Monday, August 8, 2011

The Science of Cyber Security

National Science Foundation (08/04/11) Marlene Cimons The University of California, Berkeley's Team for Research in Ubiquitous Secure Technology (TRUST) is developing cybersecurity science and technology designed to change how organizations design, build, and operate trustworthy information systems. One of TRUST's long-term goals is to build a science base that will lead to new cybersecurity defense systems. "We believe what is missing is the science of cybersecurity--a science base, like the kind taught in medical schools, so as to enable doctors to treat and help patients," says Berkeley's Shankar Sastry. "We want the legacy of TRUST to be the start of this science base, upon which an inherent defense system can be built that will operate almost like the body's in the event of an attack." TRUST's research partners include Carnegie Mellon, Cornell, San Jose State, Stanford, and Vanderbilt universities, as well as Intel, Cisco Systems, IBM, Symantec, and Qualcomm. TRUST wants to improve anti-identity theft systems and technology that secures sensitive documents such as medical records. For example, TRUST is working with Vanderbilt's medical school on a pilot project to research privacy issues involved with medical and billing information. TRUST also is developing a cybersecurity education program.
View Full Article


  1. Digital assaults are a propelling danger to affiliations, delegates, and purchasers. They may be proposed to get to or wreck sensitive data or shakedown money. They can, accordingly, pulverize associations and mischief people's cash related and individual lives. A debt of gratitude is in order for sharing, for example, valuable data, Its assistance me to comprehend about managed cybersecurity services. As a matter of fact, it incorporates writes fundamentally the same as oversaw cybersecurity administrations. Its likewise give you great data about Cybersecurity, distributed storage, cloud arrangements.

  2. Nice article, which you have shared here about the Cyber Security. Your article is very informative and I liked your way to express your views in this post. Thanks for sharing this article here. CYBER SECURITY Providers Brooklyn


The Open Source Web Hosting company