Remarks: Roadmapping and Hard Problems Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research.

Slides:



Advertisements
Similar presentations
K. F. Rauscher November 2004 C Q R Welcome IEEE COMMUNICATIONS SOCIETY Emergency Power Conference Monday, November 22, 2004 Bell Labs Network Reliability.
Advertisements

Security BoF: What Are The Community's Open Questions? Joe St Sauver, Ph.D. or Manager, Internet2 Nationwide Security.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
10/29/20091 Innovation Partnerhsip Models with the Finance Sector Dept. of Homeland Security Science & Technology Directorate Douglas Maughan, Ph.D. Branch.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
1 CNCI – from the top Susan Alexander CTO for Information and Identity Assurance OSD
Network Enabled Capability Through Innovative Systems Engineering Service Oriented Integration of Systems for Military Capability Duncan Russell, Nik Looker,
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
PMSS Final SOW May 22 nd, Statement of Work 2 GLENN RESEARCH CENTER PROJECT MANAGEMENT SUPPORT SERVICES (PMSS) The Contractor shall provide expert.
“When out of ammo, Reload” CYBERSECURITY CHALLENGES AND THREATS Ahmed Husain Managing Director.
© TecSec® Incorporated 2003 Threat Notification Model for Federal, State and Local Authorities Threat Notification Model for Federal, State and Local Authorities.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
High Confidence Medical Device Software and Systems Workshop: Government Participants and their Expectations June 2 – 3, 2005 Sally E. Howe, Ph.D. Associate.
Annual SERC Research Review, October 5-6, By Jennifer Bayuk Annual SERC Research Review October 5-6, 2011 University of Maryland Marriott Inn and.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
The Preparatory Phase Proposal a first draft to be discussed.
Unscrambling the Department of Homeland Security Presented to: Alliance South Arthur L. Brown
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
CII Board of Advisors Role & Responsibilities October 2, 2014.
Association of Defense Communities June 23, 2015
Critical Infrastructure Protection: Program Overview
E-Data Experts, Inc. An Introduction. 2 Agenda Introductions Introductions The Company Overview The Company Overview Our Services Portfolio Our Services.
Computer Science and Engineering 1 Future of Cyber Security.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
“The Resilient Economy: Integrating Competitiveness and Security” Council on Competiveness.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Landstar Application Case Study: Development Of Content-rich Solutions For The Mobile Employee Bob Leo Director of Professional Services October 15, 2000.
Ulrich Norbisrath, Ibrahim Armaç, Daniel Retkowitz, Priit Salumaa RWTH Aachen University Modeling eHome Systems 4th International Workshop on.
Innovation and Economic Infrastructures DIMETICS Pecs July Keith Smith Australian Innovation Research Centre.
Innovation: The Key to the Future of Security  Douglas Maughan, Division Director, DHS S&T  Moderator: Illena Armstrong.
Enterprise Risk Management for US Operations of International Banks Communication and Education.
Federal Aviation Administration Commercial Space Transportation Human Space Flight Occupant Safety Telecon Telecon #3 – Types of Requirements and Guidance.
The Real Time Initiative Laying the foundation for a Real Time Enterprise Internet Telephony Conference & EXPO October 14, 2003.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
IARPA Overview Jason Matheny Director, IARPA October, 2015.
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Workshop on Public Safety and Security Research 28 February 2008; 14:30 -16:30 EET Marina Congress Center, Katajanokanlaituri 6, Helsinki, Finland Marina.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Promoting Research and Education of IA & CyberSecurity Gordon W. Romney Ph.D Professor and Senior Research Scientist School of Engineering and Technology.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Betim ÇIÇO, South East European University (Republic of Macedonia) Marco University of Pavia (Italy)
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
NITRD/HCSS Perspective “Sufficient Evidence?” Design for Certifiably Dependable Systems Helen Gill, Ph.D. CISE/CNS National Science Foundation Co-Chair,
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Health Management Information Systems Health Information Systems Overview Lecture b This material Comp6_Unit2b was developed by Duke University, funded.
1 Visit Us :  The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual has the comprehensive set.
Cloud Security for eHealth – Study Validation
Information Security Program
AVIATION SYSTEM BLOCK UPGRADES (ASBU)
Overview of Wireless Networks:
Location Cloaking for Location Safety Protection of Ad Hoc Networks
9th European Interparliamentary Space Conference
David Sayago EU Research Funding Team Valorisation Centre.
Safety and Security- From Assessment to Implementation
Title By Name(s) CS 478 Network Security
IT Transformation: Strategic Plan & Pilot Public Education Department
Title By Name(s) CS 478 Network Security
Counterfeiting and Intellectual property theft in Medicines World Bank Symposium March 10, 2005 Washington DC Frederick Razzaghi Director of Technical.
Presentation transcript:

Remarks: Roadmapping and Hard Problems Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research and Development (NCO/NITRD) October 5, 2006

2 Suggested Features of R&D Roadmap Suggested Features of R&D Roadmap Timeline Milestones Assessment Metrics Identification of Interdependencies Strategy for Deploying R&D Results Complete, Minimal Overlap

3 Possible Aviation Safety Roadmap (11/11/05 Workshop Planning Meeting) Human Resources –Professional Development Manufacturers Regulators –Education and Training Curricula Large scale exemplars Requirements –Functionalilties –Properties Safety Completeness –Timing –Consistency Design –… Development –… Verification and Validation –… Certification –… Operations –… Economic Aspects –…

4 Example Roadmap (11/11/05)

5 Hard Problems Example: Infosec Research Council Hard Problems List This material was presented by Doug Maughan, DHS, at 1/26/06 CSIA IWG meeting

Courtesy Doug Maughan, DHS IRC Hard Problem List Topics 1. GLOBAL SCALE IDENTITY MANAGEMENT 2. INSIDER THREAT 3. AVAILABILITY OF TIME-CRITICAL SYSTEMS 4. BUILDING SCALABLE SECURE SYSTEMS 5. ATTACK ATTRIBUTION AND SITUATIONAL UNDERSTANDING 6. INFORMATION PROVENANCE 7. SECURITY WITH PRIVACY 8. ENTERPRISE LEVEL SECURITY METRICS

Courtesy Doug Maughan, DHS 7 3. AVAILABILITY OF TIME-CRITICAL SYSTEMS Motivation: SCADA, military, home-land security first responders often –Value availability over secrecy –Work in lossy, ad hoc wireless environments Challenges: limited resources –Computational processing power –Service quality guarantees given dynamics –Distributed systems compound problem Metric: Range of circumstances over which results can be guaranteed

Courtesy Doug Maughan, DHS 8 IRC Hard Problems List Summary “Stake in the ground” from the front-line Topics selected because of their importance to Government missions and the lack of solutions Not the only challenges in the IT security space Information security is not only about technology