Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: ‘Trustworthy Cyberspace’: Federal R&D Priorities
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Analytics > Modeling > ‘Trustworthy Cyberspace’: Federal R&D Priorities
ModelingNewsSecurity

‘Trustworthy Cyberspace’: Federal R&D Priorities

AlexOlesker
AlexOlesker
0 Min Read
SHARE
In December 2011, the Executive Office of the President’s
In December 2011, the Executive Office of the President’s National Science and Technology Council  released Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, a set of R&D priorities for U.S. government agencies. 
The White House released Trustworthy Cyberspace to guide research, development, and funding by organizations DARPA, IARPA, and the DHS Science and Technology Directorate towards current deficiencies in cybersecurity, precluding future problems, and implementing new discoveries in the public and private sector.
The Strategic Plan outlines four broad research goals: inducing change, developing scientific foundations, maximizing research impact, and accelerating transition into practice. The project themes it looks for are designed-in security, tailored trustworthy spaces, presenting a moving target, and providing cyber economic incentives.

Several words and ideas crop up all over Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. One is the emphasis on “game-changing” technology. The Executive Office has realized that cybersecurity is a tremendous and growing problem, and that current solutions are not enough for today’s problems, let alone the problems of tomorrow that the Strategic Plan aims to solve. The federal government has traditionally been behind the curve on new technology but the R&D plan hopes to reverse this trend by pushing for early adoption. It is also pushing for completely revolutionary solutions based on novel discoveries that would change the way we do cybersecurity rather than incremental improvements on current technology.

Another is agility. The solutions that the National Science and Technology Council seeks will allow for flexible levels of trust and protection for different tasks and users, and will be able to adapt to new threats and challenges. Not only should they protect against a wide range of vulnerabilities, they should be able to evolve to fight attack vectors that will emerge in the future. They must also be able to detect, counter, and remediate problems quickly with the help of automation, requiring Big Data solutions to speed analysis.

Rigorous metrics are a third theme that runs through the R&D priorities. How secure are our systems? How dangerous are the threats? What is the cost of a security measure versus a possible attack? There is not yet an established way to answer or examine these questions. Our understanding of security, vulnerabilities, and cyberspace is still in its infancy, and Trustworthy Cyberspace aims to apply scientific rigour to the field so that it leaves the realm of art and becomes a true science. This means using the scientific method of observation, hypothesis, testing, then theory to establish fundamental laws which will enable better modelling and prediction.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data mining to find the right poly bag makers
Using Data Analytics to Choose the Best Poly Mailer Bags
Analytics Big Data Exclusive
data science importance of flexibility
Why Flexibility Defines the Future of Data Science
Big Data Exclusive
payment methods
How Data Analytics Is Transforming eCommerce Payments
Business Intelligence
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Internet Security
Internet of ThingsITSecurity

Secure Lava Lamps, and Why True Internet Security Is Hard to Come by

5 Min Read

How Airlines Measure Loyalty Using Big Data & Analytics

10 Min Read
types of data masking
Big DataExclusiveSecurity

Your Guide To Understanding Various Types of Data Masking

4 Min Read
MOT Data
Big DataExclusiveNews

The Advancement in Running MOT Data Services

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?