The science of cybersecurity and a roadmap to research /
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hauppauge, NY :
Nova Science Publishers,
2011.
|
Colección: | Defense, security and strategy series.
Computer science, technology and applications. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Library of Congress Cataloging-in-Publication Data; Contents; Preface; Science of Cybersecurity; Abstract; 1. executive Summary; 2. Problem Statement and Introduction; 3. Cyber-Security as Science
- An Overview; 3.1. Attributes for Cyber-Security; 3.2. Guidance from other Sciences; 3.2.1. Economics; 3.2.2. Meteorology; 3.2.3. Medicine; 3.2.4. Astronomy; 3.2.5. Agriculture; 3.3. Security Degrades Over Time; 3.3.1. Unix passwords; 3.3.2. Lock bumping; 3.4. The Role of Secrecy; 3.5. Aspects of the Science of Cyber-Security; 3.6. Some Science; 3.6.1. Trust; 3.6.2. Cryptography; 3.6.3. Game theory.
- 3.6.4. Model checking3.6.5. Obfuscation; 3.6.6. Machine learning; 3.6.7. Composition of components; 3.7. Applying the Fruits of Science; 3.8. Metrics; 3.9. The Opportunities of New Technologies; 3.10. Experiments and Data; 4. Model Checking; 4.1. Brief Introduction to Spin and Promela; 4.2. Application to Security; 4.2.1. The Needham-Schroeder Protocol; 4.2.2. Promela model of the protocol; 4.3. Scaling Issues; 4.4. Extracting Models from Code; 4.5. Relationship to Hyper-Properties; 5. The Immune System Analogy; 5.1. Basic Biology; 5.2. Learning from the Analogy.
- 5.2.1. The need for adaptive response5.2.2. A mix of sensing modalities; 5.2.3. The need for controlled experiments; 5.2.4. Time scale differences; 5.2.5. Responses to detection; 5.2.6. Final points; 6. Conclusions and Recommendations; A. Appendix: Briefers; References; A Roadmap for Cybersecurity Research; Executive Summary; Introduction; Historical Background; Current Context; Document Format; Background; Future Directions; Acknowledgments; Current Hard Problems in INFOSEC Research; 1. Scalable Trustworthy Systems; Background; What is the problem being addressed?
- What are the potential threats?Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; What are the major research gaps?; Near term; Medium term; Long term; What are the challenges that must be addressed?; What approaches might be desirable?; What R & D is evolutionary and what is more basic, higher risk, game changing?; Resources; Measures of success; What needs to be in place for test and evaluation?
- To what extent can we test real systems?2. Enterprise-Level Metrics (ELMs); Background; What is the problem being addressed?; What are the potential threats?; Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; Definition; Collection; Analysis; Composition; Adoption; What are the major research gaps?; What are some exemplary problems for R & D on this topic?