In This Issue
Fall Issue of The Bridge on Cybersecurity
September 19, 2019 Volume 49 Issue 3
This issue features selected papers intended to provide a basis for understanding the evolving nature of cyber-security threats, for learning from past incidents and best practices, and for anticipating the engineering challenges in an increasingly connected world.
Articles In This Issue
  • Thursday, September 19, 2019
    AuthorRuth A. David and Robert F. Sproull

    In today’s increasingly connected and interdependent world, cybersecurity is an issue that touches virtually every individual, organization, and institutional -entity—governmental and nongovernmental alike. According to ITSP Magazine, “There are three types of people in the world: ...

  • Thursday, September 19, 2019
    AuthorDavid D. Clark

    Better cybersecurity is an admirable aspiration. But aspirations, as such, are not actionable. Calling for better cybersecurity does not give any hint of what actions should be taken, and by whom, to improve the situation.

    The goal of this paper is to break the challenge of improved cybersecurity ...

  • Thursday, September 19, 2019
    AuthorNicole Lang Beebe and Frederick R. Chang

    The insider threat problem is older than the cybersecurity problem itself and has similarly proven to be exceedingly resilient to solution. Organizations work hard to establish adequate defenses to combat external cyber risk, but the insider threat may actually be a greater concern.

    Redefining ...

  • Thursday, September 19, 2019
    AuthorJosephine Wolff

    One of the recurring themes in discussions of cybersecurity is how rapidly the landscape of threats is evolving and how difficult it is for defenders to keep pace with ever-changing attack vectors and vulnerabilities. While it is true that security threats and controls change over time as ...

  • Thursday, September 19, 2019
    AuthorChristian Hamer

    Universities tend to be complicated organizations, diverse and decentralized, with a number of business units. The analogy of a “miniature city” is appropriate: Universities have housing, dining, retail operations, hospitals, power and other utility plants, and even police forces with ...

  • Thursday, September 19, 2019
    AuthorFred B. Schneider and Lynette I. Millett

     

    Computing systems are increasingly subject to attack in support of criminal activities as well as nation-state espionage, sabotage, and now information-influence campaigns. New technical developments are providing ingredients for better defenses, but there is still much work to be done. ...

  • Thursday, September 19, 2019
    AuthorJohn A. Stankovic and Jack Davidson

    Computer security problems have evolved over the last 50 years from a minor concern to major operational risks. Every day new devices are added to the Internet of Things (IoT). Conservative projections have 50 billion devices on the internet by 2020, but—with autonomous vehicles, smart ...

  • Thursday, September 19, 2019
    AuthorMashrur Chowdhury, Mhafuzul Islam, and Zadid Khan

    The transportation system is rapidly evolving with new connected and automated vehicle (CAV) technologies that integrate CAVs with other vehicles and roadside infrastructure in a cyberphysical system (CPS). Through connectivity, CAVs affect their environments and vice versa, increasing the size of ...

  • Thursday, September 19, 2019
    AuthorThomas A. Longstaff and Noelle K. Allon

    Computer science and engineering—which includes computer, computational, communication, and information science and engineering—is the branch of engineering that concerns itself with cybersecurity. However, for the safe and secure development and deployment of engineering systems, ...

  • Thursday, September 19, 2019
    AuthorC. Dianne Martin

    Codes of ethics for computer professionals have been evolving over the past four decades. The profession of computer science has matured to the extent that well-developed ethical principles have emerged to guide the general practice of the discipline.

    Background

    Since the first code of computer ...

  • Thursday, September 19, 2019
    AuthorJonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey

     

    Human trafficking (HT) is a horrific and seemingly intractable problem that is typically construed as falling beyond the purview of engineers.

    This paper argues that engineering systems analysis can produce important insights concerning HT operations and ways to reduce its frequency. Three ...

  • Thursday, September 19, 2019
    AuthorDeanne Bell

    RON LATANISION (RML): Deanne, thank you for joining us today. We’re very happy to have this opportunity to talk with you. Let’s begin right at the beginning. You got your undergraduate degree in mechanical engineering from Washington University in 2002. How did you become interested in ...