When Kelley Misata was selecting research for her Ph.D dissertation at Purdue University Center for Education and Research in Information Assurance and Security (CERIAS), she looked at ways to help organizations working with victims of violence. What she discovered is that the first area they needed help with was base-lining and assessing their cybersecurity readiness. As it turned out, this was not only a crucial area of concern but also a research topic that hadn’t yet been explored.
Purdue alumnus, Saumil Shah (MS, 1998), shares his experiences of 17 years as an infosec trainer.
“Online voting sounds appealing because many people have access to the internet,” said Spafford. “But one problem with it is that we can’t trust it.”
Spafford cites programming as one of the main issues.
In today’s digital age, we all have what’s called a digital footprint — information in the cyber world about who we are. It includes where we live, who our relatives are, where we work, what we earn, what we buy and it goes on and on.
“All that information is available and it’s out there permanently,” said Eugene Spafford, a computer sciences professor at Purdue University and executive director of the Center for Education and Research in Information Assurance and Security. “Once it gets out, there’s really no way to call it back.”
Eugene Spafford, a computer-science professor at Purdue University and a member of the Naval Academy’s Cybersecurity Advisory Board, has been thinking about all the ways computers work (and fail) since 1979. “So many [technologies] are interconnected in ways we don’t see,” he says, “that a longer shutdown lasting weeks or months would be catastrophic.”
“This gets to the root of the issue,” said Purdue professor Gene Spafford, a cybersecurity expert who has also advised government agencies including the NSA, FBI and Air Force. “If the Chinese or the Iranian government under their legal system has all the legal requirements met to break the encryption or look at what is on a phone, they would have a same standing as the U.S. government does in this case to compel Apple to cooperate.”