Federal Plans
NICE
Plan Development and Research
Challenge
Future Plan
This paper discusses what is referred to as the Federal Plan is for Cyber Security and Information Assurance (CSIA- R&D) Research and Development. Details of the federal government's plan will be discussed as well as what is expected and can be done about cyber security in the long-term.
In this federal plan, the terms 'information assurance' and 'cyber security' refer to measures put in place to protect computer information, systems and networks from unauthorized access or disruptions, modification, use or destruction. The purpose of information assurance and cyber security is to ensure: the protection of integrity against unauthorized destruction or modification of information, networks and systems (Community List.-Federal Plan for Cyber Security and Information Assurance Research and Development, 2006) as also to ensure confidentiality protection against illegal access of networks and disclosure of information held therein. Information assurance is likewise concerned with guaranteeing reliable and timely access to networks, systems and or information. The federal plan is made up of several sections including: Strategic Federal objectives; Analysis of the latest calls for Federal R & D; Types of threats, vulnerabilities, and risks; Technical issues in information assurance and cyber security R & D; Current investment and technical priorities of Federal agencies dealing with the issues of Cyber Security and information assurance; Technical and funding gaps analysis results; Findings and recommendations; Perspectives on R and D technical topics such as the main technical challenges; and the roles and responsibilities of cyber security and information assurance related agencies. The federal plan basically recommends for all levels of government to give cyber security a high priority and to ensure the integrity of the design, implementation and the utilization of all the components of the information technology (IT) infrastructure.
Background
In less than twenty years, developments and innovations in ICT (information and communication technologies) have revolutionized educational, commercial, scientific and government infrastructures. Powerful high-speed processors, high-bandwidth networks, wireless networks and the widespread utilization of internet services have transformed previously individual and largely closed networks into virtual world of seamless interconnectivity. There has also been an increase in the kind of devices that can connect to this vast IT infrastructure. A growing ease of access is via 'always-on' connections meaning that individual users and organizations are becoming more and more interconnected across different physical networks, organizations and countries (Federal Plan for Cyber Security and Information Assurance Research and Development, 2006).. As more and more individuals and organizations have become interconnected, the quantity of electronic information shared via what is colloquially referred to as "cyberspace" has increased dramatically. The information exchanged has also expanded beyond what was exchanged in hitherto traditional traffic to include, process control signals, multimedia data and other critical forms of data. New services and applications that utilize the capabilities of IT infrastructure are always emerging. The risks that are linked to the present and anticipated, threats to, vulnerabilities to, and attacks against the information technology infrastructure provide the basis for the plan. Rapidly changing trends in both the threats and technologies make it possible that security issues related to IT will only increase in the next few years. The following are the main areas of concern (Federal Plan for Cyber Security and Information Assurance Research and Development, 2006):
The increasing sophistication of IT networks and systems, which will result in more security challenges for both the developers of these systems and their consumers.
The constantly evolving nature of communications infrastructure as traditional phone networks and information technology networks merge to form a more unified network.
The growing access to wireless connectivity to personal computers and networks, increasing the exposure of such systems to attack. This is because in all-wireless networks the conventional protective approach of "securing the perimeter" cannot be used because it is becoming increasingly difficult to establish the logical and physical boundaries of such networks.
The increasing accessibility and interconnectivity of (and as a, result risk to) computer systems and networks that are vital to the United States economy, including financial sector networks, supply chain management and utilities and control systems in the manufacturing sectors.
The existent proliferation and the increasingly global nature of communications infrastructure, which will result in more opportunities for subversion by both domestic and foreign adversaries.
There are many different types of cyber attacks and also an equally diverse array of corresponding incentives, including activist causes, information misuse or theft, financial fraud, attempts to disrupt computer systems and attempts to interrupt important government IT infrastructure and services that depend on them. The perpetrators of cyber attacks can be...
Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met
Traffic Analysis/Homeland Security One of the biggest challenges currently faced by the Department of Homeland Security is guaranteeing cybersecurity. Each and every day some type of cyber crime occurs. Such crimes have the potential to affect the country's national security. This paper investigates the significance of internet traffic and analysis to Homeland Security. It will look at the importance of internet traffic and analysis to Homeland Security as well as encrypted
Assurance and Security (IAS) Digital forensics (DF) In this work, we take a look at three laboratory-based training structures that afford practical and basic knowledge needed for forensic evaluation making use of the latest digital devices, software, hardware and firmware. Each lesson has three parts. The duration of the first section of the three labs will be one month. These labs would be the largest labs. The Second section would
Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the
Cracking the Code The contemporary issue of physical security/IT security Modern day businesses and organizations face the contemporary issue of physical security/IT security. Whether a business needs to maintain network security for a website or server, or an organization needs to restrict access to a server room, there are several aspects facing the problem of dealing with IT security. Any general computer networking instructor teaches the DOD and/or OSI networking models and
This is because this thesis has some limitations that should be observed when taking into consideration the importance of the thesis and its assistance. This thesis has concentrated on a subject that has been an extremely large and leading one, that is, the managerial impact on small businesses and the underlying reasons being reluctance shown by small business managers to make use of information technology and Internet. Undoubtedly, this
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now