Limit search to available items
Book Cover
E-book
Author Erbschloe, Michael, author Computer Economics

Title Threat Level Red : Cybersecurity Research Programs of the U.S. Government / Michael Erbschloe
Published Auerbach Publications, 2017

Copies

Description 1 online resource (304 pages : 10 illustrations
Contents Cover; Half Title; Title Page; Copyright Page; Contents; Foreword; Acknowledgments; About the Author; Introduction; 1. The U.S. Federal Government Initiatives on Cybersecurity Research; 1.1 Evolving toward Coordinated Cybersecurity Research; 1.2 The Comprehensive National Cybersecurity Initiative; 1.3 The Federal Information Security Modernization Act of 2014; 1.4 The Cybersecurity Act of 2015 and Automated Indicator Sharing; 1.5 The Cybersecurity National Action Plan; 1.6 The Strategic Plan for the Federal Cybersecurity Research and Development Program; 1.7 2016 Federal Cybersecurity RDSP
1.8 The Growing Necessity for Diverse and Specialized Research1.9 Summary; 1.10 Seminar Discussion Topics; Key Terms; References; 2. The Department of Homeland Security Cybersecurity Research Programs; 2.1 DHS CSD Research; 2.2 Anonymous Networks and Currencies; 2.3 Cyber-Physical Systems Security; 2.4 Data Privacy Technologies; 2.5 Distributed Denial of Service Defense; 2.6 Talent Development Research; 2.7 Cybersecurity Metrics; 2.8 Experimental Research Testbed, Experiments, and Pilots; 2.9 Internet Measurement, Attack Modeling, and Cyber Forensics
2.10 Mobile Device and Cloud-Based Systems Security2.11 The Insider Threat Program; 2.12 Summary; 2.13 Seminar Discussion Topics; Key Terms; References; 3. The National Institute for Standards and Technology; 3.1 The Cybersecurity Role of NIST; 3.2 The Cybersecurity Framework; 3.3 Advanced Network Technologies Division; 3.4 Computer Security Division; 3.5 Federal Agencies Still Need to Implement NIST Standards for High-Impact System Security; 3.6 NIST Smart Grid Program is a Journey into the Future; 3.7 The CPSs Program is Necessary for the Journey
3.8 The National Information Assurance Partnership3.9 Summary; 3.10 Seminar Discussion Topics; Key Terms; References; 4. The Defense Advanced Research Projects Agency; 4.1 The DARPA Organization; 4.2 The Cyber Grand Challenge; 4.3 Active Authentication; 4.4 Active Cyber Defense; 4.5 Automated Program Analysis for Cybersecurity; 4.6 Clean-Slate Design of Resilient, Adaptive, Secure Hosts; 4.7 Cyber Fault-Tolerant Attack Recovery; 4.8 Edge-Directed Cyber Technologies for Reliable Mission Communication; 4.9 Enhanced Attribution; 4.10 Extreme DDoS Defense
4.11 High-Assurance Cyber Military Systems4.12 Integrated Cyber Analysis System; 4.13 Mission-Oriented Resilient Clouds; 4.14 Rapid Attack Detection, Isolation, and Characterization Systems; 4.15 Space/Time Analysis for Cybersecurity; 4.16 Transparent Computing; 4.17 Vetting Commodity IT Software and Firmware (VET); 4.18 DARPA's Request for Information: CSO R 4.19 Summary; 4.20 Seminar Discussion Topics; Key Terms; References; 5. Intelligence Advanced Research Projects Activity and In-Q-Tel; 5.1 The IARPA Organization; 5.2 IARPA Cyber-Attack Automated Unconventional Sensor Environment
Summary "There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity."--Provided by publisher
Subject Computer networks -- Security measures -- Research -- United States
Cyberspace -- Security measures -- Research -- United States
Federal aid to research -- United States
POLITICAL SCIENCE -- Political Freedom & Security -- International Security.
COMPUTERS -- Security -- General.
Administrative and political divisions
Federal aid to research
SUBJECT United States -- Administrative and political divisions. http://id.loc.gov/authorities/subjects/sh96009422
Subject United States
Form Electronic book
ISBN 9781351683326
1351683322
9781351683333
1351683330
9781315167558
1315167557