ebook img

The science of cybersecurity and a roadmap to research PDF

208 Pages·2011·2.849 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The science of cybersecurity and a roadmap to research

DEFENSE, SECURITY AND STRATEGIES T S C HE CIENCE OF YBERSECURITY AND A ROADMAP TO RESEARCH No part of this digital document may be reproduced, stored in a retrieval system or transmitted in any form or by any means. The publisher has taken reasonable care in the preparation of this digital document, but makes no expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of information contained herein. This digital document is sold with the clear understanding that the publisher is not engaged in rendering legal, medical or any other professional services. D , S S EFENSE ECURITY AND TRATEGIES Additional books in this series can be found on Nova‘s website under the Series tab. Additional E-books in this series can be found on Nova‘s website under the E-books tab. C S , T OMPUTER CIENCE ECHNOLOGY A AND PPLICATIONS Additional books in this series can be found on Nova‘s website under the Series tab. Additional E-books in this series can be found on Nova‘s website under the E-books tab. DEFENSE, SECURITY AND STRATEGIES T S C HE CIENCE OF YBERSECURITY AND A ROADMAP TO RESEARCH BENJAMIN J. COLFER EDITOR Nova Science Publishers, Inc. New York Copyright © 2011 by Nova Science Publishers, Inc. All rights reserved. No part of this book may be reproduced, stored in a retrieval system or transmitted in any form or by any means: electronic, electrostatic, magnetic, tape, mechanical photocopying, recording or otherwise without the written permission of the Publisher. For permission to use material from this book please contact us: Telephone 631-231-7269; Fax 631-231-8175 Web Site: http://www.novapublishers.com NOTICE TO THE READER The Publisher has taken reasonable care in the preparation of this book, but makes no expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of information contained in this book. The Publisher shall not be liable for any special, consequential, or exemplary damages resulting, in whole or in part, from the readers‘ use of, or reliance upon, this material. Any parts of this book based on government reports are so indicated and copyright is claimed for those parts to the extent applicable to compilations of such works. Independent verification should be sought for any data, advice or recommendations contained in this book. In addition, no responsibility is assumed by the publisher for any injury and/or damage to persons or property arising from any methods, products, instructions, ideas or otherwise contained in this publication. This publication is designed to provide accurate and authoritative information with regard to the subject matter covered herein. It is sold with the clear understanding that the Publisher is not engaged in rendering legal or any other professional services. If legal or any other expert assistance is required, the services of a competent person should be sought. FROM A DECLARATION OF PARTICIPANTS JOINTLY ADOPTED BY A COMMITTEE OF THE AMERICAN BAR ASSOCIATION AND A COMMITTEE OF PUBLISHERS. Additional color graphics may be available in the e-book version of this book. LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA The science of cybersecurity and a roadmap to research / editor, Benjamin J. Colfer. p. cm. Includes index. ISBN 978-1-61122-362-0 (E-Book) 1. Internet--Security measures--Research. 2. Computer crimes--Prevention--Research. I. Colfer, Benjamin J. TK5105.59.S3843 2011 005.8--dc23 2011015355 Published by Nova Science Publishers, Inc. † New York CONTENTS Preface vii Chapter 1 Science of Cybersecurity 1 JASON Chapter 2 A Roadmap for Cybersecurity Research 45 U.S. Department of Homeland Security Chapter Sources 187 Index 189 PREFACE Information technology has become pervasive in every way, from our phones and other small devices to our enterprise networks to the infrastructure that runs our economy. As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation's critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. This new book examines the cybersecurity research roadmap in order to define a national R&D agenda that is required to enable us to get ahead of our adversaries and produce the technologies that will protect our information systems and networks into the future Chapter 1- The need to secure computational infrastructure has become significant in all areas including those of relevance to the DOD and the intelligence community. Owing to the level of interconnection and interdependency of modern computing systems, the possibility exists that critical functions can be seriously degraded by exploiting security fiaws. While the level of effort expended in securing networks and computers is significant, current approaches in this area overly rely on empiricism and are viewed to have had only limited success. Chapter 2- The United States is at a significant decision point. We must continue to defend our current systems and networks and at the same time attempt to ―get out in front‖ of our adversaries and ensure that future generations of technology will position us to better protect our critical infrastructures and respond to attacks from our adversaries. The term ―system‖ is used broadly to encompass systems of systems and networks.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.