Skip to main content

Currently Skimming:

9 Category 6 - Speculative Research
Pages 214-220

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 214...
... Investment in this category of research should account for only a small fraction of the cybersecurity research budget, but some investment is warranted if only to ensure that groupthink does not suppress ideas that might in fact have merit. Specific examples of Category 6 research are, almost by definition, controversial.
From page 215...
... Similarly, a body of cyberattack knowledge that is independent of criminal intent may be very useful to cybersecurity researchers. Although in today's cybersecurity environment, many attacks are simple indeed, such a body of cyberattack knowledge would logically go far beyond the commonplace attacks of today to include at least some of the more sophisticated techniques that high-end attackers might use.
From page 216...
... What does "biological inspiration" mean? A report of the National Research Council on computing and biology suggests that a biological organism may implement an approach to a problem that could be the 1 See,for example, George Ledin, Jr., "Not Teaching Viruses and Worms Is Harmful," Communications of the ACm, 48(1)
From page 217...
... Given that the immune system is a very complex entity whose operation is not fully understood, a bottom-up development of a computer security system based on the 2 National Research Council, Catalyzing Inquiry at the Interface of Computing and Biology, John C Wooley and Herbert S
From page 218...
...  TowARd A SAFeR And moRe SeCuRe CyBeRSPACe immune system is not possible today. The human immune system has evolved to its present state owing to many evolutionary accidents as well as the constraints imposed by biology and chemistry -- much of which is likely to be artifactual and mostly irrelevant to the underlying principles that the system embodies and also to the design of a computer security system.
From page 219...
... These comments should not be taken as denigrating passive cybersecurity measures, which remain central to the nation's cybersecurity posture. Nevertheless, passive defenses have strong limitations, and active defense may provide a more robust set of options if the technical and policy issues can be resolved.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.