Cyber Security R&D

ثبت نشده
چکیده

The Department of Energy has the responsibility to address the energy, environmental, and nuclear security challenges that face our nation. In support of this mission, it operates national laboratories and scientific user facilities, performs basic and applied research and engineering, and works to assure reliable energy delivery and to maintain our nuclear deterrence capabilities. Despite ubiquitous dependence on electronic information and on networked computing infrastructure, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require transformation in information system architecture and new capabilities that do not merely solve today’s security challengesthey must render them obsolete. The need is critical not only to the Department of Energy but also to other federal agencies and to the private sector. The Department of Energy is uniquely poised to undertake this work, complementing efforts at other agencies and industry.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bridging the Classical D&D and Cyber Security Domains

This chapter uses a traditional framework called the D&D methods matrix as a foundation for describing the basics of D&D in the physical world, extends the D&D matrix to cyber security, and then outlines a set of techniques for applying D&D in the cyber security context. These descriptions can be combined with the cyber-D&D TTP taxonomy in Appendix A to guide understanding of how D&D is used in...

متن کامل

A Review on Cyberspace Security: Lessons for Islamic Republic of Iran

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

متن کامل

Second Annual Cyber Security and Information Infrastructure Research Workshop May 10 - 11 , 2006 BEYOND THE MAGINOT LINE

Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...

متن کامل

Psychological Factors Affecting on the Culture and Awareness of Cyber Security in During of Covid-19 Outbreak

The aim of this study was to investigate the psychological factors affecting the culture and awareness of cyber security in the period of Covid-19 outbreak by qualitative method and theme analysis. Research data from upstream documents that include all valid articles published in 2020 to 2022 inside and outside the country, with 4 keywords (culture, awareness, cyber security, psychological fact...

متن کامل

Economics, Security and Innovation

This paper takes into account an economic perspective of security and innovation. In particular, it discusses aspects of economics that may be relevant in order to assess and deploy security technologies. At the micro level of analysis, as an example, this paper highlights discussions on the economics of security in the cloud. Do we really understand the economics of security in the cloud? Are ...

متن کامل

A Systems Engineering Approach for Assured Cyber Systems

Systems Engineering (SE) has gained favor as a means to tame the complexity of modern systems, specifically the design, analysis, and development of complex systems. This paper describes a SE approach for system assurance of modern Information Technology (IT) centric “cyber systems”. In this paper, we discuss recent trends in information security towards the establishment of security patterns a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008