A Roadmap for Cybersecurity Research: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 18: Line 18:
* Approaches: [[Government Organizations]]
* Approaches: [[Government Organizations]]


==Key Words==  
==Key Words==
 


[[Keyword_Index_and_Glossary_of_Core_Ideas#Civilian_Participation | Civilian Participation]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Terrorism | Cyber Terrorism]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Security | National Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Outreach_and_Collaboration | Outreach and Collaboration]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Privacy_Law | Privacy Law]]


==Synopsis==
==Synopsis==

Revision as of 14:00, 7 July 2010

Full Title of Reference

A Roadmap for Cybersecurity Research

Full Citation

Dep't of Homeland Sec. Sci. and Tech. Directorate, A Roadmap for Cybersecurity Research (2009). Web

BibTeX

Categorization

Key Words

Civilian Participation, Computer Network Attack, Cyber Terrorism, Department of Homeland Security, National Security, Outreach and Collaboration, Privacy Law

Synopsis

This cybersecurity research roadmap is an attempt to begin to define a national R&D agenda that is required to enable us to get ahead of our adversaries and produce the technologies that will protect our information systems and networks into the future. The research, development, test, evaluation, and other life cycle considerations required are far reaching—from technologies that secure individuals and their information to technologies that will ensure that our critical infrastructures are much more resilient. The R&D investments recommended in this roadmap must tackle the vulnerabilities of today and envision those of the future.

The intent of this document is to provide detailed research and development agendas for the future relating to 11 hard problem areas in cybersecurity, for use by agencies of the U.S. Government and other potential R&D funding sources. The 11 hard problems are:

1. Scalable trustworthy systems (including system architectures and requisite development methodology)

2. Enterprise-level metrics (including measures of overall system trustworthiness)

3. System evaluation life cycle (including approaches for sufficient assurance)

4. Combatting insider threats

5. Combatting malware and botnets

6. Global-scale identity management

7. Survivability of time-critical systems

8. Situational understanding and attack attribution

9. Provenance (relating to information, systems, and hardware)

10. Privacy-aware security

11. Usable security

For each of these hard problems, the roadmap identifies critical needs, gaps in research, and research agenda appropriate for near, medium, and long term attention.

Additional Notes and Highlights