Cyber Security R - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Cyber Security R

Description:

(Loy) (acting) Information Analysis and Infrastructure Protection Directorate ... (Oxford (Acting)) Office of Systems Engineering & Development (Kubricky) ... – PowerPoint PPT presentation

Number of Views:55
Avg rating:3.0/5.0
Slides: 17
Provided by: sig87
Learn more at: http://www.sigsac.org
Category:
Tags: acting | cyber | security

less

Transcript and Presenter's Notes

Title: Cyber Security R


1
Cyber Security RD Challenges A Homeland
Security Perspective
2
Outline
  • DHS Organizational Overview
  • Information Analysis and Infrastructure
    Protection
  • Science and Technology
  • DHS Cyber Security Research and Development
  • Research Interests and Priorities
  • DHS ST Challenges
  • Research Community Issues

3
Department of Homeland Security Overview
Secretary (Ridge) Deputy Secretary (Loy) (acting)
Emergency Preparedness Emergency
Response (Brown)
Information Analysis Infrastructure Protection (
Libutti)
Border Transportation Security (Hutchinson)
Management (Hale)
4
Information Analysis and Infrastructure
Protection Directorate
Risk Assessment Division
National Communications System
5
National Cyber Security Division Mission
  • Mission components include
  • Identifying, analyzing, and reducing threats and
    vulnerabilities
  • Disseminating threat and warning information
  • Coordinating incident response
  • Providing technical assistance in continuity of
    operations and recovery
  • Serving as national focal point for the public
  • and private sectors regarding cyber security
  • issues
  • to implement the National Cyber Strategy

The National Cyber Security Division (NCSD) is
the national focal point for addressing cyber
security issues in the United States and will
coordinate implementation of the National
Strategy to Secure Cyberspace.
6
Science and Technology Directorate
Office of Plans Programs and Budgets (Albright)
Development Engineering, Production, Deployment
Stewardship of an enduring capability
Innovation, Adaptation, Revolution
Strategic, programmatic, budget planning
Planning
Execution
7
ST Directorate ResponsibilitiesHomeland
Security Act of 2002
  • Advising the Secretary regarding...
  • Identifying priorities for
  • Establishing, conducting, and coordinating

basic and applied research, development,
testing and evaluation (RDTE) activities that
are relevant to any or all elements of the
Department, through both intramural and
extramural programs.
8
Cyber Security RD Portfolio Context
  • The Internet serves a significant underlying role
    in many of the Nations critical infrastructures.
  • Communications, monitoring, operations and
    business systems.
  • Adversaries face asymmetric offensive and
    defensive capabilities with respect to
    traditional warfare.
  • Makes cyberspace is an appealing battleground.
  • Cyberspace provides the ability to exploit
    weaknesses in our critical infrastructures.
  • Provides a fulcrum for leveraging physical
    attacks.

9
Cyber Security RD Portfolio Threats
  • The most significant cyber threats to the nation
    are fundamentally different from the
    script-kiddies or virus writers.
  • Adversaries who seek to harm the Nations
    critical infrastructure are driven by different
    motivations.
  • DHS ST focus is on those threats and issues that
    warrant national-level concerns.

10
Cyber Security RD Portfolio Budget
  • FY 2004 cyber security RD budget 18M
  • FY 2005 cyber security RD budget 18M
  • Overall 2005 budget for DHS ST 1.1B
  • DHS ST portfolio budgets developed through
    in-depth strategic planning process

11
Important RD Areas
Securing the Infrastructure Secure domain name
system Secure routing protocols Secure
process control systems (retrofit and
future infrastructure)
Cyber Security Functional Requirements Attack
protection and prevention Attack detection,
response, and recovery Situational awareness,
incident warning Secure software engineering
development Software assurance, code testing
analysis Lightweight, low-latency
authentication Forensics, traceback,
attribution Hardware/firmware security Secure
operating systems
Domain-Specific Security Needs Wireless
Internet priority service Distributed
embedded computing platforms
Other Needs Privacy Red teaming
Foundations for Cyber Security Metrics and
testing Economic assessment Long term goal of
risk-based decision making
Enabling Technologies for RD Testbeds
Modeling and simulation Network mapping
Security technology and policy management
12
Setting the Government Research Agenda
  • Critical Information Infrastructure Protection
    Interagency Working Group
  • Responding to Homeland Security Presidential
    Directive 7
  • InfoSec Research Council (IRC)
  • Revisiting the IRC Hard Problems List 5-10 year
    problems that require sustained RD investments

13
Improving the Nations Cyber Security
  • More capable people
  • Increased use of security technology in existing
    infrastructure
  • Development of more inherently secure technology
    for new infrastructure
  • Migration from existing to next-generation
    infrastructure
  • Better foundations for risk-based technology
    investments

14
Tackling Cyber Security ChallengesBusiness Not
as Usual
  • Strong mission focus (avoid mission creep)
  • Close coordination with other Federal agencies
  • Outreach to communities outside of the Federal
    government
  • Building public private partnerships
  • Strong emphasis on technology diffusion and
    technology transfer
  • Development of migration paths
  • Awareness of economic realities

15
Research Community Issues
  • Future cyber security RD funding
  • Anticipated trends
  • Funding opportunities http//www.hsarpabaa.com/
  • Investment focus
  • Short/long term RD vs. basic/applied RD
  • Anticipated trends
  • Emphasis on technology transfer
  • Strategy and plans
  • Partnerships

16
Questions?
Simon Szykman, Ph.D. Director, Cyber Security
RD 202-254-5802
Write a Comment
User Comments (0)
About PowerShow.com