Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 107 results for Cyber RSS
01/01/1964

As part of an ARPA-funded experiment to find better ways for computer users to interact with computers, Douglas Engelbart of SRI—who would later work on the DARPA-sponsored ARPANET project, the Internet’s precursor—invented the computer mouse. The first mouse was carved out of wood and had just one button. Later incarnations such as this early Logitech® mouse led to the diversity of mice now on desktops around the world.

The mouse was an early example of many innovations that DARPA would help nurture into various components of the information technology landscape over the next five decades. In What Will Be (HarperCollins, 1997), author Michael Dertouzos credits DARPA with “… between a third and a half of all the major innovations in computer science and technology.”

01/01/2004
As part of the then three-year-old Quantum Information Science and Technology (QuIST) program, DARPA-funded researchers established the first so-called quantum key distribution network, a data-encryption framework for protecting a fiber-optic loop that connects facilities at Harvard University, Boston University, and the office of BBN Technologies in Cambridge, Mass.
01/22/2013
The Department of Defense (DoD) maintains one of the largest computer networks in the world. The network follows DoD personnel across the globe collecting, transferring and processing information in forms as diverse as data warehouses, in-the-field mobile devices and mission computers on board F-18’s. This network is also constantly changing in size and shape as new missions are undertaken and new technology is deployed. In military terms, that means the cyber terrain of the DoD network is constantly shifting.
02/12/2013
In the world of network cyber security, the weak link is often not the hardware or the software, but the user. Passwords are often easily guessed or possibly written down, leaving entire networks vulnerable to attack. Mobile devices containing sensitive information are often lost or stolen, leaving a password as the single layer of defense.
10/22/2013
What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security problems before they happen?