Difference between revisions of "Cyber Security Research and Development Agenda"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 4: Line 4:
 
==Full Citation==
 
==Full Citation==
  
Inst. for Information Infrastructure Protection ''Cyber Security Research and Development Agenda'' (2003). [http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf  ''Web'']
+
Inst. for Infor. Infrastructure Prot. ''Cyber Security Research and Development Agenda'' (2003). [http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf  ''Web'']
  
 
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=I3P:2003&f=wikibiblio.bib BibTeX]
 
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=I3P:2003&f=wikibiblio.bib BibTeX]
 
  
 
==Categorization==
 
==Categorization==

Revision as of 14:08, 18 June 2010

Full Title of Reference

Cyber Security Research and Development Agenda

Full Citation

Inst. for Infor. Infrastructure Prot. Cyber Security Research and Development Agenda (2003). Web

BibTeX

Categorization

Overview: Government Reports

Key Words

Research & Development


Synopsis

This initial Cyber Security Research and Development (R&D) Agenda identifies R&D topics of significant value to the security of the information infrastructure that are either not funded or under-funded by the collection of private sector and government-sponsored research activities in the United States. The Agenda is based on information gathered and analyzed during the 2002 calendar year and reflects the input of experts in industry, government, and academia. The Agenda, together with that supporting information, is intended to aid researchers in identifying problems and R&D program managers in defining program directions. Areas in which new or additional research is needed include:

• Enterprise Security Management

• Trust Among Distributed Autonomous Parties

• Discovery and Analysis of Security Properties and Vulnerabilities

• Secure System and Network Response and Recovery

• Traceback, Identification, and Forensics

• Wireless Security

• Metrics and Models

• Law, Policy, and Economic Issues


Additional Notes and Highlights