39
•Some specific topics in need of greater attention:
–Computer Authentication Methodologies
–Securing Fundamental Protocols
–Secure Software Engineering
–End-to-end System Security
–Monitoring and Detection
–Mitigation and Recovery Methodologies
–Cyberforensics and Technology to Enable Prosecution of Criminals
–Modeling and Testbeds for New Technologies
–Metrics, Benchmarks, and Best Practices
–Societal and Governance Issues