Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Half Title
Title Page
Copyright Page
Contents
Foreword
Acknowledgments
About the Author
Introduction
1. The U.S. Federal Government Initiatives on Cybersecurity Research
1.1 Evolving toward Coordinated Cybersecurity Research
1.2 The Comprehensive National Cybersecurity Initiative
1.3 The Federal Information Security Modernization Act of 2014
1.4 The Cybersecurity Act of 2015 and Automated Indicator Sharing
1.5 The Cybersecurity National Action Plan
1.6 The Strategic Plan for the Federal Cybersecurity Research and Development Program
1.7 2016 Federal Cybersecurity RDSP
1.8 The Growing Necessity for Diverse and Specialized Research
1.9 Summary
1.10 Seminar Discussion Topics
Key Terms
References
2. The Department of Homeland Security Cybersecurity Research Programs
2.1 DHS CSD Research
2.2 Anonymous Networks and Currencies
2.3 Cyber-Physical Systems Security
2.4 Data Privacy Technologies
2.5 Distributed Denial of Service Defense
2.6 Talent Development Research
2.7 Cybersecurity Metrics
2.8 Experimental Research Testbed, Experiments, and Pilots
2.9 Internet Measurement, Attack Modeling, and Cyber Forensics
2.10 Mobile Device and Cloud-Based Systems Security
2.11 The Insider Threat Program
2.12 Summary
2.13 Seminar Discussion Topics
Key Terms
References
3. The National Institute for Standards and Technology
3.1 The Cybersecurity Role of NIST
3.2 The Cybersecurity Framework
3.3 Advanced Network Technologies Division
3.4 Computer Security Division
3.5 Federal Agencies Still Need to Implement NIST Standards for High-Impact System Security
3.6 NIST Smart Grid Program is a Journey into the Future
3.7 The CPSs Program is Necessary for the Journey
3.8 The National Information Assurance Partnership
3.9 Summary
3.10 Seminar Discussion Topics
Key Terms
References
4. The Defense Advanced Research Projects Agency
4.1 The DARPA Organization
4.2 The Cyber Grand Challenge
4.3 Active Authentication
4.4 Active Cyber Defense
4.5 Automated Program Analysis for Cybersecurity
4.6 Clean-Slate Design of Resilient, Adaptive, Secure Hosts
4.7 Cyber Fault-Tolerant Attack Recovery
4.8 Edge-Directed Cyber Technologies for Reliable Mission Communication
4.9 Enhanced Attribution
4.10 Extreme DDoS Defense
4.11 High-Assurance Cyber Military Systems
4.12 Integrated Cyber Analysis System
4.13 Mission-Oriented Resilient Clouds
4.14 Rapid Attack Detection, Isolation, and Characterization Systems
4.15 Space/Time Analysis for Cybersecurity
4.16 Transparent Computing
4.17 Vetting Commodity IT Software and Firmware (VET)
4.18 DARPA’s Request for Information: CSO R&D
4.19 Summary
4.20 Seminar Discussion Topics
Key Terms
References
5. Intelligence Advanced Research Projects Activity and In-Q-Tel
5.1 The IARPA Organization
5.2 IARPA Cyber-Attack Automated Unconventional Sensor Environment
5.3 IARPA Trusted Integrated Chips
5.4 In-Q-Tel and the U.S. IC R&D Needs
5.5 Summary
5.6 Seminar Discussion Topics
Key Terms
References
6. U.S. Military Cybersecurity Research and Deployment
6.1 The Military Cybersecurity Cross-Community Innovation Ecosystem
6.2 DoD Enterprise Cybersecurity Research and Deployment
6.3 Cyber Deception through Active Leverage of Adversaries’ Cognition Process
6.4 ONR Long Range BAA for Navy and Marine Corps Science and Technology
6.5 OT Agreements for Prototype Projects
6.6 DCO Research and Supporting Elements
6.7 Summary
6.8 Seminar Discussion Topics
Key Terms
References
7. The National Security Agency
7.1 NSA and the SoS
7.2 The NSA IA Research
7.3 Information for IT Decision Makers, Staff, and Software/Hardware Developers
7.4 NSA Office of Research and Technology Applications Technology Transfer Program
7.5 NSA Cybersecurity Publications
7.6 National CAE-CD
7.7 Summary
7.8 Seminar Discussion Topics
Key Terms
References
8. The National Science Foundation
8.1 NSF Overview
8.2 NSF Cybersecurity Research Activities
8.3 NSF Cybersecurity Research Grants
8.4 Summary
8.5 Seminar Discussion Topics
Key Terms
References
9. Federally Funded Research and Development Centers
9.1 FFRDCs Overview
9.2 The National Cybersecurity FFRDC
9.3 Jet Propulsion Laboratory
9.4 Cybersecurity Research at Other Federally Funded R&D Centers
9.5 Summary
9.6 Seminar Discussion Topics
Key Terms
References
10. DOE-Funded Research and Development Centers
10.1 Cybersecurity Research Activities of the DOE Research and Development Laboratories
10.2 Argonne National Laboratory
10.3 Idaho National Laboratory
10.4 Lawrence Berkeley National Laboratory
10.5 Los Alamos National Laboratory
10.6 National Renewable Energy Laboratory
10.7 Oak Ridge National Laboratory
10.8 Pacific Northwest National Laboratory
10.9 Sandia National Laboratories
10.10 Summary
10.11 Seminar Discussion Topics
Key Terms
References
11. Cybersecurity Research for Critical Industry Sectors
11.1 U.S. Critical Industry Sectors
11.2 EO for Improving Critical Infrastructure Cybersecurity
11.3 The NIST Framework for Improving Critical Infrastructure Cybersecurity
11.4 SSAs Cybersecurity Progress
11.5 Summary
11.6 Seminar Discussion Topics
Key Terms
References
12. Cybersecurity Research for Consumer Protection
12.1 Automotive Cybersecurity and Automated Vehicle Research
12.2 Cybersecurity Research for eEnabled Aircraft
12.3 Cybersecurity Research for Medical Devices and Hospital Networks
12.4 Cybersecurity Research for Protecting Personal Technologies
12.5 The U.S. Federal Trade Commission Focus on Consumer Protection
12.6 The IoT Learns to Fly with Unmanned Aircraft Systems
12.7 Summary
12.8 Seminar Discussion Topics
Key Terms
References
13. Cybersecurity Usability Obstacles and Research
13.1 The NIST Usability of Cybersecurity Team
13.2 The Basics of Usability Research
13.3 Usability Research Activities
13.4 MDS Usability
13.5 Growth in the Use of Handheld Computers for Internet Access
13.6 Literacy in the United States
13.7 Summary
13.8 Seminar Discussion Topics
Key Terms
References
14. Conclusions
14.1 Threat Level Red
14.2 A Stronger and Better Organized DHS
14.3 Over a Century of Service from NIST
14.4 Game Changing Capabilities from DARPA, IARPA, and In-Q-Tel
14.5 The Cross-Community Innovation Ecosystem of DoD
14.6 The SoS at NSA
14.7 The Progress of Science from NSF
14.8 The National Laboratories are National Treasures
14.9 Protecting Critical Infrastructure Sectors
14.10 Working to Protect Consumers
14.11 The Struggle for Cybersecurity Usability
References
Glossary
Index
← Prev
Back
Next →
← Prev
Back
Next →