11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

15. A Crisis of Prioritization• “Develop Mitigation and Recovery methodologies, to respond to unforeseenevents and recover from any resultant damage. This area includesrapid automated discovery of outages and attacks, new architecturesto enable rapid recovery, simplify systems to <strong>red</strong>uce human errors,and provide fault tolerance and graceful degradation.”• “Improve Cyber Forensics to more effectively catch criminals and detercriminal activities. To enable Law Enforcement Agencies to identifycriminal activities in Cyber Space, we need sophisticated Cyber Forensicstools and mechanisms, such as traceback of network traffic to identifyorigins of attacks, efficient search of massive data stores to identify stoleninformation, and identifying attackers based on their behavior.”• “Model new technologies and provide TestBeds to experiment withthem. Such testbeds and methodologies should scale to millions of nodes,should scale to very large amounts of data and should be designed insuch a way as to preserve the confidentiality of data.”• “Some scientific disciplines have developed universally acknowledgedmetrics and benchmarks which enable researchers measure the effectivenessof their approaches and provably compare their contribution tothe state of the art. In this spirit, we need to develop Security Metrics,Benchmarks and Best Practices for the Cyber Security field as well.”15.2 RecommendationsThe main recommendations of the Report include:• “NSF budget in this area be increased by $90 million annually.”• “The PITAC recommends that the Federal government intensify its effortsto promote recruitment and retention of cyber security researchers andstudents at research universities, with a goal of at least doubling the sizeof the civilian cyber security fundamental research community by theend of the decade.”• “The PITAC recommends that the Federal government strengthen itscyber security technology transfer partnership with the private sector.Specifically, the Federal government should place greater emphasis onthe development of metrics, models, datasets, and testbeds so that newproducts and best practices can be evaluated.”• “PITAC recommends that the Interagency Working Group on CriticalInformation Infrastructure Protection (CIIP) become the focal point forcoordinating Federal cyber security R&D efforts.”108

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!