|
|
privacy |
||
|
Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.
Blog Feed Recent Items The nfoCentrale Blog Conclave nfoCentrale Associated Sites |
2005-03-22The PITAS from PITAC And the Emperor's Security CloakACM News Service: Study Criticizes Government on Cybersecurity Research. A subcommittee of the President's Information Technology Advisory Committee (PITAC) has indicated that the research investment being made, especially in civilian (a.k.a. academic research) areas is inadequate for the Federal objectives being set for cybersecurity, infrastructure, and personnel. "The report criticizes the commercial cybersecurity strategy of patching, and lists 10 cybersecurity research areas that should take precedence, including cyberforensics, authentication technologies, monitoring and detection tools, and secure protocols." The 2005-03-19 John Markoff New York Times article (registration and/or fee required) identifies the report, "Cybersecurity: A Crisis of Prioritization." The recommended priorities include "authentication technologies, secure protocols, improved engineering techniques, monitoring and detection tools and cyberforensics." I have a tangential interest with regard to trustworthiness in open-system integration, especially with software components. This doesn't map directly onto the overall problems of Internet infrastructure protection, but there is enough harmony for me to be paying attention.
|
||
|
|
You are navigating Orcmid's Lair. |
template
created 2004-06-17-20:01 -0700 (pdt)
by orcmid |