"Grand Challenges" in Cyber Security Risks 12
The Computing Research Association recently invited 50 of the top scientists, educators, business people, and futurists in cyber security to an executive retreat in Virginia and locked them away for three days until they identified a set of "Grand Challenges" in information security research -- ideas that should "shape the research agenda in the field over the next few decades." The conference participants identified four: eliminate epidemic-style attacks (viruses, worms, email spam) within 10 years; develop tools and principles that allow construction of large-scale systems for important societal applications -- such as medical records systems -- that are highly trustworthy despite being attractive targets; develop quantitative information-systems risk management to be at least as good as quantitative financial risk management within the next decade; and give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future. They haven't written the final report yet (due in early 2004), but they've already told Congress about it. Sounds like they've got a lot of work to do.
Re:Hogwash! (Score:2, Flamebait)
-- Pres. Kennedy, May 25, 1961
Re:Hogwash! (Score:1)
Security for computers is like security in society: the more money you spend on it from a centralized level the worse it gets. The only way to really increase security is for each individual to work on it, individually. At the end of the day if someone really really wants to break into your house it doesn't matter how many locks, entry systems, or guard dogs you have.
Advocating a consortium of experts to ma
Privacy (Score:1)
I'd like to see how this jives with the slowly-growing move toward "trusted computing". The dynamic, pervasive computing environments of the future may be designed to give the illusion of privacy, while silently reporting back to $CORPORATION. "Control" might be little more than a toggle switch which disables the "now transmitting data" message box.
The grandest security challenge of all... (Score:1)
..viruses, worms, email spam.. (Score:1)
Well in 10 years I'm quite positive that there will be many different and more creative ways of performing attacks, we just have to wait for the newer generations to get out of elementary school.
Mobile phones...? (Score:3, Insightful)
I hope they didn't exclude mobile phones from their final report. While most of the mobile phones still are plain old phones, there still is a great potential of insecurity among these "new generation" phones. As covered on Slashdot [slashdot.org] last week, it would be smart to understand the problems with integrating the phones into the Internet. I'm pretty sure that developers at Nokia hasn't yet seen the really big problems, and that's good - in a way.
How do you patch your mobile phone if someone finds a security bug in it anyway?
Re: Mixed Bag (Score:1)
E - voting (Score:2)
Or is this too easy for people who genuinely want to do it?