Defining 12 CSA Research Topics
Blog Article Published: 02/09/2024
CSA Research is created by the industry, for the industry. Subject matter experts from a wide array of backgrounds and experiences volunteer for our working groups. Each of these working groups focuses on a unique topic or aspect of cloud security, including AI, IoT, DevSecOps, and much more. Then, every month, research publications created by these working groups and reviewed by the industry are released on the CSA website, free for anyone to download and read.
In this article, we’ve defined 12 CSA research topics that you might not be familiar with. But remember - this is just a small sampling of the many domains that CSA covers. Make sure to check out the full list on our website.
A construct designed to package and run an application or its components running on a shared operating system. Application containers are isolated from other application containers and share the resources of the underlying operating system.
A software development approach and architectural style, consisting of basic elements that result from the architectural decomposition of an application’s components into loosely coupled patterns consisting of self-contained services that use a standard communications protocol and a set of well-defined APIs, independent of any vendor, product, or technology.
Computer systems simulating human intelligence, allowing them to perform tasks that used to have to be delegated to humans.
Short for development, security, and operations, this model automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery.
A consensus of replicated, shared, and synchronized digital data spread across multiple sites with no central administrator or centralized data storage. A peer-to-peer network and consensus algorithms are needed to ensure replication across nodes.
A distributed database that maintains a continuously-growing list of ordered records called blocks. Each block contains a timestamp and a link to a previous block. Once recorded, the data in a block cannot be altered retroactively.
Control systems often found in the industrial sectors, consisting of combinations of control components (e.g., electrical, mechanical) that act together to achieve an industrial objective (e.g., manufacturing, transportation). These systems incorporate digital and networked components to monitor and control the system.
The network of physical objects or equipment that are embedded with sensors, software, and other technologies that facilitate communication between devices and the cloud, as well as between the devices themselves.
The set of cryptographic schemes which will remain secure even in a world where quantum computers exist. This includes, but is not limited to, quantum cryptosystems such as QKD, algorithmic-based cryptosystems such as lattice-based cryptosystems, and symmetric key cryptosystems such as AES.
An execution model for the cloud that gives users/developers the ability to build and run applications and services without thinking about servers. Applications are built faster, launched only as needed, and the management of the infrastructure is no longer required.
A network security architecture that is implemented to provide security at Layers 1-7 of the OSI network stack. An SDP implementation hides assets and uses a single packet to establish trust via a separate control and data plane prior to allowing connections to hidden assets.
The use of innovative technologies, such as kiosks, website monitoring applications, mobile phone applications, wearable devices, and videoconferencing, to remotely connect health care providers to patients.
Trending This Week
#1 What are the Most Common Cloud Computing Service Delivery Models?
#2 How ChatGPT Can be Used in Cybersecurity
#3 Understanding Identity and Access Management IAM and Authorization Management
#4 Is PQC Broken Already? Implications of the Successful Break of a NIST Finalist
#5 101 Guide on Cloud Security Architecture for Enterprises
Sign up to receive CSA's latest blogs
This list receives 1-2 emails a month.