Help us improve by providing feedback or contacting help@jisc.ac.uk
Research Problem
Rationale / Hypothesis
Method
Results
Analysis
Interpretation
Real World Application

Closing the window between becoming aware of a potential technical exploit and action to plug the vulnerability reduces exposure to systems compromise. How can we best apply automation across government’s cyber security practices to ensure that potential exploits are addressed as quickly as possible? What are the risks and opportunities? What are the dependencies on other technology? Are there ethical or considerations in this area?

Publication type:Research Problem
Published:
Language:English
Licence:
CC BY 4.0
Peer Reviews: (0)
Red flags:

(0)

Actions
Download:
Sign in for more actions
Sections

This problem is a UK government area of research interest (ARI) that was originally posted at https://ari.org.uk/ by a UK government organisation to indicate that they are keen to see research related to this area.

Closing the window between becoming aware of a potential technical exploit and action to plug the vulnerability reduces exposure to systems compromise. How can we best apply automation across government’s cyber security practices to ensure that potential exploits are addressed as quickly as possible? What are the risks and opportunities? What are the dependencies on other technology? Are there ethical or considerations in this area?

The challenges have become more complex, intertwined and dangerous as the world has become more uncertain and volatile. Domestic, overseas and online threats are increasingly integrated as adversaries develop capabilities and exploit vulnerabilities across borders and between the cyber and physical worlds. We are seeking research to help Government adapt to a changing security environment based on research and evidence.

Contact details

Should you have questions relating to this ARI please contact co_aris@cabinetoffice.gov.uk. If your query relates to a specific question please state its title in your email.

Related UKRI Projects

Funders

No sources of funding have been specified for this Research Problem.

Conflict of interest

This Research Problem does not have any specified conflicts of interest.