Technology For National Security Ppt
National security dependon multiple s sectors working together to share technology and knowledge. National Security Strategy (NSS) published in 2017 begins to outline key concepts to maintain the U.S.’s competitive advantage against global competitors and national security threats.
- Briefing Room
- From the News Room
- Latest NewsRead the latest blog posts from 1600 Pennsylvania Ave
- Share-WorthyCheck out the most popular infographics and videos
- PhotosView the photo of the day and other galleries
- Video GalleryWatch behind-the-scenes videos and more
- Live EventsTune in to White House events and statements as they happen
- Music & Arts PerformancesSee the lineup of artists and performers at the White House
- From the Press Office
- From the News Room
- Issues
- Popular Topics
- Top Issues
- More
- More
- The Administration
- People
- Executive Offices
- Initiatives
- Special Events
- Participate
- Digital
- Join Us
- Speak Out
- 1600 Penn
- Inside the White House
- History & Grounds
- Our Government
The President has made it clear that cybersecurity is one of the most important challenges we face as a Nation. Advances in cybersecurity science and engineering are urgently needed to preserve the Internet’s social and economic benefits.
As part of the President’s Cybersecurity National Action Plan (CNAP), the Administration also released the 2016 Federal Cybersecurity Research and Development Strategic Plan, which was coordinated by the National Science and Technology Council. This is the most comprehensive federal cybersecurity research and development (R&D) plan to date, and it updates 2011’s Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program.
With the goal of making cyberspace inherently more secure, the plan challenges the cybersecurity R&D community to provide methods and tools for deterring, protecting, detecting, and adapting to malicious cyber activities. The plan defines near-, mid-, and long-term goals to guide and evaluate progress.
The plan’s goal for the near term is to achieve science and technology (S&T) advances that counter adversaries’ asymmetrical advantages with effective and efficient risk management. To do this, organizations need to better understand the range of vulnerabilities and threats they face in cyberspace, and to practice evidence-based risk management, which is the process of identifying, assessing, and responding to risk, including the development of effective and measurable controls. To make the best choices, organizations need reliable data on the efficacy of security controls and their operational impact in realistic environments, reflecting the behavior of users, defenders, and adversaries. Understanding which measures will be effective against malicious cyber activities will lower cybersecurity risks.
The plan’s goal for the mid-term is to reverse adversaries’ asymmetrical advantages by developing sustainably secure systems and operations. To make malicious cyber activities more difficult, organizations must reduce the rewards of such activities by improving the efficacy and efficiency of their defenses by several orders of magnitude without placing undue burden on users.
Software defects, which are currently common, also give rise to many vulnerabilities. Science and technology advances are needed for the design and implementation of software, firmware, and hardware that are highly resistant to malicious cyber activities. And because system breaches are often due to innocent actions by well-intentioned users, we also need to develop effective, measurable technical and non-technical security controls that consider human behavior and economic incentives in cyberspace.
The plan’s long-term goal is to achieve S&T advances that deter malicious cyber activities, by increasing adversaries’ costs and risks, while also lowering their gains. Measuring the effort required and the likely results for malicious activities is critical to understanding how to effectively deter such activities. This requires new forensic capacities that reliably identify the perpetrator quickly enough to take action, without compromising free speech, or anonymity for those who are doing nothing wrong. If the likelihood of their discovery is increased and it becomes clear they will suffer negative consequences, many potential actors would forgo malicious activities.
As we accelerate the important work of making computing and the Internet inherently more secure through implementation of the plan, it will be critical to re-examine, refine, and extend the plan over time. Today, the President also established the Commission on Enhancing National Cybersecurity to provide recommendations on actions that can be taken over the next decade to strengthen cybersecurity, including further investments in research and development initiatives. While their work is just beginning, the Federal Cybersecurity Research and Development Strategic Plan will provide the Commission a valuable reference point as they consider the challenges and opportunities in cybersecurity R&D.
Whether in government, academia, or the private sector, organizations that sponsor research, perform research, or advise on such investments have an opportunity to contribute. Let’s work together to make cyberspace more secure.
Greg Shannon is the Assistant Director for Cybersecurity Strategy in the White House Office of Science and Technology Policy.
Tim Polk is the Assistant Director for Cybersecurity in the White House Office of Science and Technology Policy.
Policymakers need to stop being drawn to the myth of the ‘quick fix’ and focus on long-term and sustained development of research and development as an ecosystem if they really want to solve those wicked problems, Lesley Seebeck writes.
Science And Technology Ppt
Recent debates over priorities in research and development, over university research, and even the plundering of ideas from universities – Australian and others – by the Chinese government suggest confusion over the nature of R&D and the development of science and technology.
We live in an age of instant gratification, where the fast and the immediate tend to grab people’s attention. And so we’re often misled by a skewed view that technology is easy: start with a bright idea, add a little Silicon Valley, stir, and magic happens.
That’s suited a number of players. Silicon Valley propagates the myth of the heroic founder – almost without exception male – who has a vision and disrupts the normal to create a new world. Those companies are driven by incentives other than the deep, heavy lifting needed for good science and technology, specifically consumer needs and desires.
That’s a massive contrast to the slow, careful, patient work undertaken in government and university labs across the country, and on which much of Silicon Valley’s own products and services are built.
Politicians, too, are strongly attracted to tales of heroic endeavour by the quick, preferably cheap, fix to what are difficult, wicked problems. They’re an easy mark for those who promise fast solutions. But by focusing on the ‘tip of the spear’, they neglect the haft, the weight and balance, and the effort needed to give that tip power when applied.
Reliance on those narratives promotes immediacy, linearity, and single-point solutions—and does untold damage to public policy and national security. The reality is very different.
First, research and development is slow. It has long lead times – training people in complex fields such as mathematics, computer science, physics, and biology as well as anthropology, economics, philosophy, and psychology takes time and, importantly, seasoning. There is no app for that.
Good research may take years, as hypotheses are formed and tested, and new insights gained. Failure is fundamental to progress – something that does not sit well with the popular narrative but is intrinsic to the scientific method. One research proposal does not a capability make.
Unsurprisingly, these are understandings and capabilities that reward long-term thinking and investment. We should not be looking entirely to industry to fund this long, slow, deep research – that’s within the realm of government, which is better placed to bear the risks of such effort. As Mariana Mazzucato argues, such long-term investment in basic capability requires public, not private, financing.
Second, the outcome of deep R&D is not a linear progression to a commercial product or national capability. Despite the myth, it’s a messy process of trial and error, refinement, mixing and emergence.
Similarly, it is hard to point to a single product and draw a straight line back in time to a single R&D project. As Brian Arthur points out, emergent technologies result from the accumulation, interaction and recombination of often disparate sets of earlier technologies.
Jewish Institute For National Security Affairs
Further, the development of science and technology, and R&D, is iterative, and tends to obey the Matthew Effect: the more you do, the better you get and the more you will attract others who want to do the same. We need to build and grow capability, not simply fund projects.
Similarly, careers are not linear ‘pipelines’ – that’s an unhelpful metaphor. We need people with good technical depth who are able to bridge into other disciplines, which may be economics or fine arts. Interesting things happen when domains intersect, and diversity brings insights.
To build great science and technology, we need creative individuals who are able to see opportunities across a breadth of possibility.
Third, there are no single-point ‘silver bullets’. Research and development must be understood as an ecosystem. Good research, just like the non-linearity of technological development and progress, has multiple, interconnected dependencies over differing domains and time scales.
Security System Ppt
That means appreciating the value of the ‘adjacent possible’. There are countless examples of where a researcher or post-doc, pursuing one research question, originated a new insight or technique that generates value in a range of other applications.
That’s a strength of the successful US Defense Applied Research Projects Agency (DARPA). Yes, DARPA expects research it funds to apply at some point to national security and the military. But it funds a wide range of programs that may or may not have direct immediate applications, while training a broad range of skills. When you don’t know what likely outcomes are, what technologies and ideas will beget new technologies and ideas, the best strategy is to explore widely.
An ecosystem approach also means giving the smart, creative, technically-proficient people the support and infrastructure they need. Those supports are more than research assistants and students. They include connectors, who can see the inter-relationships across research silos, and enjoy access to sources of funding and entrepreneurs. It requires experienced managers—a competitive strength of Silicon Valley, incidentally – and a level of sophistication in the understanding of that ecosystem by politicians and bureaucrats.
A nation’s R&D effort is a leading indicator of how seriously a nation takes national security. It is a long-term investment into the nation’s ability to shape its own path in an increasingly contested, technologically-driven world.
Australia’s R&D expenditure is in decline. At 1.88 per cent of GDP in 2015-16, it is well below that of the OECD (2.55 per cent, 2015), East Asian nations (2.46 per cent, 2015) and even the world average (2.23 per cent, 2015), based on World Bank data.
An approach that focuses government efforts on the immediate and an overly narrow definition of research will fail; it will weaken an already emaciated and diffused capability. Rebadging programs in a declining overall effort won’t pass muster, nor will simply constraining Chinese access to Australian R&D.
Instead, the government should be increasing its investment in R&D and in universities, and helping future talent to realise their aspirations in those fields, whether STEM or social science. It needs to understand the time needed to build research, the value of the adjacent possible, and be prepared to invest in building healthy ecosystems that nurture that future capability.