Skip to main content
SHARE
Publication

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop...

by Frederick T Sheldon, Axel Krings, Seong-moo Yoo, Ali N Mili, Joseph P Trien
Publication Type
Book
Publication Date
Publisher Name
http://www.lulu.com/content/317060
Publisher Location
Oak Ridge, Tennessee, United States of America

The workshop theme is Cyber Security: Beyond the Maginot Line

Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas
and proposals about robust models on which we can build the architecture of a secure cyberspace
including but not limited to:
* Knowledge discovery and management
* Critical infrastructure protection
* De-obfuscating tools for the validation and verification of tamper-proofed software
* Computer network defense technologies
* Scalable information assurance strategies
* Assessment-driven design for trust
* Security metrics and testing methodologies
* Validation of security and survivability properties
* Threat assessment and risk analysis
* Early accurate detection of the insider threat
* Security hardened sensor networks and ubiquitous computing environments
* Mobile software authentication protocols
* A new "model" of the threat to replace the "Maginot Line" model and more . . .