About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map
Our Work

Follow Us:

Visit MITRE on Facebook
Visit MITRE on Twitter
Visit MITRE on Linkedin
Visit MITRE on YouTube
View MITRE's RSS Feeds
View MITRE's Mobile Apps
Home > Our Work > MITRE Research Program > Research Areas >

Information Assurance

Information Assurance

Among our most prominent efforts in the field of cybersecurity are CVE, OVAL, and related initiatives, which are fast becoming information assurance standards.

Overview

In the area of information assurance, we investigate security vulnerabilities in distributed information systems; develop architectures, systems, and techniques for providing protection from attack and exploitation; and test and evaluate existing tools for system protection.

Among our most prominent efforts in the field of cybersecurity are CVE, OVAL, and related initiatives, which are fast becoming information assurance standards. Together, they are part of a larger program known collectively as "Making Security Measurable." For example, the CVE (Common Vulnerabilities and Exposures) initiative is a list of more than 20,000 names industry experts have agreed to use in identifying vulnerabilities. CVE also is also being used as the basis for the National Vulnerability Database (NVD), developed by the U.S. National Institute of Standards and Technology. Our OVAL (Open Vulnerability and Assessment Language) project offers baseline standards that help determine the presence of vulnerabilities and configuration issues on computer systems. We are now leveraging the CVE and OVAL initiatives to help the Department of Defense (DoD) transform its enterprise incident and remediation management efforts. An associated effort, Common Malware Enumeration (CME), provides single, common identifiers to new virus threats and to the most prevalent emerging virus threats to reduce public confusion during malware incidents. CME is not an attempt to replace the vendor names used for viruses and other forms of malware, but rather to facilitate the adoption of a shared, neutral indexing capability for malware.

Other examples of MITRE technical solutions that benefit industry, academia, government, and the public include our work in data fusion and data mining. This work involves intrusion detection, vulnerability management, asset security management, and malware response threat analysis. Our research on the ELICIT (Exploit Latent Information to Counter Insider Threats) shows promise for assisting organizations in detecting malicious insider activity before it causes significant damage.

Related Information

Articles and News

Technical Papers and Presentations

Websites

 

Page last updated: March 30, 2010   |   Top of page

Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development

 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us