Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop.
The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations from several experts in industry, research, and government roles who spoke about the complex facets of recoverabilityâ€"that is, the ability to restore normal operations and security in a system affected by software or hardware failure or a deliberate attack. This publication summarizes the presentations and discussions from the workshop.
In May 2016, the National Academies of Sciences, Engineering, and Medicine hosted a workshop on Cryptographic Agility and Interoperability. Speakers at the workshop discussed the history and practice of cryptography, its current challenges, and its future possibilities. This publication summarizes the presentations and discussions from the workshop.
In 2017, researchers discovered a vulnerability in microprocessors used in computers and devices all over the world. The vulnerability, named Spectre, combines side effects from caching and speculative execution, which are techniques that have been used for many years to increase the speed at which computers operate. The discovery upends a number of common assumptions about cybersecurity and draws attention to the complexities of the global supply chain and global customer base for the vast range of devices and cloud capabilities that all computer users rely on. In October 2018, the Forum on Cyber Resilience hosted a workshop to explore the implications of this development. This publication summarizes the presentations and discussions from the workshop.
In 2017, researchers discovered a vulnerability in microprocessors used in computers and devices all over the world. The vulnerability, named Spectre, combines side effects from caching and speculative execution, which are techniques that have been used for many years to increase the speed at which computers operate. The discovery upends a number of common assumptions about cybersecurity and draws attention to the complexities of the global supply chain and global customer base for the vast range of devices and cloud capabilities that all computer users rely on. In October 2018, the Forum on Cyber Resilience hosted a workshop to explore the implications of this development. This publication summarizes the presentations and discussions from the workshop.
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop.
In May 2016, the National Academies of Sciences, Engineering, and Medicine hosted a workshop on Cryptographic Agility and Interoperability. Speakers at the workshop discussed the history and practice of cryptography, its current challenges, and its future possibilities. This publication summarizes the presentations and discussions from the workshop.
With the increasing frequency of natural and human-induced disasters and the increasing magnitude of their consequences, a clear need exists for governments and communities to become more resilient. The National Research Council's 2012 report Disaster Resilience: A National Imperative addressed the importance of resilience, discussed different challenges and approaches for building resilience, and outlined steps for implementing resilience efforts in communities and within government. Launching a National Conversation on Disaster Resilience in America is a summary of a one-day event in November 2012 to formally launch a national conversation on resilience. Nationally-recognized experts in disaster resilience met to discuss developing a culture of resilience, implementing resilience, and understanding federal perspectives about resilience. This report includes a broad range of perspectives and experiences derived from many types of hazards and disasters in all parts of the country.
The Resilience of the Electric Power Delivery System in Response to Terrorism and Natural Disasters is the summary of a workshop convened in February 2013 as a follow-up to the release of the National Research Council report Terrorism and the Electric Power Delivery System. That report had been written in 2007 for the Department of Homeland Security, but publication was delayed because of security concerns. While most of the committee's findings were still relevant, many developments affecting vulnerability had occurred in the interval. The 2013 workshop was a discussion of the committee\'s results, what had changed in recent years, and how lessons learned about the grid's resilience to terrorism could be applied to other threats to the grid resulting from natural disasters. The purpose was not to translate the entire report into the present, but to focus on key issues relevant to making the grid sufficiently robust that it could handle inevitable failures without disastrous impact. The workshop focused on five key areas: physical vulnerabilities of the grid; cybersecurity; mitigation and response to outages; community resilience and the provision of critical services; and future technologies and policies that could enhance the resilience of the electric power delivery system. The electric power transmission and distribution system (the grid) is an extraordinarily complex network of wires, transformers, and associated equipment and control software designed to transmit electricity from where it is generated, usually in centralized power plants, to commercial, residential, and industrial users. Because the U.S. infrastructure has become increasingly dependent on electricity, vulnerabilities in the grid have the potential to cascade well beyond whether the lights turn on, impacting among other basic services such as the fueling infrastructure, the economic system, and emergency services. The Resilience of the Electric Power Delivery System in Response to Terrorism and Natural Disasters discusses physical vulnerabilities and the cybersecurity of the grid, ways in which communities respond to widespread outages and how to minimize these impacts, the grid of tomorrow, and how resilience can be encouraged and built into the grid in the future.
The 2012 National Research Council report Disaster Resilience: A National Imperative highlighted the challenges of increasing national resilience in the United States. One finding of the report was that "without numerical means of assessing resilience, it would be impossible to identify the priority needs for improvement, to monitor changes, to show that resilience had improved, or to compare the benefits of increasing resilience with the associated costs." Although measuring resilience is a challenge, metrics and indicators to evaluate progress, and the data necessary to establish the metric, are critical for helping communities to clarify and formalize what the concept of resilience means for them, and to support efforts to develop and prioritize resilience investments. One of the recommendations from the 2012 report stated that government entities at federal, state, and local levels and professional organizations should partner to help develop a framework for communities to adapt to their circumstances and begin to track their progress toward increasing resilience. To build upon this recommendation and begin to help communities formulate such a framework, the Resilient America Roundtable of the National Academies convened the workshop Measures of Community Resilience: From Lessons Learned to Lessons Applied on September 5, 2014 in Washington, D.C. The workshop's overarching objective was to begin to develop a framework of measures and indicators that could support community efforts to increase their resilience. The framework will be further developed through feedback and testing in pilot and other partner communities that are working with the Resilient America Roundtable. This report is a summary of the one-day workshop, which consisted of a keynote address and two panel sessions in the morning and afternoon breakout sessions that began the discussion on how to develop a framework of resilience measures.
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.