Released in December of 2011 by the Executive Office of the President, the National Science and Technology Council provides direction in Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. I find understanding this document helps clarify how the “Technology Doctrine” flows down through the government into the Department of Defense and then into the U.S. Navy.
The objective of Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program is “to express a vision for the research necessary to develop game-changing technologies that can neutralize the attacks on the cyber systems of today and lay the foundation for a scientific approach that better prepares the field to meet the challenges of securing the cyber systems of tomorrow.“
Federal Cybersecurity Research and Development (R&D) Program Thrusts:
- Inducing Change
- Designed-In Security
- Tailored Trustworthy Spaces (with a Focus Area of Wireless Mobile Networks)
- Moving Target (with Focus Areas of Deep Understanding of Cyberspace and Nature-Inspired Solutions)
- Cyber Economic Incentives – Research required to Explore models of cybersecurity investment and markets; develop data models, ontologies, and automatic means of sanitizing data or making data anonymous; define meaningful cybersecurity metrics and actuarial tables; improve the economic viability of assured software development methods; provide methods; to support personal data ownership; provide knowledge in support of laws, regulations, and international agreements.
- Developing Scientific Foundations
- Organizes disparate areas of knowledge – Provides structure and organization to a broad-based body of knowledge in the form of testable models and predictions
- Enables discovery of universal laws – Produces laws that express an understanding of basic, universal dynamics against which to test problems and formulate explanations
- Applies the rigor of the scientific method – Approaches problems using a systematic methodology and discipline to formulate hypotheses, design and execute repeatable experiments, and collect and analyze data
- Maximizing Research Impact
- Supporting National Priorities – Health IT, Smart Grid, Financial Services, National Defense, Transportation, Trusted Identities, Cybersecurity Education.
- Engaging the Cybersecurity Research Community
- Accelerating Transition to Practice
- Technology Discovery
- Test and Evaluation
- Transition, Adoption, and Commercialization
Executing the Federal Cybersecurity Research Program:
- Research Policies
- Provide accurate, relevant, timely scientific and technical advice
- ensure policies of Executive Branch are informed by sound science
- ensure scientific and technical work of Executive Branch is coordinated to provide greatest benefit to society
- Research Coordination
- Research Execution (via Agencies)
- DHS S&T
- DoD Service research organizations
Incoming search terms:federal government role in tailored trustworthy spaces
Follow A Cyber Fellow on Twitter!
The Battle of the Five Armies http://t.co/9IjgDU8QZm
"Facebook only “pivoted” one kind of privacy — in other ways, it’s becoming more dangerous — Tech News and Analysis" http://t.co/0fvh0RrCdV