The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - September (2010 vol.43)
pp: 31-40
Frederick T. Sheldon , Oak Ridge National Laboratory
ABSTRACT
Under the game-change metaphor, strategies developed to address hard problems will potentially lead to breakthroughs in many different interrelated cybersecurity areas. For software assurance, a game change should focus on improving resiliency and hardening new technologies that implement moving-target defenses and tailored trustworthy spaces.
INDEX TERMS
Trustworthy systems; R&D essentials, Game-change metaphors, Hard-problem strategies
CITATION
Frederick T. Sheldon, Claire Vishik, "Moving Toward Trustworthy Systems: R&D Essentials", Computer, vol.43, no. 9, pp. 31-40, September 2010, doi:10.1109/MC.2010.261
REFERENCES
1. C. Catlett et al., A Scientific Research and Development Approach to Cyber Security; www.er.doe.gov/ascr/ProgramDocuments/Docs CyberSecurityScienceDec2008.pdf.
2. DHS S&T, Roadmap for Cybersecurity Research, Jan. 2009; www.cyber.st.dhs.gov/docsDHS-Cybersecurity-Roadmap.pdf.
3. T. Gjelten, "Does Averting Cyberwar Mean Giving Up Web Privacy?" www.npr.org/templates/story/story.php?storyId=127575960; 9 June 2010.
4. T. Gjelten, "Timeline: Major Cybersecurity Incidents Since 2007"; www.npr.org/templates/storystory.php?storyId=125518567; 5 Apr. 2010.
5. National Cyber Leap Year Summit 2009 Co-Chairs Report; www.qinetiq-na.com/Collateral/ Documents/ English-US/InTheNews_docsNational_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf.
6. L.M. Hively, F.T. Sheldon, and A. Squicciarini, "A Vision for Scalable Trustworthy Computing," IEEE Security and Privacy, to appear 2010.
7. National Science and Technology Council, Federal Plan for Cyber Security and Information Assurance Research and Development, Inter-Agency Working Group on Cyber Security and Information Assurance, Apr. 2006.
8. President's Information Technology Advisory Committee, Cyber Security: A Crisis of Prioritization; www.nitrd.gov/pitac/reports/20050301_cybersecurity cybersecurity.pdf.
9. N. Kshetri, The Global Cybercrime Industry, Springer, 2010.
10. National Academy of Science, "Secure Cyberspace"; www.engineeringchallenges.org/cms/89969042.aspx.
11. M. Näf, "Ubiquitous Insecurity? How to 'Hack' IT Systems," Information & Security 7, 2001, pp. 104-118.
12. S.J. Prowell, R. Kraus, and M. Borkin, Seven Deadliest Network Attacks, Syngress, 2010.
13. M. Keeney et al., Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Secret Service and CERT Coordination Center, Carnegie Mellon SEI, May 2005, pp. 1-45.
14. M. Arrington, "Google Defends Against Large Scale Chinese Cyber Attack: May Cease Chinese Operations;" http://techcrunch.com/2010/01/12/google-china-attacks.
15. EMC2, "The Digital Universe Is Still Growing"; www.emc.com/leadership/digital-universe/expanding-digital-universe.htm, 2009.
16. M. Dacier, V-H. Pham, and O. Thonnard, "The WOMBAT Attack Attribution Method: Some Results," Proc. ICISS 2009, LNCS 5905, Springer, 2009; https://wombat-project.euwombat-project-description.html).
17. A. Spasova, "Tackling Cyber Crime Together"; www.guardian.co.uk/commentisfree/2009/jun/ 25cyber-crime-europe.
18. K. Poulsen, "US Defends Cybercrime Treaty"; www.securityfocus.com/news8529.
19. R. Adhikari, "Report Warns of More Cybercrime"; www.esecurityplanet.com/news/article.php/ 3790191Report-Warns-of-More-Cybercrime.htm.
20. R.K. Abercrombie, F.T. Sheldon, and A. Mili, "Managing Complex IT Security Processes with Value Based Measures," Proc. 2009 IEEE Symp. Computational Intelligence in Cyber Security,1 Apr. 2009, pp. 69-75.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool