Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
NSF NeTS and CT programs
Challenges and Opportunities
CNCI: A Multi-Agency Program
Overview from Government Representatives
Networking at the Edge
Du: NEGD, NECO
Fisher: FIND, NECO
Mankin: FIND, ANET
Wu: NEDG, NECO
All PDs: XPLR
Foundations (Rich Beigel): Cryptography, New models
Formal methods(Rich and Karl): Verifying trustworthiness, static analysis of programs
Host security architecture(David Du): hw support, new OSes, …
Network security(Kevin Thompson and Karl): network security architecture, network monitoring
Wireless and sensor network security(Jie and David)
Intrusion tolerance(Karl and Kevin): Operate through attacks
Privacy and human issues (Jim French): usable security
Testbeds and experimental evaluation(Kevin and Karl): Metrics
Applications that demand trustworthiness (Ralph Wachter): Telecom, E-voting, PowerGrid, Healthcare, Vehicles with wireless
Cyber Trust will be renamed to Trustworthy Computing
The mission will not change but will place increased emphasis on:
Prevention vs. detection and respond
Management: App. dependent/independent
Integration with wired networks
Foundations and Formal Methods
Cryptograph: lightweight methods, key management, …
Verification and validation
Unique Security Issues for Wireless
Unique security threats (e.g. jamming)
Light weight methods
Privacy, reputation, and trust
What is industry doing, and how can we complement that?
What are the current threats for which the research community has no solution, e.g., jamming?
What are future threats to the wireless networks?
What are future wireless applications?
What are the fundamental issues w.r.t. wireless trustworthiness?
Are new design/architectures/paradigms needed?
What is the role of regulation?
What testbeds are needed for the future?
How can different agencies work together?
Research associated with CNCI, a.k.a the National Cyber Defense Initiative (NCDI)
What This Talk is NOT About: The other 17 categories, one of which is the TIC
House panel chief demands details of cybersecurity plan (October 24, 2007)
The chairman of the House Homeland Security Committee called on the Bush administration yesterday to delay the planned launch of a multi- billion-dollar cybersecurity initiative so that Congress could have time to evaluate it. Rep. Bennie Thompsonsaid he wants to make sure the new program is legal before it is launched. In an interview, the Mississippi Democrat said he had been told that President Bush might unveil the initiative as early as next week. Known internally as the"Cyber Initiative,"the program is designed to use the spying capabilities of the National Security Agency and other agencies to protect government and private communications networks from infiltration by terrorists and hackers. The Sun reported the existence of the program last month, but Thompson said the administration has refused to discuss the initiative with members of his committee, despite repeated requests. a letter this week to Homeland Security Secretary Michael Chertoff, Thompson demanded that his committee receive a briefing on details of the plan. He also warned that the "centralization of power" envisioned under the initiative raised "significant questions" that should be answered before the program is launched. Thompson - whose panel oversees the Homeland Security Department, which would run the initiative - said he was unaware of the program's existence until I …
A Homeland Security spokeswoman said Chertoff had received Thompson's letter, which was dated Monday, and would respond "in a timely fashion. We do agree that cybersecurity is a very important issue, and that is why since the beginning of this congressional session DHS has provided more than a half a dozen briefings to the House Homeland Security Committee on cyberthreats and related issues," said the spokeswoman, Laura Keehner.Thompson said that if the administration continues to give his panel the silent treatment, he will consider issuing a congressional subpoena. "You have to put sunshine on a program so sensitive as this," he said. The administration is saying that "'you have to believe us.' Obviously, as a nation of laws, we can't accept that.“ Thompson said that because the program involves the NSA and similar agencies, questions aboutprivacyand domestic surveillance would be of particular concern.
Only a National Initiative Involving Researchers, Industry with Government Funding Will Make a Real Difference
Over the next ten years transform the cyber-infrastructure to be resistant to attack so that critical national interests are protected from catastrophic damage and our society can confidently adopt new technological advances
Transformation means we must learn how to build the new infrastructure and deploy it. Learning how to execute this transformation will advance both technology and U.S. competitiveness in many ways
NSF: Karl Levitt and Jie Wu
ARO: Cliff Wang
NIST: Tom Karygiannis
NSA: Steve Borbash
NRL: Jason Rogers and Cathy Meadows
Unique security issues in wireless
What’s working and what’s not
Threats of the future in wireless