Federal Plan for Cyber Security and Information Assurance Research and Development Federal Plan for Cyber Security and Information Assurance Research and Development CSIA _3c1f7e91-4cac-4c1c-81a6-020974dd7564 8da61438-13f0-4301-b4a0-d4c679e88749 fbff11f9-4d03-4196-8660-61590a70937f Cyber Attacks Support research, development, testing, and evaluation of cyber security and information assurance technologies aimed at preventing, protecting against, detecting, responding to, and recovering from cyber attacks that may have largescale consequences. _52fcb84e-ef77-498c-adc3-caf44ea83e00 1 e0a9a020-b500-47de-bdac-b5adfab7675d 48bd4769-d8e3-45eb-9577-c21eed5c297d 600b598f-a67c-4317-af2b-64d5ae9e5493 Critical Infrastructures Address cyber security and information assurance R&D needs that are unique to critical infrastructures. _8f60df71-c96a-46c9-8e6c-92bbbbf330c4 2 9c514c30-1e6f-431a-8faa-68a642a2bb5a 44e13670-7eea-47e4-adb9-380392e83f66 d7887966-b2ea-44bd-9fa1-3ae266956345 Communications Protocols Develop and accelerate the deployment of new communication protocols that better assure the security of information transmitted over networks. _adef264e-df79-4f50-8abd-a28ef79e1499 3 0bc1180c-67f5-4238-a8e0-c50ba6bd91b8 ecaf74aa-4ef2-4f65-b14d-424c1509aeab 600117e2-1d2e-468a-8ba1-bf4ea064e33e Experimental Environments Support the establishment of experimental environments such as testbeds that allow government, academic, and industry researchers to conduct a broad range of cyber security and information assurance development and assessment activities. _77992088-1ee7-4a03-99c0-51adfb9d9ae4 4 600f856c-0689-45f9-ab82-2cbf9399e095 b300a604-fc4c-458e-a616-6671c93c5398 ae6e81a9-a1e5-414c-95a7-2ff61619bb76 Decision Making Provide a foundation for the long-term goal of economically informed, risk-based cyber security and information assurance decision making. _351dabca-dd1c-4a63-bcea-23d33854276f 5 97501266-7c5e-4c5b-b02e-4888bd5b10b3 865cc2b4-4d0b-4025-ba49-f6b4b4eefee1 5d958f9a-65a5-4d5a-b5a3-1bb6ab490dde IT Concepts and Architectures Provide novel and next-generation secure IT concepts and architectures through long-term research. _4ba3466c-0a98-4440-b19f-272d0d621847 6 31da54af-9a4d-4512-b74a-8fa8dd4692ef 38669b9a-400a-48f4-b07e-93c6441463ae e51d1bfa-96ff-443f-aaf0-7f7513020465 Technology Transition and Diffusion Facilitate technology transition and diffusion of Federally funded R&D results into commercial products and services and private-sector use. _83251e83-3f1f-4128-ad4b-d400ca2e657c 7 6d85673f-42f3-49f7-9a51-988e7ff7f828 608952f7-aa60-4be9-9104-0937027f6313 720fbadb-7667-464f-ac95-6a6d8302433c 2006-04-01 2010-02-08 http://www.nitrd.gov/pubs/csia/csia_federal_plan.pdf Arthur Colman (www.drybridge.com) colman@drybridge.com Submit error.