Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes, 27007-27008 [2010-11444]
Download as PDF
sroberts on DSKD5P82C1PROD with NOTICES
Federal Register / Vol. 75, No. 92 / Thursday, May 13, 2010 / Notices
Background: With the increased
attention to cybersecurity, the
President’s Cyberspace Policy Review
challenges the Federal community to
develop a framework for R&D strategies
that focus on game-changing
technologies that can significantly
enhance the trustworthiness of
cyberspace (by ‘‘cyberspace’’ we mean
the globally interconnected network of
information technology infrastructures,
including the Internet,
telecommunications networks,
computer systems, and embedded
processors in critical industries).
Achieving enduring trustworthiness of
the cyberspace requires new paradigms
that re-balance security asymmetries of
today’s landscape: The cost of
simultaneously satisfying all the
requirements of an ideal cybersecurity
solution in a static system is impossibly
high, and so we must enable sub-spaces
in cyberspace to support different
security policies and different security
services for different types of
interactions; the cost of attack is
asymmetric, favoring the attacker, and
so defenders must increase the cost of
attack and must employ methods that
enable them to continue to operate in
the face of attack; the lack of meaningful
metrics and economically sound
decision making in security misallocates
resources, and so we must promote
economic principles that encourage the
broad use of good cybersecurity
practices and deter illicit activities. The
research agenda will be built by initially
focusing on the three themes and on
enabling component technologies
supportive of, or required by these
themes.
Invitation to Comment: Input is
welcomed to refine these themes so that
they can form the basis of an enhanced
research agenda, enriching our
understanding of how to design and
build a more trustworthy cyberspace.
Questions that individuals may wish to
address include, but are not limited to
the following:
1. How might the three themes be
refined or enhanced to further improve
cyberspace?
2. What are the research,
development, implementation and other
challenges in achieving the goals under
each theme?
3. What state-of-the-art activities and
use-cases can be cited in support of the
three themes?
4. How would your organization’s
future vision support or incorporate the
three themes?
5. Should there be a private sector
organization to act as a partner to the
public sector in a continuing gamechange process?
VerDate Mar<15>2010
15:56 May 12, 2010
Jkt 220001
Relevant input received through this
request will be shared with the Federal
agencies of the NITRD Program.
Submitted by the National Science
Foundation for the National
Coordination Office (NCO) for
Networking and Information
Technology Research and Development
(NITRD).
Dated: May 10, 2010.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science
Foundation.
[FR Doc. 2010–11443 Filed 5–12–10; 8:45 am]
BILLING CODE 7555–01–P
NATIONAL SCIENCE FOUNDATION
Toward a Federal Cybersecurity
Research Agenda: Three Gamechanging Themes
AGENCY: The National Coordination
Office (NCO) for Networking and
Information Technology Research and
Development (NITRD).
ACTION: Notice.
FOR FURTHER INFORMATION CONTACT:
Tomas Vagoun at Vagoun@nitrd.gov or
(703) 292–4873. Individuals who use a
telecommunications device for the deaf
(TDD) may call the Federal Information
Relay Service (FIRS) at 1–800–877–8339
between 8 a.m. and 8 p.m., Eastern time,
Monday through Friday.
DATES: May 19, 2010.
SUMMARY: Representatives from Federal
research agencies will present themes to
exemplify and motivate future Federal
cybersecurity research activities.
SUPPLEMENTARY INFORMATION:
Overview: This notice is issued by the
National Coordination Office for the
Networking and Information
Technology Research and Development
(NITRD) Program. In concert with the
White House Office of Science and
Technology Policy, agencies of the
NITRD Program have identified three
initial research and development (R&D)
themes to exemplify and motivate future
Federal game-change cybersecurity
research activities: (a) Tailored
Trustworthy Spaces, (b) Moving Target,
(c) Cyber Economic Incentives. On
Wednesday May 19, 2010, from 1:30
p.m.–5:00 p.m. PDT, representatives
from the National Science Foundation,
the Department of Homeland Security,
and other agencies, will present the
three themes at the Claremont Hotel, 41
Tunnel Road, Berkeley, CA 94705. This
event will be webcast. For the event
agenda and information about the
webcast, go to: https://www.nitrd.gov/
CSThemes.aspx. This event will be the
PO 00000
Frm 00090
Fmt 4703
Sfmt 4703
27007
first discussion of these Federal
cybersecurity game-change R&D
objectives and will provide insights into
the priorities that are shaping the
direction of Federal research activities.
Following this event, an on-line forum
will be opened at https://
cybersecurity.nitrd.gov/ to provide an
opportunity for comments and feedback.
Background: With the increased
attention to cybersecurity, the
President’s Cyberspace Policy Review
challenges the Federal community to
develop a framework for R&D strategies
that focus on game-changing
technologies that can significantly
enhance the trustworthiness of
cyberspace (by ‘‘cyberspace’’ we mean
the globally interconnected network of
information technology infrastructures,
including the Internet,
telecommunications networks,
computer systems, and embedded
processors in critical industries).
Achieving enduring trustworthiness of
the cyberspace requires new paradigms
that re-balance security asymmetries of
today’s landscape: the cost of
simultaneously satisfying all the
requirements of an ideal cybersecurity
solution in a static system is impossibly
high, and so we must enable sub-spaces
in cyberspace to support different
security policies and different security
services for different types of
interactions; the cost of attack is
asymmetric, favoring the attacker, and
so defenders must increase the cost of
attack and must employ methods that
enable them to continue to operate in
the face of attack; the lack of meaningful
metrics and economically sound
decision making in security misallocates
resources, and so we must promote
economic principles that encourage the
broad use of good cybersecurity
practices and deter illicit activities. The
research agenda will be built by initially
focusing on the three themes and on
enabling component technologies
supportive of, or required by these
themes. The Federal research
community welcomes feedback to refine
these themes so that they can form the
basis of an enhanced research agenda. In
the pursuit of these three initial themes,
we expect new themes, possibly
complementary and possibly
overlapping, will emerge, enriching our
understanding of how to design and
build a more trustworthy cyberspace.
Submitted by the National Science
Foundation for the National
Coordination Office (NCO) for
Networking and Information
Technology Research and Development
(NITRD).
E:\FR\FM\13MYN1.SGM
13MYN1
27008
Federal Register / Vol. 75, No. 92 / Thursday, May 13, 2010 / Notices
Dated: May 10, 2010.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science
Foundation.
[FR Doc. 2010–11444 Filed 5–12–10; 8:45 am]
BILLING CODE 7555–01–P
SMALL BUSINESS ADMINISTRATION
[Disaster Declaration # 12161 and # 12162]
TENNESSEE Disaster Number
TN–00038
ACTION:
SMALL BUSINESS ADMINISTRATION
[Disaster Declaration #12159 and #12160]
Tennessee Disaster Number TN–00039
Small Business Administration.
Amendment 3.
AGENCY:
ACTION:
SUMMARY: This is an amendment of the
Presidential declaration of a major
disaster for the State of TENNESSEE
(FEMA–1909–DR), dated 05/04/2010.
Incident: Severe Storms, Flooding,
Straight-line Winds, and Tornadoes.
Incident Period: 04/30/2010 and
continuing.
Effective Date: 05/07/2010.
Physical Loan Application Deadline
Date: 07/06/2010.
EIDL Loan Application Deadline Date:
02/04/2011.
ADDRESSES: Submit completed loan
applications to: Small Business
Administration, Processing and
Disbursement Center, 14925 Kingsport
Road, Fort Worth, TX 76155.
FOR FURTHER INFORMATION CONTACT: A
Escobar, Office of Disaster Assistance,
U.S. Small Business Administration,
409 3rd Street, SW., Suite 6050,
Washington, DC 20416.
SUPPLEMENTARY INFORMATION: The notice
of the Presidential disaster declaration
for the State of TENNESSEE, dated
05/04/2010 is hereby amended to
include the following areas as adversely
affected by the disaster:
DATES:
sroberts on DSKD5P82C1PROD with NOTICES
Primary Counties: (Physical Damage
and Economic Injury Loans):
Benton, Dickson, Humphreys,
Maury, Rutherford, Sumner.
Contiguous Counties: (Economic Injury
Loans Only):
Kentucky: Allen, Simpson.
Tennessee: Bedford, Cannon, Coffee,
Giles, Lawrence, Macon, Trousdale.
All other information in the original
declaration remains unchanged.
(Catalog of Federal Domestic Assistance
Numbers 59002 and 59008)
James E. Rivera,
Associate Administrator for Disaster
Assistance.
[FR Doc. 2010–11405 Filed 5–12–10; 8:45 am]
BILLING CODE 8025–01–P
VerDate Mar<15>2010
15:56 May 12, 2010
Small Business Administration.
Amendment 3.
AGENCY:
Jkt 220001
SUMMARY: This is an amendment of the
Presidential declaration of a major
disaster for Public Assistance Only for
the State of TENNESSEE (FEMA–1909–
DR), dated 05/04/2010 .
Incident: Severe Storms, Flooding,
Straight-Line Winds and Tornadoes.
Incident Period: 04/30/2010 and
continuing.
Effective Date: 05/06/2010.
Physical Loan Application Deadline
Date: 07/06/2010.
Economic Injury (EIDL) Loan
Application Deadline Date: 02/04/2011.
ADDRESSES: Submit completed loan
applications to: Small Business
Administration, Processing and
Disbursement Center, 14925 Kingsport
Road, Fort Wort, TX 76155.
FOR FURTHER INFORMATION CONTACT: A.
Escobar, Office of Disaster Assistance,
U.S. Small Business Administration,
409 3rd Street, SW., Suite 6050,
Washington, DC 20416.
SUPPLEMENTARY INFORMATION: The notice
of the President’s major disaster
declaration for Private Non-Profit
organizations in the State of
TENNESSEE, dated 05/04/2010, is
hereby amended to include the
following areas as adversely affected by
the disaster.
Primary Counties: Dickson, Humphreys,
Maury, Rutherford, Benton.
All other information in the original
declaration remains unchanged.
DATES:
(Catalog of Federal Domestic Assistance
Numbers 59002 and 59008)
James E. Rivera,
Associate Administrator for Disaster
Assistance.
[FR Doc. 2010–11411 Filed 5–12–10; 8:45 am]
Incident: Deepwater Horizon Oil
Spill.
Incident Period: 04/20/2010 And
Continuing.
Effective Date: 05/05/2010.
EIDL Loan Application Deadline Date:
02/07/2011.
ADDRESSES: Submit completed loan
applications to: U.S. Small Business
Administration, Processing And
Disbursement Center, 14925 Kingsport
Road, Fort Worth, TX 76155.
FOR FURTHER INFORMATION CONTACT: A.
Escobar, Office of Disaster Assistance,
U.S. Small Business Administration,
409 3rd Street, SW., Suite 6050,
Washington, DC 20416.
SUPPLEMENTARY INFORMATION: Notice is
hereby given that as a result of the
Administrator’s EIDL declaration,
applications for economic injury
disaster loans may be filed at the
address listed above or other locally
announced locations.
The following areas have been
determined to be adversely affected by
the disaster:
Primary Parishes:
Jefferson, Lafourche, Orleans,
Plaquemines, Saint Bernard, Saint
Tammany.
Contiguous Parishes and Counties:
Louisiana: Assumption, Saint Charles,
Saint James, St John The Baptist,
Tangipahoa, Terrebonne,
Washington.
Mississippi: Hancock, Pearl River.
The Interest Rates are:
Percent
Businesses and Small Agricultural
Cooperatives Without Credit
Available Elsewhere ..................
Non-Profit Organizations Without
Credit Available Elsewhere .......
4.000
3.000
The number assigned to this disaster
for economic injury is 121630.
The States which received an EIDL
Declaration # are Louisiana; Mississippi.
(Catalog of Federal Domestic Assistance
Number 59002)
BILLING CODE 8025–01–P
SMALL BUSINESS ADMINISTRATION
Dated: May 5, 2010.
Karen G. Mills,
Administrator.
[FR Doc. 2010–11488 Filed 5–12–10; 8:45 am]
[Disaster Declaration #12163]
BILLING CODE 8025–01–P
Louisiana Disaster #LA–00032
Declaration of Economic Injury
SMALL BUSINESS ADMINISTRATION
Small Business Administration.
Notice.
AGENCY:
ACTION:
This is a notice of an
Economic Injury Disaster Loan (EIDL)
declaration for the State of Louisiana,
dated 05/05/2010.
SUMMARY:
PO 00000
Frm 00091
Fmt 4703
Sfmt 4703
[Disaster Declaration #12149 and #12150]
Mississippi Disaster Number MS–
00036
Small Business Administration.
Amendment 2.
AGENCY:
ACTION:
E:\FR\FM\13MYN1.SGM
13MYN1
Agencies
[Federal Register Volume 75, Number 92 (Thursday, May 13, 2010)]
[Notices]
[Pages 27007-27008]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2010-11444]
-----------------------------------------------------------------------
NATIONAL SCIENCE FOUNDATION
Toward a Federal Cybersecurity Research Agenda: Three Game-
changing Themes
AGENCY: The National Coordination Office (NCO) for Networking and
Information Technology Research and Development (NITRD).
ACTION: Notice.
-----------------------------------------------------------------------
FOR FURTHER INFORMATION CONTACT: Tomas Vagoun at Vagoun@nitrd.gov or
(703) 292-4873. Individuals who use a telecommunications device for the
deaf (TDD) may call the Federal Information Relay Service (FIRS) at 1-
800-877-8339 between 8 a.m. and 8 p.m., Eastern time, Monday through
Friday.
DATES: May 19, 2010.
SUMMARY: Representatives from Federal research agencies will present
themes to exemplify and motivate future Federal cybersecurity research
activities.
SUPPLEMENTARY INFORMATION:
Overview: This notice is issued by the National Coordination Office
for the Networking and Information Technology Research and Development
(NITRD) Program. In concert with the White House Office of Science and
Technology Policy, agencies of the NITRD Program have identified three
initial research and development (R&D) themes to exemplify and motivate
future Federal game-change cybersecurity research activities: (a)
Tailored Trustworthy Spaces, (b) Moving Target, (c) Cyber Economic
Incentives. On Wednesday May 19, 2010, from 1:30 p.m.-5:00 p.m. PDT,
representatives from the National Science Foundation, the Department of
Homeland Security, and other agencies, will present the three themes at
the Claremont Hotel, 41 Tunnel Road, Berkeley, CA 94705. This event
will be webcast. For the event agenda and information about the
webcast, go to: https://www.nitrd.gov/CSThemes.aspx. This event will be
the first discussion of these Federal cybersecurity game-change R&D
objectives and will provide insights into the priorities that are
shaping the direction of Federal research activities. Following this
event, an on-line forum will be opened at https://cybersecurity.nitrd.gov/ to provide an opportunity for comments and
feedback.
Background: With the increased attention to cybersecurity, the
President's Cyberspace Policy Review challenges the Federal community
to develop a framework for R&D strategies that focus on game-changing
technologies that can significantly enhance the trustworthiness of
cyberspace (by ``cyberspace'' we mean the globally interconnected
network of information technology infrastructures, including the
Internet, telecommunications networks, computer systems, and embedded
processors in critical industries). Achieving enduring trustworthiness
of the cyberspace requires new paradigms that re-balance security
asymmetries of today's landscape: the cost of simultaneously satisfying
all the requirements of an ideal cybersecurity solution in a static
system is impossibly high, and so we must enable sub-spaces in
cyberspace to support different security policies and different
security services for different types of interactions; the cost of
attack is asymmetric, favoring the attacker, and so defenders must
increase the cost of attack and must employ methods that enable them to
continue to operate in the face of attack; the lack of meaningful
metrics and economically sound decision making in security misallocates
resources, and so we must promote economic principles that encourage
the broad use of good cybersecurity practices and deter illicit
activities. The research agenda will be built by initially focusing on
the three themes and on enabling component technologies supportive of,
or required by these themes. The Federal research community welcomes
feedback to refine these themes so that they can form the basis of an
enhanced research agenda. In the pursuit of these three initial themes,
we expect new themes, possibly complementary and possibly overlapping,
will emerge, enriching our understanding of how to design and build a
more trustworthy cyberspace.
Submitted by the National Science Foundation for the National
Coordination Office (NCO) for Networking and Information Technology
Research and Development (NITRD).
[[Page 27008]]
Dated: May 10, 2010.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
[FR Doc. 2010-11444 Filed 5-12-10; 8:45 am]
BILLING CODE 7555-01-P