-level metrics (including measures of overall system trustworthiness)
2. Enterprise-level metrics (including measures of overall system trustworthiness)
3. System evaluation life cycle (including approaches for sufficient assurance)
3. System evaluation life cycle (including approaches for sufficient assurance)
4. Combatting insider threats
4. Combatting insider threats
5. Combatting malware and botnets
5. Combatting malware and botnets
6. Global-scale identity management
6. Global-scale identity management
7. Survivability of time-critical systems
7. Survivability of time-critical systems
8. Situational understanding and attack attribution
8. Situational understanding and attack attribution
9. Provenance (relating to information, systems, and hardware)
9. Provenance (relating to information, systems, and hardware)
10. Privacy-aware security
10. Privacy-aware security
11. Usable security
11. Usable security
For each of these hard problems, the roadmap identifies critical needs, gaps in
For each of these hard problems, the roadmap identifies critical needs, gaps in
research, and research agenda appropriate for near, medium, and long term
research, and research agenda appropriate for near, medium, and long term

Revision as of 16:39, 27 May 2010

A Roadmap for Cybersecurity Research

Full Citation

Department of Homeland Security Science, Technology Directorate (2009): A Roadmap for Cybersecurity Research. U.S. Government. Online Paper. Web

BibTeX


Categorization

Overview: Government Reports

Key Words

See the article itself for any key words as a starting point

Synopsis

The intent of this document is to provide detailed research and development agendas for the future relating to 11 hard problem areas in cybersecurity, for use by agencies of the U.S. Government and other potential R&D funding sources. The 11 hard problems are:

1. Scalable trustworthy systems (including system architectures and requisite development methodology)

2. Enterprise-level metrics (including measures of overall system trustworthiness)

3. System evaluation life cycle (including approaches for sufficient assurance)

4. Combatting insider threats

5. Combatting malware and botnets

6. Global-scale identity management

7. Survivability of time-critical systems

8. Situational understanding and attack attribution

9. Provenance (relating to information, systems, and hardware)

10. Privacy-aware security

11. Usable security

For each of these hard problems, the roadmap identifies critical needs, gaps in research, and research agenda appropriate for near, medium, and long term attention.

Additional Notes and Highlights