ITMPI FLAT 005
Main Menu
Home / IT Best Practices / Cyber Security Report Identifies Key Research Priorities

Cyber Security Report Identifies Key Research Priorities

Self Learning Security

The idea of a “self learning” cyber security technologies isn’t something brand new (as evidenced by this article from 2011), but it is something that continues to prove itself as a necessity to address the ever changing threats which face businesses and individuals which come from the internet and beyond. A report from the 2011 Belfast Cyber Summit represents, as described in this article from phys.org, a global collective strategy from the world’s leading research institutes.

The article points to four themes in particular which must be addressed to face the challenges of the future:

  • Adaptive cyber security technologies – research objectives in this area will include the development of self-learning cyber security technologies; self-awareness in cyber systems; the establishment of feedback in cyber systems to learn from cyber attacks.
  • Protection of smart utility grids – research aims in this field will comprise: smart grid requirements gathering methodology; protection technologies for smart grid components; secure technologies for smart grid communications; smart grid and home area network integration that provides privacy and security of collected information; development of smart grid standards.
  • Security of the mobile platform and applications – research in this space will target not only malicious applications but also mobile cyber security problems introduced by the configuration and use of mobile networks, including network availability, mobile web browsers and caller authentication.
  • Multi-faceted approach to cyber security research – research will take into account social behavioural norms and societal desires in cyber space, cyber space policies, the impact of cyber and other legislation and the economics of cyber space and cyber security.


While certainly not definitive, the ideas brought forth from the summit pointed to many of the initiatives we see today: a multi-pronged approach, higher security in applications, and a smart grid to determine where threats are coming from and how to rapidly mitigate them.

Read the full article here: http://phys.org/news/2011-09-newly-published-cyber-key-priorities.html

About Matthew Kabik

Matthew Kabik is the former Editor of Computer Aid's Accelerating IT Success. He worked at Computer Aid, Inc. from 2008 to 2014 in the Harrisburg offices, where he was a copywriter, swordsman, social media consultant, and trainer before moving into editorial.

Check Also

10 Mistakes to Avoid When Troubleshooting IT Problems

Troubleshooting a problem can be a pretty tense time in the heat of the moment. …

Leave a Reply

Your email address will not be published. Required fields are marked *