Four Evolving Trends in Security Research

At The CSIT's 2011 Belfast Cyber Summit, which is The UK's Center for Secure Information Technologies, international researches gathered to discus the evolving trends in cyber security research and development. The summit saw speakers from all around the globe, each giving their countries perspective on threats in the cyber landscape. The overall consensus of the summit was research and funding still needs to be directed in four major areas, these are:
  1. Adaptive Security Technologies: This group encompasses self-learning security solutions.  This means using heuristics to actively sense and learn about new threats.  Of course, these self aware systems typically have difficulties with anomalies, such as brand new attacks or small time user attacks, but are better geared for the larger environments that The Internet presents.  Heuristic methodologies should be able to detect, model and stop automated attacks that previously overwhelmed classic security controls.
  2. Protection of Smart Grid Utilities: This area is dedicated to enhancing our previously existing grid infrastructure with security controls and patches.  Recently, much research has been done in SCADA systems and viruses targeting such systems.  This puts the general public at a huge risk, as many of these systems are also part of critical infrastructure.  This research is vital to any nation's security, and we will certainly see an interesting evolution grid security in months to follow.
  3. Mobile Security:  Mobile security is another hot bed of research.  With the sheer amount of personal data that intersects at any smart phone, cell phones now become a rich target for exploitation.  There have been huge advances recently in mobile security on all fronts, and one should always be aware of their own mobile solution and the vulnerabilities they face.  This research greatly effects each end user, and is evolving faster than the mobile landscape itself.
  4. Multifaceted Security:  There is still a large gap when it comes to the human interpretation of current cyber security threats.  This topic includes large sums of research from the community, especially in terms of international legislation, policy, economics, groups, and individual rights.  There are many factors that motivate individuals nowadays, such as hacktivism, profit, and /or notoriety.  Researchers must combine their efforts with law makers, software developer , and large user groups, in an attempt to both protect end users' rights and corporate assets.
I highly encourage you to check out the original pdf at:
http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf