Title: Cyber Security R
1Cyber Security RD Challenges A Homeland
Security Perspective
2Outline
- DHS Organizational Overview
- Information Analysis and Infrastructure
Protection - Science and Technology
- DHS Cyber Security Research and Development
- Research Interests and Priorities
- DHS ST Challenges
- Research Community Issues
3Department of Homeland Security Overview
Secretary (Ridge) Deputy Secretary (Loy) (acting)
Emergency Preparedness Emergency
Response (Brown)
Information Analysis Infrastructure Protection (
Libutti)
Border Transportation Security (Hutchinson)
Management (Hale)
4Information Analysis and Infrastructure
Protection Directorate
Risk Assessment Division
National Communications System
5National Cyber Security Division Mission
- Mission components include
- Identifying, analyzing, and reducing threats and
vulnerabilities - Disseminating threat and warning information
- Coordinating incident response
- Providing technical assistance in continuity of
operations and recovery - Serving as national focal point for the public
- and private sectors regarding cyber security
- issues
- to implement the National Cyber Strategy
The National Cyber Security Division (NCSD) is
the national focal point for addressing cyber
security issues in the United States and will
coordinate implementation of the National
Strategy to Secure Cyberspace.
6Science and Technology Directorate
Office of Plans Programs and Budgets (Albright)
Development Engineering, Production, Deployment
Stewardship of an enduring capability
Innovation, Adaptation, Revolution
Strategic, programmatic, budget planning
Planning
Execution
7ST Directorate ResponsibilitiesHomeland
Security Act of 2002
- Advising the Secretary regarding...
- Identifying priorities for
- Establishing, conducting, and coordinating
basic and applied research, development,
testing and evaluation (RDTE) activities that
are relevant to any or all elements of the
Department, through both intramural and
extramural programs.
8Cyber Security RD Portfolio Context
- The Internet serves a significant underlying role
in many of the Nations critical infrastructures. - Communications, monitoring, operations and
business systems. - Adversaries face asymmetric offensive and
defensive capabilities with respect to
traditional warfare. - Makes cyberspace is an appealing battleground.
- Cyberspace provides the ability to exploit
weaknesses in our critical infrastructures. - Provides a fulcrum for leveraging physical
attacks.
9Cyber Security RD Portfolio Threats
- The most significant cyber threats to the nation
are fundamentally different from the
script-kiddies or virus writers. - Adversaries who seek to harm the Nations
critical infrastructure are driven by different
motivations. - DHS ST focus is on those threats and issues that
warrant national-level concerns.
10Cyber Security RD Portfolio Budget
- FY 2004 cyber security RD budget 18M
- FY 2005 cyber security RD budget 18M
- Overall 2005 budget for DHS ST 1.1B
- DHS ST portfolio budgets developed through
in-depth strategic planning process
11Important RD Areas
Securing the Infrastructure Secure domain name
system Secure routing protocols Secure
process control systems (retrofit and
future infrastructure)
Cyber Security Functional Requirements Attack
protection and prevention Attack detection,
response, and recovery Situational awareness,
incident warning Secure software engineering
development Software assurance, code testing
analysis Lightweight, low-latency
authentication Forensics, traceback,
attribution Hardware/firmware security Secure
operating systems
Domain-Specific Security Needs Wireless
Internet priority service Distributed
embedded computing platforms
Other Needs Privacy Red teaming
Foundations for Cyber Security Metrics and
testing Economic assessment Long term goal of
risk-based decision making
Enabling Technologies for RD Testbeds
Modeling and simulation Network mapping
Security technology and policy management
12Setting the Government Research Agenda
- Critical Information Infrastructure Protection
Interagency Working Group - Responding to Homeland Security Presidential
Directive 7 - InfoSec Research Council (IRC)
- Revisiting the IRC Hard Problems List 5-10 year
problems that require sustained RD investments
13Improving the Nations Cyber Security
- More capable people
- Increased use of security technology in existing
infrastructure - Development of more inherently secure technology
for new infrastructure - Migration from existing to next-generation
infrastructure - Better foundations for risk-based technology
investments
14Tackling Cyber Security ChallengesBusiness Not
as Usual
- Strong mission focus (avoid mission creep)
- Close coordination with other Federal agencies
- Outreach to communities outside of the Federal
government - Building public private partnerships
- Strong emphasis on technology diffusion and
technology transfer - Development of migration paths
- Awareness of economic realities
15Research Community Issues
- Future cyber security RD funding
- Anticipated trends
- Funding opportunities http//www.hsarpabaa.com/
- Investment focus
- Short/long term RD vs. basic/applied RD
- Anticipated trends
- Emphasis on technology transfer
- Strategy and plans
- Partnerships
16Questions?
Simon Szykman, Ph.D. Director, Cyber Security
RD 202-254-5802