Second Annual Cyber Security and Information Infrastructure Research Workshop May 10 - 11 , 2006 BEYOND THE MAGINOT LINE

نویسندگان

  • MAGINOT LINE
  • Frederick Sheldon
  • Axel Krings
  • Seong-Moo Yoo
  • Ali Mili
  • Joseph Trien
  • Mudhakar Srivatsa
  • Ling Liu
چکیده

Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. This workshop endeavors to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyber-space including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more. . .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Example Collaborative Exercise for Decision Making in Investment in Cyber Security

The economics of investment in cyber security is a widely researched field. This paper describes the use of a multi-player collaborative exercise implemented on computers to help companies better understand investment decisions in cyber security. The investment model driving the collaborative exercise is an expected-value decision analysis that compares the reduction of cyber risks with other i...

متن کامل

Resilience Management of Functions Vital to Society: A Multiple Case Study Analysis

Functions vital to our society and critical infrastructures — energy, water, transportation, communication, critical information infrastructure — lacks of resilience, typically losing essential functionality following adverse events. In the future, the number of climatic extremes may intensify or become more frequent, and building resilience becomes the optimal course of action for large comple...

متن کامل

A Survey of Operations Research Models and Applications in Homeland Security

Operations research has had a long and distinguished history of work in emergency preparedness and response, airline security, transportation of hazardous materials, and threat and vulnerability analysis. Since the attacks of September 11, 2001 and the formation of the US Department of Homeland Security, these topics have been gathered under the broad umbrella of homeland security. In addition,...

متن کامل

Models and Measures for Correlation in Cyber-Insurance

High correlation in failure of information systems due to worms and viruses has been cited as major impediment to cyber-insurance. However, of the many cyber-risk classes that influence failure of information systems, not all exhibit similar correlation properties. In this paper, we introduce a new classification of correlation properties of cyber-risks based on a twin-tier approach. At the fir...

متن کامل

Towards an Education Campaign for Fostering a Societal, Cyber Security Culture

The need for information security has moved beyond its traditional organizational boundaries. It is becoming a requirement for all information technology users. Many countries are recognizing this need for their citizens to be cyber aware and secure. Consequently these countries are beginning to implement national cyber security campaigns and efforts. Literature advocates that these campaigns s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007