The idea of a “self learning” cyber security technologies isn’t something brand new (as evidenced by this article from 2011), but it is something that continues to prove itself as a necessity to address the ever changing threats which face businesses and individuals which come from the internet and beyond. A report from the 2011 Belfast Cyber Summit represents, as described in this article from phys.org, a global collective strategy from the world’s leading research institutes.
The article points to four themes in particular which must be addressed to face the challenges of the future:
- Adaptive cyber security technologies – research objectives in this area will include the development of self-learning cyber security technologies; self-awareness in cyber systems; the establishment of feedback in cyber systems to learn from cyber attacks.
- Protection of smart utility grids – research aims in this field will comprise: smart grid requirements gathering methodology; protection technologies for smart grid components; secure technologies for smart grid communications; smart grid and home area network integration that provides privacy and security of collected information; development of smart grid standards.
- Security of the mobile platform and applications – research in this space will target not only malicious applications but also mobile cyber security problems introduced by the configuration and use of mobile networks, including network availability, mobile web browsers and caller authentication.
- Multi-faceted approach to cyber security research – research will take into account social behavioural norms and societal desires in cyber space, cyber space policies, the impact of cyber and other legislation and the economics of cyber space and cyber security.
While certainly not definitive, the ideas brought forth from the summit pointed to many of the initiatives we see today: a multi-pronged approach, higher security in applications, and a smart grid to determine where threats are coming from and how to rapidly mitigate them.
Read the full article here: http://phys.org/news/2011-09-newly-published-cyber-key-priorities.html