Skip to main content

Currently Skimming:

Part II An Illustrative Research Agenda
Pages 77-82

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 77...
... This breadth is based on the committee's belief that excessive priority setting in the cybersecurity research field runs significant risks of leaving the nation unprepared for a rapidly changing cybersecurity environment. The committee cautions policy makers strongly against neglecting potentially important topics in their quest to prioritize research.
From page 78...
...  TowARd A SAFeR And moRe SeCuRe CyBeRSPACe TABLE II.1 Mapping Research Topics to the 10 Provisions of the Committee's Cybersecurity Bill of Rights I II III IV Research Topicsa Availability Recovery Control Confidentiality Category 1 -- Blocking and Limiting the Impact of Compromise 4.1-Secure design, development, x x x x and testing 4.2-Graceful degradation and x x x recovery 4.3-Software and systems x x x assurance Category 2 -- Enabling Accountability 5.1-Attribution x 5.2-Misuse and anomaly detection x x systems 5.3-Digital rights management x Category 3 -- Promoting Deployment 6.1-Usable security x 6.2-Exploitation of previous work x x x x 6.3-Cybersecurity metrics x 6.4-The economics of cybersecurity x x x x 6.5-Security policies x x x Category 4 -- Deterring Would-Be Attackers and Penalizing Attackers 7.1-Legal issues related to x x x x cybersecurity 7.2-Honeypots x 7.3-Forensics x
From page 79...
...  An ILLuSTRATIVe ReSeARCH AGendA V VI VII VIII Ix x Authentication Flow Control Application Access Awareness Justice x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x
From page 80...
... 0 TowARd A SAFeR And moRe SeCuRe CyBeRSPACe TABLE II.1 Continued I II III IV Research Topicsa Availability Recovery Control Confidentiality Category 5 -- Illustrative Crosscutting Problem-Focused Research Areas 8.1-Security for legacy systems x x x x 8.2-The role of secrecy in x x x x cyberdefense 8.3-Insider threats x 8.4-Security in nontraditional x x x x computing environments and in the context of use 8.5-Secure network architectures x x x 8.6-Attack characterization x x 8.7-Coping with denial-of-service x x attacks 8.8-Dealing with spam x Category 6 -- Speculative Research 9.1-A cyberattack research activity x x x x 9.2-Biological approaches to x x x x security 9.3-Using attack techniques for x x x x defensive purposes 9.4-Cyber-retaliation x x x x NOTE: Some imprecision in this mapping is freely acknowledged, in the sense that a number of the specific mappings mentioned are the result of judgment calls that might be different if a different set of individuals were to make those judgments. As presented in Chapter 3 of this report, the 10 provisions of the Cybersecurity Bill of Rights are as follows: I
From page 81...
...  An ILLuSTRATIVe ReSeARCH AGendA V VI VII VIII Ix x Authentication Flow Control Application Access Awareness Justice x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x VII. Security in using computing directly or indirectly in important applications, including financial, health care, and electoral transactions, and real-time remote control of devices that interact with physical processes.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.