• About
  • Advertise
  • Careers
  • Contact
  • About
Sunday, January 18, 2026
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

DARPA explores new computer architectures to fix security between systems

in Tech
DARPA explores new computer architectures to fix security between systems
0
SHARES
14
VIEWS
Share on FacebookShare on Twitter

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided.

Air-gapping is the common practice of physically isolating data-storing computers from other systems, computers and networks so they theoretically can’t be compromised because there is nothing connecting the machines.

However, many say air-gapping is no longer practical, as the cloud and internet take a hold of massive swaths of data and communications.

“Keeping a system completely disconnected from all means of information transfer is an unrealistic security tactic,” says Defense Advanced Research Projects Agency (DARPA) on its website, announcing an initiative to develop completely new hardware and software that will allow defense communications to take place securely among myriad existing systems, networks and security protocols.

The Guaranteed Architecture for Physical Security (GAPS) program it is introducing will be split into three formal areas: hardware, software, and validation against Department of Defense (DoD) systems. A fourth realm is also promised, and that’s the commercialization of the elements:

“Commercializing the resulting technologies is also an objective,” the publicly funded DARPA federal agency says. The GAPS program should “create safer commercial systems that could be used for preserving proprietary information and protecting consumer privacy.”

The GAPS program should “create safer commercial systems that could be used for preserving proprietary information and protecting consumer privacy.”

Commercializing something like a defense security architecture — the objective being to secure data as it moves between disparate systems — could ultimately help commerce in a similar way to how the government has assisted the internet by allowing a military-owned, watered-down GPS to be used by all. Getting funding also becomes easier.

“Modern computing systems must be able to communicate with other systems,” DARPA says of its plans. That includes “those with different security requirements.” It’s saying cloud systems and the internet are here, aren’t going away, and need to be dealt with, in other words.

The problem with air-gapping

Air-gapping does work. The problem with it, though, is it’s not only hard to implement and enforce (workers have gotten used to networks and cloud), but it’s expensive. Installing breaks between systems not only affects working collaborations, but it’s hard to setup due to overall complexity. And it’s equally difficult to administer: You can’t just send patches across the network — there isn’t one.

“Interfaces to such air-gapped systems are typically added in after the fact and are exceedingly complex, placing undue burden on systems operators as they implement or manage them,” DARPA explains.

A better solution, then, in today’s environment is to accept that users need or want to share data and to figure out how to keep the important bits more private, particularly as the data crosses networks and systems, with all having varying levels of, and types of, security implementations and ownership.

The GAPS thrust will be in isolating the sensitive “high-risk” transactions and providing what the group calls “physically provable guarantees” or assurances. A new cross-network architecture, tracking, and data security will be developed that creates “protections that can be physically enforced at system runtime.”

How they intend to do that is still to be decided. Radical forms of VPNs — an encrypted pipe through the internet would be today’s attempted solution. Whichever method they choose will be part of a $1.5 billion, five-year investment in government and defense electronics systems. And enterprise and the consumer may benefit.

“As cloud systems proliferate, most people still have some information that they want to physically track, not just entrust to the ether,” says Walter Weiss, DARPA program manager, in the release.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Best WordPress Themes Free Download
Free Download WordPress Themes
Premium WordPress Themes Download
Download Nulled WordPress Themes
udemy paid course free download
download huawei firmware
Free Download WordPress Themes
udemy free download
Tags: Related: Network Security Networking Security
ADVERTISEMENT
Next Post
SGI tech lives on in the form of a French AI-focused supercomputer

SGI tech lives on in the form of a French AI-focused supercomputer

Recommended

Nvidia, after $7B Mellanox hardware deal, grabs Cumulus for big network software play

Nvidia, after $7B Mellanox hardware deal, grabs Cumulus for big network software play

The silver lining in the Intel CEO drama

The silver lining in the Intel CEO drama

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In