Skip to main content

Currently Skimming:

Appendix C: Highlights from Other Research Agendas
Pages 82-92

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 82...
... Under the fifth recommendation, the committee highlighted a security research agenda that would include research regarding the following: (1) security modularity, (2)
From page 83...
... The committee believed that increased funding was warranted for both DARPA and the NSA for information security research and networked information systems trustworthiness research in general. In addition to the central recommendations relating to the research agenda, the committee highlighted a number of findings and recommendations related to security and trustworthiness (Box C.1)
From page 84...
... investigation. The overall objective was to develop a research agenda that could guide federal programs related to computing research and inform the research communities (in industry, universities, and government)
From page 85...
... It also highlighted that security analysis in embedded systems would be difficult because embedded networks expand the number of possible points of failure, tampering, or attack and homogenous embedded networks would need different security than heterogeneous embedded networks. For example, traditional network security techniques will suffice along with policy and protection methods in homogeneous embedded networks, but heterogeneous embedded networks will rely more heavily on trust management and security policies/methods at individual nodes and applications.
From page 86...
... The fourth was to support research infrastructure, recognizing that such infrastructure is a critical enabler for allowing research results to be implemented in actual information technology products and services. The fifth was to sustain and grow the human resource base, which will be a critical element in ensuring a robust research agenda in the future.
From page 87...
... to perform a study on the interplay of science with cybersecurity. As a part of the study, DoD posed a number of questions to be answered by JASON, including the following: •  What elements of scientific theory, experimentation, and/or prac tice should the cyber security research community adopt to make significant progress in the field?
From page 88...
... They stated that model checking could provide frameworks for examining security issues; cryptography could ­ rovide useful lessons relating to communi p cation in the presence of an adversary and the capabilities adversaries are assumed to have; randomization or use of obfuscation could help to construct defenses; and game theory could help to prioritize cyber defense activities. In addition, they noted that machine learning and event processing would be subfields of importance when trying to correlate anomalies in systems to actual attacks.
From page 89...
... The Federal Cybersecurity Research and Development Strategic Plan released in February 2016 expands on the strategic plan Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program released in December 2011. The strategic plan is built upon four assumptions related to adversaries, defenders, users, and technology (Box C.2)
From page 90...
... The plan wants defenders, defenses, and infrastructure to dynamically adapt to malicious cyber activities by efficiently reacting to disruption, recovering from damage, maintaining operations while completing restoration, and adjusting to thwart similar future activity. The four defensive elements, which ultimately support the overall plan, are dependent on six areas deemed critical to a successful cybersecurity R&D effort: (1)
From page 91...
... •  ecommendation 4. Expand the diversity of expertise in the cyber R security research community.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.