Cybersecurity is a fundamental societal problem with extraordinary scope and dimensionality, including technical, human, business, and policy. The challenge is exacerbated by the difficulties of measurement. Without good ways to measure security, incentives are hard to frame, and so action becomes difficult to motivate, especially when there are benefits to expediency. For some of the previously identified cyber hard problems, there has been extensive technical progress. These levers are important and essential, and indeed there are strong reasons to expand and accelerate technical work. But transformational impact on many of the hard problems identified in this report requires, additionally, collaboration with stakeholders involved with business and policy.
Driving this is that security is an attribute of a cyber system within a context of operation. A cyber system includes hardware, software, services, and associated supply chains. It also includes how a system and its associated data interact with other systems. The context of operation includes the ways in which the system interacts with the world, including with human users and operators, as well as with other systems—and, importantly, with potential cyber adversaries who may seek access to confidential data, or ability to tamper with data, or disruption of operations. Examples of context of operation range from civil infrastructure operations and national security systems to consumer applications for financial services, health care, and online media.
The previous chapters have described pervasive difficulties in measuring security attributes, challenges that affect the ability to frame incentives for stakeholders, especially when counter incentives are present, such as cost and schedule (which also have the benefit of being easily measurable). Thus, making progress on assessments and related interventions is essential and valuable. Here are some elements of this broad challenge of framing and defining measurable security-related attributes.
In many areas, barriers of scale and usability are being successfully challenged to advance our capacity for direct and fully trustworthy judgments about particular security-related quality. These steps apply regardless of whether it is a national security system, a social media service, or a consumer-facing mobile app.
A particular challenge in both evaluation and operation is the capacity of sophisticated adversaries to gain access to systems and their supply chains in ways that may often afford them greater knowledge of the details of a system and its elements than operators, evaluators, and sometimes even developers (when there is opacity in the supply chain). Highly capable adversaries may synthesize both a more holistic and a more detailed knowledge about a system than its users, operators, evaluators, and even developers.1
___________________
1 Cybersecurity and Infrastructure Security Agency, 2025, “Closing the Software Understanding Gap,” January 16, https://www.cisa.gov/resources-tools/resources/closing-software-understanding-gap.
It is daunting that the cyber hard problems are complex and do not lend themselves to simple “magic bullet” solutions. Some say that cybersecurity is a marathon and not a sprint, but for many of the problems, the struggle will be ceaseless—as systems grow in complexity and ambition, and cyber adversaries grow in capability and motivation. Choices will have to be made about managing a portfolio of research to make progress on multiple fronts. There is no choice but to engage in the struggle, and with relentless vigor—since the capabilities gained from cyber systems are now essential to advancing health, education, communications, commerce, national security, scientific research, and information dissemination. Cyber systems enhance productivity and create new kinds of economic value—and there is no limit in sight in the scope and impact of what they can be doing in the future.
___________________
2 National Institute of Standards and Technology, 2024, “SP-800-63B—Authentication and Lifecycle Management,” Digital Identity Guidelines, August 28, https://pages.nist.gov/800-63-4/sp800-63b.html.
3 S. Komanduri, R. Shay, P.G. Kelley, M.L Mazurek, L. Bauer, N. Christin, L.F. Cranor, and S. Egelman, 2011, “Of Passwords and People: Measuring the Effect of Password-Composition Policies,” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2595–2604, https://www.ece.cmu.edu/~lbauer/papers/2011/chi2011-passwords.pdf.
4 P.G. Kelley, S. Komanduri, M.L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L.F. Cranor, and J. Lopez, 2012, “Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms,” 2012 IEEE Symposium on Security and Privacy 523–537, http://ieeexplore.ieee.org/iel5/6233637/6234400/06234434.pdf.
The cyber hard problems identified in this report can be used by various sectors and entities as reference for research and development (R&D) investments as well as incentives and policy actions.
This page intentionally left blank.