1 / 8

Remarks: Roadmapping and Hard Problems

Remarks: Roadmapping and Hard Problems. Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research and Development (NCO/NITRD) October 5, 2006. Suggested Features of R&D Roadmap. Timeline Milestones Assessment Metrics

suki
Download Presentation

Remarks: Roadmapping and Hard Problems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remarks: Roadmapping and Hard Problems Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research and Development (NCO/NITRD) October 5, 2006

  2. Suggested Features of R&D Roadmap • Timeline • Milestones • Assessment Metrics • Identification of Interdependencies • Strategy for Deploying R&D Results • Complete, Minimal Overlap

  3. Human Resources Professional Development Manufacturers Regulators Education and Training Curricula Large scale exemplars Requirements Functionalilties Properties Safety Completeness Timing Consistency Design … Development … Verification and Validation … Certification … Operations … Economic Aspects … Possible Aviation Safety Roadmap(11/11/05 Workshop Planning Meeting)

  4. Example Roadmap (11/11/05)

  5. Hard Problems • Example: Infosec Research Council Hard Problems List • This material was presented by Doug Maughan, DHS, at 1/26/06 CSIA IWG meeting

  6. 2005 IRC Hard Problem List Topics 1. GLOBAL SCALE IDENTITY MANAGEMENT 2. INSIDER THREAT 3. AVAILABILITY OF TIME-CRITICAL SYSTEMS 4. BUILDING SCALABLE SECURE SYSTEMS 5. ATTACK ATTRIBUTION AND SITUATIONAL UNDERSTANDING 6. INFORMATION PROVENANCE 7. SECURITY WITH PRIVACY 8. ENTERPRISE LEVEL SECURITY METRICS Courtesy Doug Maughan, DHS

  7. 3. AVAILABILITY OF TIME-CRITICAL SYSTEMS • Motivation: SCADA, military, home-land security first responders often • Value availability over secrecy • Work in lossy, ad hoc wireless environments • Challenges: limited resources • Computational processing power • Service quality guarantees given dynamics • Distributed systems compound problem • Metric: Range of circumstances over which results can be guaranteed Courtesy Doug Maughan, DHS

  8. IRC Hard Problems List Summary • “Stake in the ground” from the front-line • Topics selected because of their importance to Government missions and the lack of solutions • Not the only challenges in the IT security space • Information security is not only about technology Courtesy Doug Maughan, DHS

More Related