How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI?
ثبت نشده
چکیده
The Federal Government has an impressive record of achievements in Information Technology R&D. Some notable examples of how the Federal Government’s R&D has impacted the industry include major advances in such areas as networking, high performance computing, software engineering, programming languages and information assurance (IA). However, there are also many cases where the R&D has not had a partner to transition to and good results have languished on the tree and this is one if not the major challenge in the Federal Government R&D programs. In this session, we have brought together leaders in the Federal Government’s IA R&D program from both DoD and non-DoD agencies, as well as the Chief Technology Offiers/Chief Security Officers (CSO’s) of some major agencies to discuss how Information Assurance/Security R&D is impacting the operations of the agencies and how the needs of the operations organizations are being reflected in current R&D initiatives. Some questions that we hope to answer include:
منابع مشابه
Distributed Contingency Logic and Security
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
متن کاملThe roots of Knowledge and Information science
Knowledge and Information science is rooted in philosophy and its branches are in sociology. This does not impair its interdisciplinary position. In Iran, the name of "LIS" has undergone a little change and called "knowledge & Information Science (KIS)". Through this change, the importance of philosophy in this discipline has reached its highest level. Knowledge science has a great relationship...
متن کاملSoftware Assurance for Security
Computer security is taking on new importance as electronic commerce metamorphoses from hype to reality. Large and small businesses alike are reinventing themselves as e-commerce players. The implications for computer security practice are immense. When bits count as money, protecting bits becomes as important as any other aspect of running a successful business. One essential element shared by...
متن کاملWhither Mental Health Policy-Where Does It Come from and Does It Go Anywhere Useful?; Comment on “Cross-National Diffusion of Mental Health Policy”
Factors influencing cross-national diffusion of mental health policy are important to understand but complex to research. This commentary discusses Shen’s research study on cross-national diffusion of mental health policy; examines the extent to which the three questions researched by Shen (whether countries are more likely to have a mental health policy (a) the earlier a country becomes a memb...
متن کاملDoes Disclosure Lead to Lower Informed Trading and Symmetric Order-follow Shocks in the Tehran Stock Exchange?
In financial markets, the symmetry of information and the homogeneous interpretation of information among traders is one of the main conditions for market efficiency, but these conditions are in fact violated. In this paper first; we accurately estimated the dynamic measures of trades stemming from information asymmetry and diverse opinions among investors indices by a hidden Markov model. Ther...
متن کامل