27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Edwin Leigh Armistead and Thomas Murphy<br />

use by home PC users in eCommerce. Identity theft protection needs will continue to increase, as<br />

criminals develop increasingly sophisticated means of stealing electronic identity data. The need for<br />

technologies to detect spoofing in emails and on websites will continue to grow. Finally, the capability<br />

to perform software verification and validation (V&V) to determine the inherent security of software<br />

code will become an area of increasing significance.<br />

We argued in the Strategies to Entering the Fray section, based on our analysis of current and<br />

expected contracts, that IA and Cyber Defense will receive increasing attention. Armistead and Clarke<br />

(Armistead, 2010; Clarke & Knake, 2010) also emphasizes the central and crucial importance of<br />

improving Defensive Cyber capability, and of having open debate on Cyber strategy/planning/policy –<br />

similar to the process carried out for nuclear weapons when that technology emerged 50 years ago.<br />

We appreciate the need for coverage and analysis of Defensive and Offensive Cyber strategy,<br />

operations and tactics. More importantly, we also see a serious need to fix a significant Defensive<br />

shortfall in the US cyber position. Because there is no agency with responsibility for Defense of<br />

civilian banking, commercial, industrial systems, and because the DoD and the USG partially depend<br />

on the commercial internet, a monumental vulnerability exists. Engaging in conflicts with a good<br />

offense but without a good defense will fail. The nation as a whole now finds itself in that situation.<br />

These factors define additional reasons the authors switched to the Defensive current focus in our<br />

Strategies for Entering the Fray section. Both Armistead and Clarke (Armistead L., 2010; Clarke &<br />

Knake, 2010) outline a process to establish a well-founded strategy-policy-plan and minimize risk of<br />

uncontrolled Cyber-Kinetic War. These analyses suggest several topics, simulations and desktop<br />

exercises, which would be useful to USG contract work. A well-founded analysis must address our<br />

overall Strategy and Political situation, with military and cyber strategy as a component of national<br />

strategy.<br />

A difficult area needing both theoretical and practical development is formulating Measures of<br />

Performance [MOP] and Measures of Efficiency [MOE] (Tokar, 2010). This is a focus area of military<br />

effects based (EB) planning. Roughly, when carrying out missions involving the application of<br />

components of IO, IW, Cyber, etc., we need to measure if we are “doing the right things” to effectively<br />

achieve our desired goals [MOP] and if we are efficiently “doing things right” [MOE] to not waste time,<br />

$, equipment and people. A related concept in the business world, which will be increasingly<br />

importance as USG and DoD budgets narrow, is Return on Security Investment [ROSI]. The difficulty<br />

with these ideas is in measuring the impact of one component alone when multiple different initiatives<br />

are brought to bear. How one separates the effects of one from the combination of all is directly<br />

related to the model of the complex DIMES-E processes being used.<br />

Finally, the need for new and improved models of complex, DIMES-E systems is the most<br />

fundamental barrier to achieving success, performance and efficiency. The benefits from such<br />

insightful theory and models will be similar to the leap forward in physical sciences resulting from<br />

Newton’s or Kepler’s Laws. If we are to more simply and accurately understand, predict and act to<br />

bring about a desired future, and if we are to be able to tease out the effects of one factor (e.g. SC,<br />

MISO, etc.) from the effects of many, then we must discover and apply much more insightful theories<br />

and mathematical models to DIMES-E systems. Such models can clarify the attribution of who and<br />

what is really at work and how to anticipate and adjust to the situation. This will allow everyone,<br />

leaders and members of governments and organizations alike, to move beyond simply knowing they<br />

are in serious hardship or risk, to appreciate what is being done right and what is not, and act to bring<br />

about a more desirable future rather than an expected undesirable future.<br />

6. Summary<br />

Our overall goal has been to provide both the sources of funding opportunity for academic<br />

researchers as well as sufficient background to understand the strategies for acquiring funding from<br />

those sources. We first described the intuition and insight into the motivation of players, relationships<br />

and integrated influences in the IA and IO business growth areas. In particular, we noted the<br />

important influence of stress from external conditions and global DIMES-E situations. The ability to<br />

understand and address these integrated problem areas is fundamental to an academic’s funding<br />

success. Based on an analysis of contracts up to September 2010, we noted a current focus on IA<br />

and Cyber security. We concluded that IA and Cyber Security are areas that should and will continue<br />

to receive contract funding. Next, we further analyzed current and historical IO, IW, IA and Cyber<br />

contracts and identified which companies have been awarded more contracts to date and are thus<br />

“opportunity targets” for academic consulting. We provided details of strategies to enter the contract<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!