11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

25 The Dutch National Cyber SecurityResearch AgendaZooming on developing a research agenda to fit the Dutch cyber securitystrategy, the National Cyber Security Research Agenda, or NCSRA,was embraced by the Dutch National Cyber Security Council and severalministries and has led to a substantial research program with a projectedtotal research budget of approximately 30 million euro, of which the first 6.5Mwas allocated in a call in October 2012. Currently, a new research agenda isbeing developed. In this section, we will describe the current draft for the newNCSRA.The process through which the research agenda is drafted is important.The initial draft is written by researchers from various research centers. Next,the writers’ team invites feedback from as many stakeholders as possible inorder to refine the agenda. Finally, it sends the agenda to the Security Counciland various ministries to gather as much support as possible.Another distinguishing feature is that the research agenda includes allrelevant disciplines and not just ICT directly. It specifically caters to researchin Law, Criminology, Economics, Sociology, Psychology, etc.In the remainder of this section, we first provide examples of the differentcontexts that are relevant for the NCSRA (non-exhaustively) from both thetechnological and application domain point of view. Next, we describe thecurrent list of research themes defined in the draft agenda.25.1 ContextsConcrete research questions typically arise in a specific context, which mayinvolve a certain technology (e.g., cloud computing), or a particular applicationdomain (e.g., finance), or a combination of the two. Still, similar researchquestions arise across different contexts, representing broader research themes.Below, we make an inventory of the most important contexts, regarding bothtechnology and application domain. The next section then lists the underlyingresearch themes that represent the central challenges for security across thesecontexts.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!