Plan X: DARPA's Revolutionary Cyber Security Platform - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Cybersecurity
News
4/21/2015
07:00 AM
Joe Stanganelli
Joe Stanganelli
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Plan X: DARPA's Revolutionary Cyber Security Platform

DARPA's Plan X aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
Previous
1 of 6
Next

(Image: DARPA)
(Image: DARPA)

Back on February 26, much of the Internet was burying itself in the thoroughly predictable pomp and circumstance of the FCC's live-streamed net neutrality vote. On the same day, another event -- quieter and less political -- related to the future of the Internet was live-streamed from Washington courtesy of the Christian Science Monitor.

The event, titled The Future of Cybersecurity Innovation, featured nearly two hours of talks on the best cyber security practices, both present and future. Headlining the event was the first public unveiling of Plan X -- a network security platform at least three years in the making, courtesy of the Defense Advanced Research Projects Agency (DARPA). Originally announced in May 2012 (and later outlined more thoroughly in October of that year), Plan X is the first DARPA project of its kind -- developed to enable Department of Defense (DoD) cyber missions in real-time. DARPA anticipates that some form of the program will eventually be made publicly available for both businesses and consumers. DARPA has already contributed portions of it to open source projects.

During the February event, program manager Frank Pound participated in a live interview. He demonstrated the third and current prototype of Plan X (completed in October) on a large touch-screen monitor and answered audience questions on its real-world future applications. Pound reports that the fourth Plan X prototype is due this month. Those applications included actual cyber warfare deployment in a realistic scenario, as well as everyday network management in both the home and the office.

Although Plan X has been described as in its nascent stages, it is already showing tremendous promise for the future of information security, the future of cyber defense, and the future of the Internet by making cyber security more accessible. The following slides offer an overview of some of the neatest accessibility features of DARPA's Plan X as publicly outlined thus far.

These features, in turn, have stimulated our curiosity at InformationWeek, and we want to know what you think. What features of Plan X do you see potentially helping your organization's network security efforts? Can you see yourself managing an offshoot to keep track of the security of your own home network? Does the potential for network immersion that Plan X offers excite you or frighten you? Let us know your thoughts and reactions in the comments section below.

Joe Stanganelli is founder and principal of Beacon Hill Law, a Boston-based general practice law firm. His expertise on legal topics has been sought for several major publications, including US News and World Report and Personal Real Estate Investor Magazine. Joe is also ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
4/27/2015 | 8:54:02 AM
Re: Dispelling the Myth of Difficulty is key
Mike,

I knew I could always count on you to say something so basic,so true ,so Simply!

Simply Brilliant,Brilliant stuff!

What I would also like to add here is that with the Increasing amount of automation happening today in the IT-Security stuff;you don't really need Hard-core Super-trained Security Ninjas to run IT Security Shops enterprise-wide.

Sure its always good to have extra skills on board but the Companies/Organizations which provide most of these Security Tools have very-very good Customer Service Reps(who are all very well-versed in the art of Security today).

So if a Company has employees who may/may not be at cutting-edge its perfectly allright today;they can still manage comfortably.

On the other side,I also buy the Assertion(not entirely though) that a large part of the increased Security Awareness/Fear is just the result of more Connectivity (and/or media scaremongering) on part of Security Providers???

Good Post!

Regards

Ashish.
macker490
50%
50%
macker490,
User Rank: Strategist
4/21/2015 | 8:30:30 AM
Dispelling the Myth of Difficulty is key
I read way too many essays which claim encryption, or authentication -- is too complex for ordinary people

eau contraire!

I could teach most folks familiar with eMail to use PGP or GnuPG via Thunderbird's plug-in ENIGMAIL is an hour or so.  

the take-away from this note is simple:   as soon as we have better packaging for this technology ( PGP; GnuPG ) everyday computer users will be able to make advantage of it in most everything they do

PGP/GnuPG provides real authentication, integrity, and security: when you need it.

authentication : proving your signature on a digital document

intergity : proving the validity of a digital document

security : restricting the content of a digital document to authorized personel

 
Commentary
Enterprise Guide to Digital Transformation
Cathleen Gagne, Managing Editor, InformationWeek,  8/13/2019
Slideshows
IT Careers: How to Get a Job as a Site Reliability Engineer
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/31/2019
Commentary
AI Ethics Guidelines Every CIO Should Read
Guest Commentary, Guest Commentary,  8/7/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Data Science and AI in the Fast Lane
This IT Trend Report will help you gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success. Read the report today!
Slideshows
Flash Poll