Cyber (computing and communication) technologies underpin every facet of the U.S. economy, are nearly ubiquitous in daily life, and critical for national security. Cyber and cyber-enabled systems are rapidly growing in both complexity and scale, and—despite significant progress—are outpacing the capacity to keep them safe, secure, and resilient to disruptions.1 Cyber resilience challenges arise from unintentional technical and operational flaws as well as deliberate misuse. Many resist solutions to these challenges because of their technical difficulty, while others resist them owing to intertwined technical, human, business, and policy factors.
Some cyber problems are well defined, and progress toward their solution would significantly improve the safety and resiliency of cyber and cyber-enabled systems. This set of problems, called “cyber hard problems” in this report, stands in contrast to the many other computing and communication problems whose solutions would be beneficial in some way but would not improve resiliency in a meaningful way (e.g., new encryption algorithms), as well as problems whose solutions could have a transformative impact on cyber resiliency but lie outside of the cyber realm (e.g., the geopolitics driving ransomware attacks).
Cyber hard problems are frequently caused or sustained by human or societal factors and misaligned incentives. These in turn are exacerbated by the continuing tremendous growth in the production and use of cyber technologies and their resulting near ubiquity in societally important systems and institutions.
Another contributor to hard problems is the difficulty of measuring cyber resilience or how a particular capability or solution improves it. The resulting failure to establish
___________________
1 The terms cyber, cyber resiliency, and cyber-enabled are given more precise definitions in the Glossary (see Appendix D).
incentives hinders the prioritization of investment, research, development, and deployment of new capabilities—often leading to systems that are designed, implemented, deployed, and operated with insufficient cyber resilience. Additionally, the rapid pace of technological advancement and societal adoption of cyber technologies means that policy development often greatly lags behind technology developments.
Similar considerations have prompted several past efforts to develop a cyber hard problems list. In developing a new list, the committee explored critical areas and dimensions of the cyber ecosystem, such as technical development, operations, practices, human–machine interactions, policies and regulations, and incentives.
The now-dormant InfoSec Research Council was established by federal agencies sponsoring cybersecurity research. It sponsored studies published in 1995 and 20052 that each produced a list of cyber hard problems largely focused on unsolved technical and research problems for which progress toward solutions would have a significant impact on the practical security of cyber systems.
Many of the hard problems listed in those reports remain unsolved, either in theory or practice. In the subsequent two decades, new cyber hard problems have emerged because of dramatic changes affecting cyber resiliency. The most salient factors are as follows:
___________________
2 The 1995 InfoSec Research Council (IRC) Hard Problems is not easily found, but the problems themselves are available in Appendix A, “Retrospective on the Original Hard Problem List,” of the 2005 Hard Problems List report. See IRC, 2005, Hard Problem List, November, https://www.nitrd.gov/documents/cybersecurity/documents/IRC_Hard_Problem_List.pdf.
Compounding these challenges are persistent market and policy shortcomings that have failed to incentivize responses that are adequate for meeting society’s needs. Thus, a broader analytical lens is needed that acknowledges both the technical and systemic nature of cyber vulnerabilities and accounts for the institutional barriers that impede robust resilience measures.
Cyber hard problems can be approached from the following two perspectives: (1) the key attributes that, if satisfactorily addressed, would enhance cybersecurity and resiliency of cyber systems and (2) the key considerations for developing cyber systems that, if satisfactory progress is made, would enhance the resilience of the resulting system. Another way to view these two perspectives is to see the first as hard problems from the perspective of “consumers” (adopters and users), and the second as hard problems from the perspective of “producers” (vendors and developers). The consumer list is what this report calls the new cyber hard problems list, while the producer list reflects the perspective of those responsible for building cyber and cyber-enabled systems. The two lists overlap significantly, but the different perspectives are nonetheless valuable in understanding the structure of the problems.
“Cybersecurity” refers to the customary security dimensions of confidentiality, integrity, and availability of information in accordance with explicit security policies, along with several other key attributes. A secure system (1) does not interfere with
the correct operation of “adjacent systems” in an organization or on a network; 3 (2) operates with ease of use and appropriate transparency for human operators and users; (3) is resilient to failures both within the system and on the part of the operators and users, repairing itself or gracefully degrading rather than failing entirely; and (4) is resistant to attacks from knowledgeable adversaries, but when compromises do occur, the affected parts of the system should minimally impair operation of the rest of the system.
This latter characteristic of resilience to failures and attacks—including avoiding cascading failures—is particularly important as systems scale up and become more highly interconnected. Achieving resilience can be challenging because adversaries may have more knowledge of the internals of a system than its own operators and users, who are bound by limitations on their organizational roles, confidentiality provisions of license agreements, and their abilities to collaborate that adversaries are free to ignore. Moreover, adversaries, in many circumstances, may have access to the communications infrastructure in the guise of legitimate operators and users, and indeed, as recently reported, at levels of access that go beyond even that of systems operators. The committee also considered impacts on individuals and society though social media and similar channels as another facet of cyber resilience.
The following cyber hard problems (numbered CHP1–CHP10) identify the areas of focus identified as most significant and challenging by the committee, where advances in technology, practice, or policy would make a measurable difference.
___________________
3 This includes cascading failures, for example.
As discussed earlier, the committee also considered the challenges preventing the producers of cyber systems from solving the problems that consumers see. These include the technical, policy, and operational principles and procedures that the producer has to consider when building resilient cyber systems.
Key challenges for the producer include the following:
* * *
Together, the cyber hard problems list and the list of producer challenges provide a useful view of the range of issues associated with cyber resiliency. All stakeholders in the cyber ecosystem—including research funding agencies, computer technology companies, policy makers, and cybersecurity and other computing researchers—can contribute to making progress by reflecting on the driving factors and attacking the hard problems while considering the producer perspective.