Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security, 2151-2152 [2011-522]
Download as PDF
Federal Register / Vol. 76, No. 8 / Wednesday, January 12, 2011 / Notices
SUPPLEMENTARY INFORMATION:
NATIONAL CREDIT UNION
ADMINISTRATION
Sunshine Act; Meeting Notice; Matter
To Be Deleted From the Agenda of a
Previously Announced Agency
Meeting
11:30 a.m., Thursday,
January 13, 2011.
PLACE: Board Room, 7th Floor, Room
7047, 1775 Duke Street, Alexandria, VA
22314–3428.
STATUS: Closed.
1. MATTER TO BE DELETED: Insurance
Appeals. Closed pursuant to exemptions
(4), (6) and (7).
FOR FURTHER INFORMATION CONTACT:
Mary Rupp, Secretary of the Board,
Telephone: 703–518–6304.
TIME AND DATE:
Mary Rupp,
Board Secretary.
[FR Doc. 2011–596 Filed 1–10–11; 11:15 am]
BILLING CODE P
NATIONAL SCIENCE FOUNDATION
Notice of Intent To Seek Approval To
Renew an Information Collection
National Science Foundation.
Notice and request for
comments.
AGENCY:
ACTION:
The National Science
Foundation (NSF) is announcing plans
to request clearance of this collection. In
accordance with the requirement of
Section 3506(c)(2)(A) of the Paperwork
Reduction Act of 1995 (Pub. L. 104–13),
we are providing opportunity for public
comment on this action. After obtaining
and considering public comment, NSF
will prepare the submission requesting
that OMB approve clearance of this
collection for no longer than three years.
DATES: Written comments on this notice
must be received by March 14, 2011 to
be assured of consideration. Comments
received after that date will be
considered to the extent practicable.
For Additional Information or
Comments: Contact Suzanne H.
Plimpton, Reports Clearance Officer,
National Science Foundation, 4201
Wilson Boulevard, Suite 295, Arlington,
Virginia 22230; telephone (703) 292–
7556; or send e-mail to
splimpto@nsf.gov. Individuals who use
a telecommunications device for the
deaf (TDD) may call the Federal
Information Relay Service (FIRS) at
1–800–877–8339 between 8 a.m. and 8
p.m., Eastern time, Monday through
Friday. You also may obtain a copy of
the data collection instrument and
instructions from Ms. Plimpton.
mstockstill on DSKH9S0YB1PROD with NOTICES
SUMMARY:
VerDate Mar<15>2010
17:25 Jan 11, 2011
Jkt 223001
Title of Collection: NSF Surveys to
Measure Customer Service Satisfaction.
OMB Number: 3145–0157.
Expiration Date of Approval: August
31, 2011.
Type of Request: Intent to seek
approval to renew an information
collection.
Abstract:
Proposed Project: On September 11,
1993, President Clinton issued
Executive Order 12862, ‘‘Setting
Customer Service Standards,’’ which
calls for Federal agencies to provide
service that matches or exceeds the best
service available in the private sector.
Section 1(b) of that order requires
agencies to ‘‘survey customers to
determine the kind and quality of
services they want and their level of
satisfaction with existing services.’’ The
National Science Foundation (NSF) has
an ongoing need to collect information
from its customer community (primarily
individuals and organizations engaged
in science and engineering research and
education) about the quality and kind of
services it provides and use that
information to help improve agency
operations and services.
Estimate of Burden: The burden on
the public will change according to the
needs of each individual customer
satisfaction survey; however, each
survey is estimated to take
approximately 30 minutes per response.
Respondents: Will vary among
individuals or households; business or
other for-profit; not-for-profit
institutions; farms; federal government;
state, local or tribal governments.
Estimated Number of Responses per
Survey: This will vary by survey.
Comments: Comments are invited on
(a) whether the proposed collection of
information is necessary for the proper
performance of the functions of the
Agency, including whether the
information shall have practical utility;
(b) the accuracy of the Agency’s
estimate of the burden of the proposed
collection of information; (c) ways to
enhance the quality, utility, and clarity
of the information on respondents,
including through the use of automated
collection techniques or other forms of
information technology; and (d) ways to
minimize the burden of the collection of
information on those who are to
respond, including through the use of
appropriate automated, electronic,
mechanical, or other technological
collection techniques or other forms of
information technology.
PO 00000
Frm 00071
Fmt 4703
Sfmt 4703
2151
Dated: January 7, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science
Foundation.
[FR Doc. 2011–524 Filed 1–11–11; 8:45 am]
BILLING CODE 7555–01–P
NATIONAL SCIENCE FOUNDATION
Assumption Buster Workshop:
Defense-in-Depth is a Smart
Investment for Cyber Security
The National Coordination
Office (NCO) for the Networking and
Information Technology Research and
Development (NITRD) Program.
ACTION: Call for participation.
AGENCY:
FOR FURTHER INFORMATION CONTACT:
assumptionbusters@nitrd.gov
Workshop: March 22, 2011;
Deadline: February 10, 2011. Apply via
e-mail to assumptionbusters@nitrd.gov.
SUMMARY: The NCO, on behalf of the
Special Cyber Operations Research and
Engineering (SCORE) Committee, an
interagency working group that
coordinates cyber security research
activities in support of national security
systems, is seeking expert participants
in a day-long workshop on the pros and
cons of the defense-in-depth strategy for
cyber security. The workshop will be
held March 22, 2011 in the Washington
DC area. Applications will be accepted
until 5 p.m. EST February 10, 2011.
Accepted participants will be notified
by February 28, 2011.
SUPPLEMENTARY INFORMATION: Overview:
This notice is issued by the National
Coordination Office for the Networking
and Information Technology Research
and Development (NITRD) Program on
behalf of the SCORE Committee.
Background: There is a strong and
often repeated call for research to
provide novel cyber security solutions.
The rhetoric of this call is to elicit new
solutions that are radically different
from existing solutions. Continuing
research that achieves only incremental
improvements is a losing proposition.
We are lagging behind and need
technological leaps to get, and keep,
ahead of adversaries who are themselves
rapidly improving attack technology. To
answer this call, we must examine the
key assumptions that underlie current
security architectures. Challenging those
assumptions both opens up the
possibilities for novel solutions that are
rooted in a fundamentally different
understanding of the problem and
provides an even stronger basis for
moving forward on those assumptions
that are well-founded. The SCORE
Committee is conducting a series of four
DATES:
E:\FR\FM\12JAN1.SGM
12JAN1
mstockstill on DSKH9S0YB1PROD with NOTICES
2152
Federal Register / Vol. 76, No. 8 / Wednesday, January 12, 2011 / Notices
workshops to begin the assumption
buster process. The assumptions that
underlie this series are that cyber space
is an adversarial domain, that the
adversary is tenacious, clever, and
capable, and that re-examining cyber
security solutions in the context of these
assumptions will result in key insights
that will lead to the novel solutions we
desperately need. To ensure that our
discussion has the requisite adversarial
flavor, we are inviting researchers who
develop solutions of the type under
discussion, and researchers who exploit
these solutions. The goal is to engage in
robust debate of topics generally
believed to be true to determine to what
extent that claim is warranted. The
adversarial nature of these debates is
meant to ensure the threat environment
is reflected in the discussion in order to
elicit innovative research concepts that
will have a greater chance of having a
sustained positive impact on our cyber
security posture.
The first topic to be explored in this
series is ‘‘Defense-in-depth is a Smart
Investment.’’ The workshop on this
topic will be held in the Washington,
DC area on March 22, 2011.
Assertion: ‘‘Defense-in-Depth is a
smart investment because it provides an
environment in which we can safely
and securely conduct computing
functions and achieve mission success.’’
This assertion reflects a commonly
held viewpoint that Defense-in-Depth is
a smart investment for achieving perfect
safety/security in computing. To
analyze this statement we must look at
it from two perspectives. First, we need
to determine how the cyber security
community developed confidence in
Defense-in-Depth despite mounting
evidence of its limitations, and second,
we must look at the mechanisms in
place to evaluate the cost/benefit of
implementing Defense-in-Depth that
layers mechanisms of uncertain
effectiveness.
Initially developed by the military for
perimeter protection, Defense-in-Depth
was adopted by the National Security
Agency (NSA) for main-frame computer
system protection. The Defense-inDepth strategy was designed to provide
multiple layers of security mechanisms
focusing on people, technology, and
operations (including physical security)
in order to achieve robust information
assurance (IA).1 Today’s highly
networked computing environments,
however, have significantly changed the
cyber security calculus, and Defense-inDepth has struggled to keep pace with
1 Defense-in-depth: A practical strategy for
achieving Information Assurance in today’s highly
networked environments.
VerDate Mar<15>2010
17:25 Jan 11, 2011
Jkt 223001
change. Over time, it became evident
that Defense-in-depth failed to provide
information assurance against all but the
most elementary threats, in the process
putting at risk mission essential
functions. The 2009 White House
Cyberspace Policy Review called for
‘‘changes in technology’’ to protect
cyberspace, and the 2010 DHS DOD
MOA sought to ‘‘aid in preventing,
detecting, mitigating and recovering
from the effects of an attack’’, suggesting
a new dimension for Defense-in-depth
along the lifecycle of an attack.
Defense-in-Depth can provide robust
information assurance properties if
implemented along multiple
dimensions; however, we must consider
whether layers of sometimes ineffective
defense tools may result in delaying
potential compromise without
providing any guarantee that
compromise will be completely
prevented. In today’s highly networked
world, Defense-in-Depth may best be
viewed as a practical way to defer harm
rather than a means to security. It is
worth considering whether the Defensein-Depth strategy tends to contribute
more to network survivability than it
does to mission assurance.
Intrusions into DoD and other
information systems over the past
decade provide ample evidence that
Defense-in-Depth provides no
significant barrier to sophisticated,
motivated, and determined adversaries
given those adversaries can structure
their attacks to pass through all the
layers of defensive measures. In the
meantime, kinetic Defense-in-Depth of
weapons platforms (such as aircraft)
evolved into a life-cycle strategy of
stealth (prevent), radars (detect),
jammers and chaff (mitigate), fire
extinguishers (survive) and parachutes
(recover), a strategy that could provide
value in the cyber domain.
How to Apply
If you would like to participate in this
workshop, please submit (1) a resume or
curriculum vita of no more than two
pages which highlights your expertise in
this area and (2) a one-page paper
stating your opinion of the assertion and
outlining your key thoughts on the
topic. The workshop will accommodate
no more than 60 participants, so these
brief documents need to make a
compelling case for your participation.
Applications should be submitted to
assumptionbusters@nitrd.gov no later
than 5 p.m. EST on February 10, 2011.
Selection and Notification
The SCORE committee will select an
expert group that reflects a broad range
of opinions on the assertion. Accepted
PO 00000
Frm 00072
Fmt 4703
Sfmt 4703
participants will be notified by e-mail
no later than February 28, 2011. We
cannot guarantee that we will contact
individuals who are not selected,
though we will attempt to do so unless
the volume of responses is
overwhelming.
Submitted by the National Science
Foundation for the National
Coordination Office (NCO) for
Networking and Information
Technology Research and Development
(NITRD) on January 7, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science
Foundation.
[FR Doc. 2011–522 Filed 1–11–11; 8:45 am]
BILLING CODE 7555–01–P
SECURITIES AND EXCHANGE
COMMISSION
Proposed Collection; Comment
Request
Upon Written Request, Copies Available
From: Securities and Exchange
Commission, Office of Investor
Education and Advocacy,
Washington, DC 20549–0213.
Extension:
Rule 17a–4; SEC File No. 270–198; OMB
Control No. 3235–0279.
Notice is hereby given that pursuant
to the Paperwork Reduction Act of 1995
(44 U.S.C. 3501 et seq.), the Securities
and Exchange Commission
(‘‘Commission’’) is soliciting comments
on the collection of information
provided for in Rule 17a–4 (17 CFR
240.17a–4), under the Securities
Exchange Act of 1934 (15 U.S.C. 78a et
seq.). The Commission plans to submit
this existing collection of information to
the Office of Management and Budget
for extension and approval.
Rule 17a–4 requires exchange
members, brokers and dealers (‘‘brokerdealers’’) to preserve for prescribed
periods of time certain records required
to be made by Rule 17a–3. In addition,
Rule 17a–4 requires the preservation of
records required to be made by other
Commission rules and other kinds of
records which firms make or receive in
the ordinary course of business. These
include, but are not limited to, bank
statements, cancelled checks, bills
receivable and payable, originals of
communications, and descriptions of
various transactions. Rule 17a–4 also
permits broker-dealers to employ, under
certain conditions, electronic storage
media to maintain records required to
be maintained under Rules 17a–3 and
17a–4.
E:\FR\FM\12JAN1.SGM
12JAN1
Agencies
[Federal Register Volume 76, Number 8 (Wednesday, January 12, 2011)]
[Notices]
[Pages 2151-2152]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-522]
-----------------------------------------------------------------------
NATIONAL SCIENCE FOUNDATION
Assumption Buster Workshop: Defense-in-Depth is a Smart
Investment for Cyber Security
AGENCY: The National Coordination Office (NCO) for the Networking and
Information Technology Research and Development (NITRD) Program.
ACTION: Call for participation.
-----------------------------------------------------------------------
FOR FURTHER INFORMATION CONTACT: assumptionbusters@nitrd.gov
DATES: Workshop: March 22, 2011; Deadline: February 10, 2011. Apply via
e-mail to assumptionbusters@nitrd.gov.
SUMMARY: The NCO, on behalf of the Special Cyber Operations Research
and Engineering (SCORE) Committee, an interagency working group that
coordinates cyber security research activities in support of national
security systems, is seeking expert participants in a day-long workshop
on the pros and cons of the defense-in-depth strategy for cyber
security. The workshop will be held March 22, 2011 in the Washington DC
area. Applications will be accepted until 5 p.m. EST February 10, 2011.
Accepted participants will be notified by February 28, 2011.
SUPPLEMENTARY INFORMATION: Overview: This notice is issued by the
National Coordination Office for the Networking and Information
Technology Research and Development (NITRD) Program on behalf of the
SCORE Committee.
Background: There is a strong and often repeated call for research
to provide novel cyber security solutions. The rhetoric of this call is
to elicit new solutions that are radically different from existing
solutions. Continuing research that achieves only incremental
improvements is a losing proposition. We are lagging behind and need
technological leaps to get, and keep, ahead of adversaries who are
themselves rapidly improving attack technology. To answer this call, we
must examine the key assumptions that underlie current security
architectures. Challenging those assumptions both opens up the
possibilities for novel solutions that are rooted in a fundamentally
different understanding of the problem and provides an even stronger
basis for moving forward on those assumptions that are well-founded.
The SCORE Committee is conducting a series of four
[[Page 2152]]
workshops to begin the assumption buster process. The assumptions that
underlie this series are that cyber space is an adversarial domain,
that the adversary is tenacious, clever, and capable, and that re-
examining cyber security solutions in the context of these assumptions
will result in key insights that will lead to the novel solutions we
desperately need. To ensure that our discussion has the requisite
adversarial flavor, we are inviting researchers who develop solutions
of the type under discussion, and researchers who exploit these
solutions. The goal is to engage in robust debate of topics generally
believed to be true to determine to what extent that claim is
warranted. The adversarial nature of these debates is meant to ensure
the threat environment is reflected in the discussion in order to
elicit innovative research concepts that will have a greater chance of
having a sustained positive impact on our cyber security posture.
The first topic to be explored in this series is ``Defense-in-depth
is a Smart Investment.'' The workshop on this topic will be held in the
Washington, DC area on March 22, 2011.
Assertion: ``Defense-in-Depth is a smart investment because it
provides an environment in which we can safely and securely conduct
computing functions and achieve mission success.''
This assertion reflects a commonly held viewpoint that Defense-in-
Depth is a smart investment for achieving perfect safety/security in
computing. To analyze this statement we must look at it from two
perspectives. First, we need to determine how the cyber security
community developed confidence in Defense-in-Depth despite mounting
evidence of its limitations, and second, we must look at the mechanisms
in place to evaluate the cost/benefit of implementing Defense-in-Depth
that layers mechanisms of uncertain effectiveness.
Initially developed by the military for perimeter protection,
Defense-in-Depth was adopted by the National Security Agency (NSA) for
main-frame computer system protection. The Defense-in-Depth strategy
was designed to provide multiple layers of security mechanisms focusing
on people, technology, and operations (including physical security) in
order to achieve robust information assurance (IA).\1\ Today's highly
networked computing environments, however, have significantly changed
the cyber security calculus, and Defense-in-Depth has struggled to keep
pace with change. Over time, it became evident that Defense-in-depth
failed to provide information assurance against all but the most
elementary threats, in the process putting at risk mission essential
functions. The 2009 White House Cyberspace Policy Review called for
``changes in technology'' to protect cyberspace, and the 2010 DHS DOD
MOA sought to ``aid in preventing, detecting, mitigating and recovering
from the effects of an attack'', suggesting a new dimension for
Defense-in-depth along the lifecycle of an attack.
---------------------------------------------------------------------------
\1\ Defense-in-depth: A practical strategy for achieving
Information Assurance in today's highly networked environments.
---------------------------------------------------------------------------
Defense-in-Depth can provide robust information assurance
properties if implemented along multiple dimensions; however, we must
consider whether layers of sometimes ineffective defense tools may
result in delaying potential compromise without providing any guarantee
that compromise will be completely prevented. In today's highly
networked world, Defense-in-Depth may best be viewed as a practical way
to defer harm rather than a means to security. It is worth considering
whether the Defense-in-Depth strategy tends to contribute more to
network survivability than it does to mission assurance.
Intrusions into DoD and other information systems over the past
decade provide ample evidence that Defense-in-Depth provides no
significant barrier to sophisticated, motivated, and determined
adversaries given those adversaries can structure their attacks to pass
through all the layers of defensive measures. In the meantime, kinetic
Defense-in-Depth of weapons platforms (such as aircraft) evolved into a
life-cycle strategy of stealth (prevent), radars (detect), jammers and
chaff (mitigate), fire extinguishers (survive) and parachutes
(recover), a strategy that could provide value in the cyber domain.
How to Apply
If you would like to participate in this workshop, please submit
(1) a resume or curriculum vita of no more than two pages which
highlights your expertise in this area and (2) a one-page paper stating
your opinion of the assertion and outlining your key thoughts on the
topic. The workshop will accommodate no more than 60 participants, so
these brief documents need to make a compelling case for your
participation. Applications should be submitted to
assumptionbusters@nitrd.gov no later than 5 p.m. EST on February 10,
2011.
Selection and Notification
The SCORE committee will select an expert group that reflects a
broad range of opinions on the assertion. Accepted participants will be
notified by e-mail no later than February 28, 2011. We cannot guarantee
that we will contact individuals who are not selected, though we will
attempt to do so unless the volume of responses is overwhelming.
Submitted by the National Science Foundation for the National
Coordination Office (NCO) for Networking and Information Technology
Research and Development (NITRD) on January 7, 2011.
Suzanne H. Plimpton,
Reports Clearance Officer, National Science Foundation.
[FR Doc. 2011-522 Filed 1-11-11; 8:45 am]
BILLING CODE 7555-01-P