- Carnegie Mellon University
- Florida Atlantic University
- George Mason University
- Georgia Institute of Technology
- University of Maryland
- Massachusetts Institute of Technology
- Purdue University
- Rochester Institute of Technology
- UMass Amherst
- University of Washington
The Purdue computer science professor, who focuses on cyber security, has a computer whose operating system and software he generally doesn’t bother to update, even though he sometimes uses it to access sensitive files. That’s because the computer isn’t connected to the internet, which is generally the source of most malware.
When Kelley Misata was selecting research for her Ph.D dissertation at Purdue University Center for Education and Research in Information Assurance and Security (CERIAS), she looked at ways to help organizations working with victims of violence. What she discovered is that the first area they needed help with was base-lining and assessing their cybersecurity readiness. As it turned out, this was not only a crucial area of concern but also a research topic that hadn’t yet been explored.
Purdue alumnus, Saumil Shah (MS, 1998), shares his experiences of 17 years as an infosec trainer.
“Online voting sounds appealing because many people have access to the internet,” said Spafford. “But one problem with it is that we can’t trust it.”
Spafford cites programming as one of the main issues.
In today’s digital age, we all have what’s called a digital footprint — information in the cyber world about who we are. It includes where we live, who our relatives are, where we work, what we earn, what we buy and it goes on and on.
“All that information is available and it’s out there permanently,” said Eugene Spafford, a computer sciences professor at Purdue University and executive director of the Center for Education and Research in Information Assurance and Security. “Once it gets out, there’s really no way to call it back.”