Limit search to available items
Book Cover
E-book

Title The science of cybersecurity and a roadmap to research / Benjamin J. Colfer, editor
Published Hauppauge, NY : Nova Science Publishers, 2011

Copies

Description 1 online resource (198 pages) : illustrations
Series Defense, security and strategies
Computer science, technology and applications
Defense, security and strategy series.
Computer science, technology and applications
Contents Library of Congress Cataloging-in-Publication Data; Contents; Preface; Science of Cybersecurity; Abstract; 1. executive Summary; 2. Problem Statement and Introduction; 3. Cyber-Security as Science -- An Overview; 3.1. Attributes for Cyber-Security; 3.2. Guidance from other Sciences; 3.2.1. Economics; 3.2.2. Meteorology; 3.2.3. Medicine; 3.2.4. Astronomy; 3.2.5. Agriculture; 3.3. Security Degrades Over Time; 3.3.1. Unix passwords; 3.3.2. Lock bumping; 3.4. The Role of Secrecy; 3.5. Aspects of the Science of Cyber-Security; 3.6. Some Science; 3.6.1. Trust; 3.6.2. Cryptography; 3.6.3. Game theory
3.6.4. Model checking3.6.5. Obfuscation; 3.6.6. Machine learning; 3.6.7. Composition of components; 3.7. Applying the Fruits of Science; 3.8. Metrics; 3.9. The Opportunities of New Technologies; 3.10. Experiments and Data; 4. Model Checking; 4.1. Brief Introduction to Spin and Promela; 4.2. Application to Security; 4.2.1. The Needham-Schroeder Protocol; 4.2.2. Promela model of the protocol; 4.3. Scaling Issues; 4.4. Extracting Models from Code; 4.5. Relationship to Hyper-Properties; 5. The Immune System Analogy; 5.1. Basic Biology; 5.2. Learning from the Analogy
5.2.1. The need for adaptive response5.2.2. A mix of sensing modalities; 5.2.3. The need for controlled experiments; 5.2.4. Time scale differences; 5.2.5. Responses to detection; 5.2.6. Final points; 6. Conclusions and Recommendations; A. Appendix: Briefers; References; A Roadmap for Cybersecurity Research; Executive Summary; Introduction; Historical Background; Current Context; Document Format; Background; Future Directions; Acknowledgments; Current Hard Problems in INFOSEC Research; 1. Scalable Trustworthy Systems; Background; What is the problem being addressed?
What are the potential threats?Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; What are the major research gaps?; Near term; Medium term; Long term; What are the challenges that must be addressed?; What approaches might be desirable?; What R & D is evolutionary and what is more basic, higher risk, game changing?; Resources; Measures of success; What needs to be in place for test and evaluation?
To what extent can we test real systems?2. Enterprise-Level Metrics (ELMs); Background; What is the problem being addressed?; What are the potential threats?; Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; Definition; Collection; Analysis; Composition; Adoption; What are the major research gaps?; What are some exemplary problems for R & D on this topic?
Notes Includes index
Subject Internet -- Security measures -- Research
Computer crimes -- Prevention -- Research
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Form Electronic book
Author Colfer, Benjamin J
ISBN 9781611223620
1611223628