【正文】
M) to establish USCYBERCOM. In May 2022, General Keith Alexander outlined his views in a report for the United States House Committee on Armed Services submittee. 42 43 2022年 7月國防部發(fā)布的網(wǎng)絡(luò)空間對抗戰(zhàn)略高度評(píng)價(jià)網(wǎng)絡(luò)靶場 44 Just as in the 19th century we had to secure the seas for our national safety and prosperity, and in the 20th century we had to secure the air, in the 21st century we also have to secure our advantage in cyber space. 45 46 47 47 United States 2nd National Software Summit, Washington, May 1012, 2022. ? The strategy includes four programs: Improving Software Trustworthiness Educating and Fielding the Software Workforce ReEnergizing Software Research and Development Encouraging Innovation Within the . Software Security Safety Reliability Survivability ? The strategy includes two mutually supporting and plementary goals: ? Achieve the ability to routinely develop and deploy trustworthy software products and systems ? Ensure the continued petitiveness of the . software industry. 48 Cyber Security: A Crisis of Prioritization Top Ten Areas in Need of Increased Support ? Computer Authentication Methodologies ? Securing Fundamental Protocols ? Secure Software Engineering amp。 Software Assurance ? Holistic System Security ? Monitoring and Detection ? Mitigation and Recovery Methodologies ? Cyber Forensics and Technology to Enable Prosecution of Criminals ? Modeling and Testbeds for New Technologies ? Metrics, Benchmarks, and Best Practices ? Societal and Governance Issues 49 Disciplines Contributing to Software Assurance Safety amp。 Security Project Mgt Software Acquisition Software Engineering Software Assurance Systems Engineering Information Assurance 50 50 51 52 Model for Network Security 53 Summary ?“The system” is not just a puter or a work ?Prevention is not the only goal ?Security as a tradeoff The goal is not (usually) “to make the system as secure as possible”… …but instead, “to make the system as secure as possible within certain constraints” (cost, usability, convenience) ? Costbenefit analysis ? Sometimes the best security is to make sure you are not the easiest target for an attacker… 54 “More” security not always better ?“No point in putting a higher post in the ground when the enemy can go around it” ?Need to identify the weakest link Security of a system is only as good as the security at its weakest point… ?Security is not a “magic bullet” ?Security is a process, not a product 55 Organizers David Evans, University of Virginia Karl Levitt, National Science Foundation Brad Martin, National Security Agency James Silk, Institute for Defense Analyses 56 57 Thank you!