![]() |
|||||
|
|
Home > Our Work > MITRE Research Program > Research Areas > | |||||||||||||||||||||||
Information Assurance
Overview In the area of information assurance, we investigate security vulnerabilities in distributed information systems; develop architectures, systems, and techniques for providing protection from attack and exploitation; and test and evaluate existing tools for system protection. Among our most prominent efforts in the field of cybersecurity are CVE, OVAL, and related initiatives, which are fast becoming information assurance standards. Together, they are part of a larger program known collectively as "Making Security Measurable." For example, the CVE (Common Vulnerabilities and Exposures) initiative is a list of more than 20,000 names industry experts have agreed to use in identifying vulnerabilities. CVE also is also being used as the basis for the National Vulnerability Database (NVD), developed by the U.S. National Institute of Standards and Technology. Our OVAL (Open Vulnerability and Assessment Language) project offers baseline standards that help determine the presence of vulnerabilities and configuration issues on computer systems. We are now leveraging the CVE and OVAL initiatives to help the Department of Defense (DoD) transform its enterprise incident and remediation management efforts. An associated effort, Common Malware Enumeration (CME), provides single, common identifiers to new virus threats and to the most prevalent emerging virus threats to reduce public confusion during malware incidents. CME is not an attempt to replace the vendor names used for viruses and other forms of malware, but rather to facilitate the adoption of a shared, neutral indexing capability for malware. Other examples of MITRE technical solutions that benefit industry, academia, government, and the public include our work in data fusion and data mining. This work involves intrusion detection, vulnerability management, asset security management, and malware response threat analysis. Our research on the ELICIT (Exploit Latent Information to Counter Insider Threats) shows promise for assisting organizations in detecting malicious insider activity before it causes significant damage. Related Information Articles and News
Technical Papers and Presentations
Websites
Page last updated: March 30, 2010 | Top of page |
Solutions That Make a Difference.® |
|
|