21.12.2012 Views

Banking and Finance Sector-Specific Plan - U.S. Department of ...

Banking and Finance Sector-Specific Plan - U.S. Department of ...

Banking and Finance Sector-Specific Plan - U.S. Department of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SCC R&D Challenges vs. NIPP R&D Themes<br />

able A-1: Comparison Matrix: FS<br />

T<br />

NIPP CI/KR Protection R&D Themes Other R&D Support for CI/KR Items not in NIPP<br />

R&D Focus<br />

Q Economics <strong>of</strong> InfoSec<br />

P Business Process Simulation<br />

O Devaluation <strong>and</strong> Avoidance<br />

N Information Hiding<br />

M Improve technical<br />

surveillance, monitoring,<br />

<strong>and</strong> detection capabilities<br />

L Coordinate development <strong>of</strong><br />

CI/KR protection consensus<br />

st<strong>and</strong>ards<br />

K Explore methods to<br />

authenticate <strong>and</strong> verify<br />

personal identity<br />

J Ensure compatibility <strong>of</strong><br />

communication systems with<br />

inter-operability st<strong>and</strong>ards<br />

I Human & Social Issues<br />

H Advanced Infrastructure<br />

Architectures<br />

G Emerging Threats &<br />

Vulnerability Analysis Aids<br />

F Response, Recovery, &<br />

Reconstitution Tools<br />

E Analysis & Decision Support<br />

Systems<br />

D Insider Threat Detection<br />

C Entry & Access Portals<br />

B Protection & Prevention<br />

Systems<br />

A Detection & Sensor Systems<br />

FSSCC Research<br />

Challenge<br />

B H J K L N Q<br />

1. Secure Financial<br />

Transaction Protocol (SFTP)<br />

B C F H I L<br />

2. Resilient Financial<br />

Transaction System (RFTS)<br />

Appendix : FSSCC Research <strong>and</strong> Development Agenda 0<br />

B H I K<br />

3. Enrollment <strong>and</strong> Identity<br />

Credential Management<br />

A B C D E F G H I J K L M N O P Q<br />

4. Suggested Practices <strong>and</strong><br />

St<strong>and</strong>ards<br />

A B D G I M<br />

5. Underst<strong>and</strong>ing <strong>and</strong><br />

Avoiding the Insider Threat<br />

B E G H I K M P Q<br />

6. Financial Information<br />

Tracing <strong>and</strong> Policy<br />

Enforcement<br />

7. Testing B G H L<br />

E G I Q<br />

8. St<strong>and</strong>ards for Measuring<br />

ROI <strong>of</strong> CIP <strong>and</strong> Security<br />

Technology

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!