Communication Technology Security: R&D, Funding, and Transfer

Verified

Added on  2019/09/23

|4
|1242
|121
Report
AI Summary
This report delves into the realm of communication technology security, emphasizing the crucial role of research and development in creating robust defenses against cyber threats. It explores the lifecycle of R&D, highlighting key funding sources such as private equity investors, corporations, and the federal government, with a focus on the significance of angel investors and state government initiatives in early-stage technology development. The report further examines technology transfer processes, particularly within the Department of Homeland Security (DHS) and the National Security Agency (NSA), detailing how developed technologies move from laboratories to the marketplace. It also touches upon the importance of cybersecurity for protecting intellectual property and the role of various agencies in ensuring information network security. The conclusion reinforces the need for continuous innovation and funding in the field of communication security to safeguard against evolving cyber threats.
Document Page
Introduction
A technology is human made artificial asset that supports the human being for which the
knowledge and behavior incorporated. Research and development is a process employed to
emerge new technology for better results and performances (Ramey, 2013). The communication
technology security is one of the advanced research and development area where the modern or
latest technological framework is required to protect the informational assets of an organization
or individual from the breaches and security risks in the cyberspace. The communication security
technology is regularly required to be upgraded to be more intelligent to prevent the cyber
security attacks with information and information system. The technology in this discipline is not
mature to protect all the sensitive and vital information. There is also regular occurrences of
cyber security breaches and disclosure of confidential and sensitive information alerts the
researchers to emerge the robust and effective technology in the field of data communication
security for cyber space.
R & D Lifecycle and Technology
Funding is basic requirement for the invention to innovation of any type of technology. In case
of the technology invention to innovation there are three major funding sources are available.
These three main sources of funding are private equity investors, corporations, and federal
government (Branscomb, & Auerswald, n.d.).
Angel investors provides most important sources for the early stage technology development
funding to research and development. This is mainly sources the funds for small technology
startups for the small firms and research and development wings.
State government provides the small fraction of funds of total early stage of the technology
development in the field of communication security. It also plays very crucial role to establish
the regional environment to bridge the gap between invention and innovation of the technology.
The local state government provides the partnership between the university and industry to
leverage the federal academic funds. It provides general and also targeted grants for funding for
the communication security technology. It also provides the technical educated workforce and
identities for the research and development of the technology from the colleges and universities.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Corporations spends the small portion of funding to the early stage of the funds to develop the
technology in the field of technology that offers the security with inbuilt technology. The overall
corporate funding for the early stage technology development is approx $13 billions per annum.
This is widely differs from industries and state government funding for research and
development spending. The software industries reuse its tools and technology to develop the
communication security to expand the functional aspects to develop such technology.
Technology Transfer
A process used to apply and exploit the technology of developed knowledge from one place to
other place to serve the purpose of the technology is termed as technology transfer. It is
historically associated with the federal activities and also not restricted for only the government
and its subsidiaries ("Technology Transfer Program | Homeland Security", n.d.). The most
common form of technology transfer takes place between the federal laboratories and non federal
organizations like private industries, academia and state to local governments.
There is a technology transfer program for commercialization of developed knowledge and
innovated technology by the department of homeland security of federal government. The main
objective of DHS (Department of Homeland Security) is to serve the focal point for the
department on the policy of technology transfer. DHS manages the mechanisms of technology
transfers, exchanges the technology with industries, states, local governments, academia and
other federal agencies. DHS also provides the help and partnership for the development of
communication security technology and other technologies.
A cyber security division (CSD) research and development plays vital role in the transfer of
technology from laboratories to marketplace. There are so many bodies such as chief information
officer of DHS, Federal Law Enforcement training center, National Cyber Security Division of
Federal Government and other regulatory bodies in the field of communication security tests the
operation capabilities of the development technology for the cyber security. The experiment, test
and evaluation along with the operational deployment makes the facilitation of the transfer of
technology. The vendor feedbacks are taken to refine he requirements and deploy to make more
secure and robust to provide more security in cyberspace.
Document Page
TTP (Technology Transfer Program) of NSA (National Security Agency) for the technologies
developed by NSA to industries, academia and research organizations provides the benefits of
economy and mission of the NSA ("Research", 2016). It employs 5 steps processes to transfer
the technology from NSA laboratories to market Place. These steps are as follows.
Investment for the technology development
Create the revolutionary technologies by R&D by innovators
Development of innovative technology capable to commercialization
Provision for patenting guideline to the innovators and industry partnerships
Provision for licensing of technology to be further development for commercialization
The Federal Laboratory Consortium for Technology Transfer (FLC) gives the limited
information for felicitations of personal interaction between the federal researchers and
customers in the area of technology transfer. It gives spontaneous idea sharing to transfer the
technology by providing the limited information on the full range of technology transfer
opportunities. Its main theme in the technology transfer by limiting the information share
between the researchers and its technology developed and customers of the technology.
Cyber security is necessary for protecting intellectual property such as information containing
the knowledge for economy, infrastructure, public safety and national security ("cyber
maryland", n.d.). The protection of information network needs the strong vision and leadership.
Effective and secured flow of information is mandatory to serve the confidentiality of sensitive
and critical information. Maryland department of business and economic development to
inventory state capacity, resources and opportunities totally concerns about the cyber security.
Conclusion
Technology is considered a supportive framework for executing the targeted functions.
Information security is primary concerned area in the field of cyber security. The research and
development brings the technology to employ for the prevention of various security problems
occur with cyber system.
Document Page
The research and development laboratories require funds to innovate the new technology. There
are three main sources of the funds. Angel investors, state government and corporations provide
the funds to R&D laboratories.
References
Ramey, K. (2013). What Is Technology - Meaning of Technology and Its Use - Use of
Technology. Use of Technology. Retrieved 30 June 2017, from
http://www.useoftechnology.com/what-is-technology/
Branscomb, L., & Auerswald, P. Between Invention and Innovation. https://www.nist.gov.
Retrieved 30 June 2017, from http://www.atp.nist.gov/eao/gcr02-841/gcr02-841.pdf
Technology Transfer Program | Homeland Security. Dhs.gov. Retrieved 1 June 2017, from
http://www.dhs.gov/technology-transfer-program
Research. (2016). Nsa.gov. Retrieved 1 June 2017, from
https://www.nsa.gov/what-we-do/research/
cyber maryland. http://mdcao.usmd.edu. Retrieved 30 June 2017, from
http://mdcao.usmd.edu/Maryland%20Department%20of%20Economic%20Development
%20CyberReport.pdf
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]