Recent highly publicized data breaches, denial-of-service attacks, and software vulnerabilities have shown that every organization’s computers and data are at risk, no matter what its goals are or where it’s located. The incidents have led to a renewed focus on improving the security and privacy of computers and networks.
Hackers take advantage of weak spots to break into systems that aren’t properly patched or updated. Cybercriminals may download attachments containing malware or viruses or take advantage of computers that were disposed of without having been wiped clean. They can also gain access through vulnerabilities introduced by engineers and software designers. Often, software engineers lack the training and tools needed to mitigate and defend against security and privacy threats.
This report describes IEEE’s efforts to make developers more knowledgeable through its Cybersecurity Initiative, launched in January 2014 by the IEEE Computer Society and the IEEE Future Directions Committee, the organization’s R&D arm. The report also covers a proposed framework to better secure mobile devices as well as what must be done for cybersecurity to be taken more seriously as a profession.
Experts from CERT, Google, and others take on the most common security flaws
It’s a problem developers can no longer ignore
People have been breaking into systems electronically for more than a century
Career and Education
Better training and credentials are needed to help industry meet the growing demand
Many experts say there is reason to be concerned
Leaders in the field are here to answer your questions
Organizations are seeking professionals who can break into their systems to find security glitches
But first developers must buy in to the fact that their users are worried
Companies must beware of hackers from within
New research examines the analogy between installing security measures and how plants and insects fight off threats
Ignoring the security of systems that run power plants, hospitals, and factories can have far-reaching consequences
IEEE offers courses, podcasts, and publications to help combat computer-security threats
They cover a variety of applications, including authentication and data protection
Other topics include cloud security and mobile privacy
Greg Shannon works to safeguard computer systems from serious threats
The IEEE Senior Member is a leading expert in the field
Video features the organization's latest projects in securing systems