Download PDF Fall Issue of The Bridge on Cybersecurity September 19, 2019 Volume 49 Issue 3 This issue features selected papers intended to provide a basis for understanding the evolving nature of cyber-security threats, for learning from past incidents and best practices, and for anticipating the engineering challenges in an increasingly connected world. Articles In This Issue Editors' Note: Cybersecurity—A Growing Challenge for Engineers and Operators Thursday, September 19, 2019 AuthorRuth A. David and Robert F. Sproull In today’s increasingly connected and interdependent world, cybersecurity is an issue that touches virtually every individual, organization, and institutional -entity—governmental and nongovernmental alike. According to ITSP Magazine, “There are three types of people in the world: ... A Framework to Understand Cybersecurity Thursday, September 19, 2019 AuthorDavid D. Clark Better cybersecurity is an admirable aspiration. But aspirations, as such, are not actionable. Calling for better cybersecurity does not give any hint of what actions should be taken, and by whom, to improve the situation. The goal of this paper is to break the challenge of improved cybersecurity ... Cybersecurity: Revisiting the Definition of Insider Threat Thursday, September 19, 2019 AuthorNicole Lang Beebe and Frederick R. Chang The insider threat problem is older than the cybersecurity problem itself and has similarly proven to be exceedingly resilient to solution. Organizations work hard to establish adequate defenses to combat external cyber risk, but the insider threat may actually be a greater concern. Redefining ... Learning from Cybersecurity Breaches: The Trouble with Recommended Best Practices Thursday, September 19, 2019 AuthorJosephine Wolff One of the recurring themes in discussions of cybersecurity is how rapidly the landscape of threats is evolving and how difficult it is for defenders to keep pace with ever-changing attack vectors and vulnerabilities. While it is true that security threats and controls change over time as ... Cybersecurity in Higher Education: One University's Approach Thursday, September 19, 2019 AuthorChristian Hamer Universities tend to be complicated organizations, diverse and decentralized, with a number of business units. The analogy of a “miniature city” is appropriate: Universities have housing, dining, retail operations, hospitals, power and other utility plants, and even police forces with ... Policy Dimensions of Cybersecurity Engineering Challenges Thursday, September 19, 2019 AuthorFred B. Schneider and Lynette I. Millett Computing systems are increasingly subject to attack in support of criminal activities as well as nation-state espionage, sabotage, and now information-influence campaigns. New technical developments are providing ingredients for better defenses, but there is still much work to be done. ... Raising Awareness of Security Challenges for the Internet of Trillions of Things Thursday, September 19, 2019 AuthorJohn A. Stankovic and Jack Davidson Computer security problems have evolved over the last 50 years from a minor concern to major operational risks. Every day new devices are added to the Internet of Things (IoT). Conservative projections have 50 billion devices on the internet by 2020, but—with autonomous vehicles, smart ... Security of Connected and Automated Vehicles Thursday, September 19, 2019 AuthorMashrur Chowdhury, Mhafuzul Islam, and Zadid Khan The transportation system is rapidly evolving with new connected and automated vehicle (CAV) technologies that integrate CAVs with other vehicles and roadside infrastructure in a cyberphysical system (CPS). Through connectivity, CAVs affect their environments and vice versa, increasing the size of ... What Every Engineer Should Know about Cybersecurity Thursday, September 19, 2019 AuthorThomas A. Longstaff and Noelle K. Allon Computer science and engineering—which includes computer, computational, communication, and information science and engineering—is the branch of engineering that concerns itself with cybersecurity. However, for the safe and secure development and deployment of engineering systems, ... EES Perspective When White Hats Wear Black Hats: The Ethics of Cybersecurity Thursday, September 19, 2019 AuthorC. Dianne Martin Codes of ethics for computer professionals have been evolving over the past four decades. The profession of computer science has matured to the extent that well-developed ethical principles have emerged to guide the general practice of the discipline. Background Since the first code of computer ... A Call to the Engineering Community to Address Human Trafficking Thursday, September 19, 2019 AuthorJonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey Human trafficking (HT) is a horrific and seemingly intractable problem that is typically construed as falling beyond the purview of engineers. This paper argues that engineering systems analysis can produce important insights concerning HT operations and ways to reduce its frequency. Three ... An Interview with . . . Deanne Bell, TV Host and Founder-CEO of Future Engineers Thursday, September 19, 2019 AuthorDeanne Bell RON LATANISION (RML): Deanne, thank you for joining us today. We’re very happy to have this opportunity to talk with you. Let’s begin right at the beginning. You got your undergraduate degree in mechanical engineering from Washington University in 2002. How did you become interested in ...
Editors' Note: Cybersecurity—A Growing Challenge for Engineers and Operators Thursday, September 19, 2019 AuthorRuth A. David and Robert F. Sproull In today’s increasingly connected and interdependent world, cybersecurity is an issue that touches virtually every individual, organization, and institutional -entity—governmental and nongovernmental alike. According to ITSP Magazine, “There are three types of people in the world: ...
A Framework to Understand Cybersecurity Thursday, September 19, 2019 AuthorDavid D. Clark Better cybersecurity is an admirable aspiration. But aspirations, as such, are not actionable. Calling for better cybersecurity does not give any hint of what actions should be taken, and by whom, to improve the situation. The goal of this paper is to break the challenge of improved cybersecurity ...
Cybersecurity: Revisiting the Definition of Insider Threat Thursday, September 19, 2019 AuthorNicole Lang Beebe and Frederick R. Chang The insider threat problem is older than the cybersecurity problem itself and has similarly proven to be exceedingly resilient to solution. Organizations work hard to establish adequate defenses to combat external cyber risk, but the insider threat may actually be a greater concern. Redefining ...
Learning from Cybersecurity Breaches: The Trouble with Recommended Best Practices Thursday, September 19, 2019 AuthorJosephine Wolff One of the recurring themes in discussions of cybersecurity is how rapidly the landscape of threats is evolving and how difficult it is for defenders to keep pace with ever-changing attack vectors and vulnerabilities. While it is true that security threats and controls change over time as ...
Cybersecurity in Higher Education: One University's Approach Thursday, September 19, 2019 AuthorChristian Hamer Universities tend to be complicated organizations, diverse and decentralized, with a number of business units. The analogy of a “miniature city” is appropriate: Universities have housing, dining, retail operations, hospitals, power and other utility plants, and even police forces with ...
Policy Dimensions of Cybersecurity Engineering Challenges Thursday, September 19, 2019 AuthorFred B. Schneider and Lynette I. Millett Computing systems are increasingly subject to attack in support of criminal activities as well as nation-state espionage, sabotage, and now information-influence campaigns. New technical developments are providing ingredients for better defenses, but there is still much work to be done. ...
Raising Awareness of Security Challenges for the Internet of Trillions of Things Thursday, September 19, 2019 AuthorJohn A. Stankovic and Jack Davidson Computer security problems have evolved over the last 50 years from a minor concern to major operational risks. Every day new devices are added to the Internet of Things (IoT). Conservative projections have 50 billion devices on the internet by 2020, but—with autonomous vehicles, smart ...
Security of Connected and Automated Vehicles Thursday, September 19, 2019 AuthorMashrur Chowdhury, Mhafuzul Islam, and Zadid Khan The transportation system is rapidly evolving with new connected and automated vehicle (CAV) technologies that integrate CAVs with other vehicles and roadside infrastructure in a cyberphysical system (CPS). Through connectivity, CAVs affect their environments and vice versa, increasing the size of ...
What Every Engineer Should Know about Cybersecurity Thursday, September 19, 2019 AuthorThomas A. Longstaff and Noelle K. Allon Computer science and engineering—which includes computer, computational, communication, and information science and engineering—is the branch of engineering that concerns itself with cybersecurity. However, for the safe and secure development and deployment of engineering systems, ...
EES Perspective When White Hats Wear Black Hats: The Ethics of Cybersecurity Thursday, September 19, 2019 AuthorC. Dianne Martin Codes of ethics for computer professionals have been evolving over the past four decades. The profession of computer science has matured to the extent that well-developed ethical principles have emerged to guide the general practice of the discipline. Background Since the first code of computer ...
A Call to the Engineering Community to Address Human Trafficking Thursday, September 19, 2019 AuthorJonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey Human trafficking (HT) is a horrific and seemingly intractable problem that is typically construed as falling beyond the purview of engineers. This paper argues that engineering systems analysis can produce important insights concerning HT operations and ways to reduce its frequency. Three ...
An Interview with . . . Deanne Bell, TV Host and Founder-CEO of Future Engineers Thursday, September 19, 2019 AuthorDeanne Bell RON LATANISION (RML): Deanne, thank you for joining us today. We’re very happy to have this opportunity to talk with you. Let’s begin right at the beginning. You got your undergraduate degree in mechanical engineering from Washington University in 2002. How did you become interested in ...