{"id":3805,"date":"2018-03-29T15:18:38","date_gmt":"2018-03-29T15:18:38","guid":{"rendered":"http:\/\/www.uwb.edu\/?p=3805"},"modified":"2023-07-17T16:38:31","modified_gmt":"2023-07-17T23:38:31","slug":"cyber-research","status":"publish","type":"post","link":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research","title":{"rendered":"Cybersecurity? Easy. Secure usability? Hard"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/cyber-research.jpg\" alt=\"cyber research\" class=\"wp-image-26757\" \/><\/figure>\n\n\n\n<p>\n\tIt\u2019s easy to protect a digital information system from cyberattacks, says Marc Dupuis \u2014 just don\u2019t plug it in or connect to the internet. And then good luck using that phone, computer or app, says the assistant professor of computing and software systems at the University of Washington Bothell.<\/p>\n\n\n\n<p>\n\tA key cybersecurity challenge is the balance between security and usability, Dupuis told an audience at a presentation March 29 at Chateau Ste. Michelle. About 80 people attended the program called Facing a New Era for Cybersecurity, which was sponsored by the University of Washington Bothell&#8217;s <a href=\"\/research\">Office of Research<\/a> and <a href=\"\/alumni\">Office of Alumni Engagement<\/a>.<\/p>\n\n\n\n<p>\n\t<a href=\"\/css\/faculty\/bios\/mdupuis\">Dupuis<\/a> was one of four UW Bothell faculty members who appeared in short videos. The others also are assistant professors in <a href=\"\/css\">computing and software systems in the School of Science, Technology, Engineering &amp; Mathematics<\/a>. In his teaching and research, Dupuis thinks about the human component in emerging technologies. <a href=\"\/css\/faculty\/bios\/blagesse\">Brent Lagesse<\/a> studies crowdsensing. <a href=\"\/css\/faculty\/bios\/ypeng\">Yang Peng<\/a> considers the benefits and risks of the \u201cinternet of things.\u201d <a href=\"\/css\/faculty\/bios\/gthamilarasu\">Geetha Thamilarasu<\/a> tests the security of medical devices.<\/p>\n\n\n\n<p>\n\t\t<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/scott-david-cyber-crc-crop.jpg\" alt=\"Scott David\" class=\"wp-image-26758\" \/><figcaption class=\"wp-element-caption\">Scott David \/ Zach Ruble photo<\/figcaption><\/figure>\n\n\n\n<p>\n\tScott L. David, director of policy at the Center for Information Assurance and Cybersecurity (CIAC), served as both a speaker and moderator of the program, which was followed by a reception at the Woodinville winery. He outlined the mind-boggling changes and challenges that have come with advances in technology.<\/p>\n\n\n\n<p>\n\tThe unintended consequence of creating the internet is a system not subject to centralized control, David said. The result is an \u201centropy bomb\u201d that diminishes the role of many central institutions in connecting people and information.<\/p>\n\n\n\n<p>\n\tWhat this means for individuals is that they must \u2014 often on their own \u2014 learn to navigate the digital world, balancing transactions on what David calls an \u201cinsight-intrusion slider.\u201d They want the insights, but in return they must give up some privacy and security.<\/p>\n\n\n\n<p>\n\t\u201cEveryone has a hacker in their pocket if you have a phone with you,\u201d he said.<\/p>\n\n\n\n<p>\n\t\nDavid blended the four faculty videos into his talk. In his, Dupuis said he asks his students to consider how people use computer systems \u2014 how they see and interact with them. Dupuis also studies ways in which personality can affect behavior, such as how often people back-up data or what kind of personal information they post on social media.<\/p>\n\n\n\n<p>\n\t\nLagesse researches crowdsensing, which aggregates sensors already in the environment, mostly on mobile phones, to capture and communicate information. Ideally, this data can be used in beneficial ways, like directing or allocating emergency resources, says Lagesse. Problems arise in making sure the information is not captured without consent, manipulated by malware or used to target individuals.<\/p>\n\n\n\n<p>\n\t\nPeng&#8217;s area of expertise is in the design of sensor networks that allow for the growth of the internet of things. By maximizing the effectiveness and efficiency of sensor networks, computers and other smart products can collect, use and share digital information that has the potential to benefit people in their daily lives, says Peng. One big way mobile and wearable devices could help, for example, is by improving health care.<\/p>\n\n\n\n<p>\n\t\nIntegrating medical devices into the internet of things will allow for early diagnosis and constant monitoring, says Thamilarasu. One problem is that most of the older devices don\u2019t have security standards to prevent the flow of information from being intercepted or modified. Thamilarasu researches ways to protect data on a software level, without requiring hardware changes in legacy devices, thus easing the way for new products to come onto the market.<\/p>\n\n\n\n<p>\n\t\t<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/zach-ruble-gray-hats.jpg\" alt=\"Zach Ruble\" class=\"wp-image-26759\" \/><figcaption class=\"wp-element-caption\">Zach Ruble with cyber trophy<\/figcaption><\/figure>\n\n\n\n<p>\n\tAfter the formal program, attendees had the opportunity to network and speak with faculty, staff and students from UW Bothell about their work and educational programs. One student showcased a poster about the T-Mobile cybersecurity internship program. Another, Zach Ruble, president of the Gray Hats club, brought the third-place trophy the club won in the annual Pacific Rim Collegiate Cyber Defense Competition held March 23\u201325 at Highline College.<\/p>\n\n\n\n<p>\n\t&#8220;Not only was this a fun event in a great venue, it was also a chance to communicate the urgent context of the research UW Bothell faculty are doing in cybersecurity  \u2014 an issue that\u2019s in the headlines daily,&#8221; said Carolyn Brennan, assistant vice chancellor of research.<\/p>\n\n\n\n<p>\n\t<a href=\"\/css\">UW Bothell offers<\/a> a Master of Science in cyber security engineering. Other offerings with a cybersecurity component include the Bachelor of Science in computer science and software engineering, and a graduate <a href=\"\/news\/january-2018\/cyber-certificate\">certificate in software design and development<\/a>.<\/p>\n\n\n\n<p>\n\tThe University is also home to CIAC, which has been designated by the <a href=\"https:\/\/www.nsa.gov\/resources\/educators\/centers-academic-excellence\/\">National Security Agency (NSA)<\/a> as a center of academic excellence in cybersecurity education and research. CIAC promotes research and helps prepare students for careers protecting individuals, businesses and government agencies from cybersecurity threats. In recognition of its successful government-industry-academic programs, UW Bothell was selected to host the 2018 Centers of Academic Excellence Executive Leadership Forum in April in Bellevue.<\/p>\n\n\n\n<p>\n\t <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\n\tA cybersecurity expert outlined the challenges of advancing technology and introduced research by four University of Washington Bothell faculty members to an audience of alumni and others at Chateau Ste. Michelle. <\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_is_archived":false,"_archived_contact_email":"","footnotes":""},"categories":[202,218,229,214],"tags":[291],"school":[],"class_list":["post-3805","post","type-post","status-publish","format-standard","hentry","category-campus-news","category-community-engagement","category-faculty","category-research","tag-cybersecurity"],"acf":{"related_links":{"toggle_visibility":false,"link_1":null,"link_2":null,"link_3":null,"link_4":null,"link_5":null},"highlight_box":{"toggle_visibility":false,"title":"","content":"","button":null,"button_style":"angled-purple-button","button_screen_reader_text":""},"contact_type_1":{"toggle_visibility":true,"contact_title":"","email":"","phone":"","box":"","address_line_1":"","address_line_2":"","location":""},"contact_type_2":{"toggle_visibility":false,"contact_title":"","email":"","phone":"","box":"","address_line_1":"","address_line_2":"","location":""},"social_media":{"toggle_visibility":false,"facebook_url":"","instagram_url":"","linkedin_url":"","twitter_url":"","youtube_url":""},"blog_archive_sidebar_visibility":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity? Easy. Secure usability? Hard - News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity? Easy. Secure usability? Hard - News\" \/>\n<meta property=\"og:description\" content=\"A cybersecurity expert outlined the challenges of advancing technology and introduced research by four University of Washington Bothell faculty members to an audience of alumni and others at Chateau Ste. Michelle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research\" \/>\n<meta property=\"og:site_name\" content=\"News\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-29T15:18:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-17T23:38:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cybersecurity? Easy. Secure usability? Hard\",\"datePublished\":\"2018-03-29T15:18:38+00:00\",\"dateModified\":\"2023-07-17T23:38:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research\"},\"wordCount\":815,\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Campus News\",\"Community Engagement\",\"Faculty\",\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research\",\"url\":\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research\",\"name\":\"Cybersecurity? Easy. Secure usability? Hard - News\",\"isPartOf\":{\"@id\":\"https:\/\/www.uwb.edu\/news\/#website\"},\"datePublished\":\"2018-03-29T15:18:38+00:00\",\"dateModified\":\"2023-07-17T23:38:31+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uwb.edu\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity? Easy. Secure usability? Hard\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uwb.edu\/news\/#website\",\"url\":\"https:\/\/www.uwb.edu\/news\/\",\"name\":\"News\",\"description\":\"Just another UW Bothell site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uwb.edu\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.uwb.edu\/news\/author\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity? Easy. Secure usability? Hard - News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity? Easy. Secure usability? Hard - News","og_description":"A cybersecurity expert outlined the challenges of advancing technology and introduced research by four University of Washington Bothell faculty members to an audience of alumni and others at Chateau Ste. Michelle.","og_url":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research","og_site_name":"News","article_published_time":"2018-03-29T15:18:38+00:00","article_modified_time":"2023-07-17T23:38:31+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research#article","isPartOf":{"@id":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research"},"author":{"name":"","@id":""},"headline":"Cybersecurity? Easy. Secure usability? Hard","datePublished":"2018-03-29T15:18:38+00:00","dateModified":"2023-07-17T23:38:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research"},"wordCount":815,"keywords":["cybersecurity"],"articleSection":["Campus News","Community Engagement","Faculty","Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research","url":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research","name":"Cybersecurity? Easy. Secure usability? Hard - News","isPartOf":{"@id":"https:\/\/www.uwb.edu\/news\/#website"},"datePublished":"2018-03-29T15:18:38+00:00","dateModified":"2023-07-17T23:38:31+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.uwb.edu\/news\/2018\/03\/29\/cyber-research#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uwb.edu\/news\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity? Easy. Secure usability? Hard"}]},{"@type":"WebSite","@id":"https:\/\/www.uwb.edu\/news\/#website","url":"https:\/\/www.uwb.edu\/news\/","name":"News","description":"Just another UW Bothell site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uwb.edu\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"","url":"https:\/\/www.uwb.edu\/news\/author"}]}},"_links":{"self":[{"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/posts\/3805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/comments?post=3805"}],"version-history":[{"count":3,"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/posts\/3805\/revisions"}],"predecessor-version":[{"id":28310,"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/posts\/3805\/revisions\/28310"}],"wp:attachment":[{"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/media?parent=3805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/categories?post=3805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/tags?post=3805"},{"taxonomy":"school","embeddable":true,"href":"https:\/\/www.uwb.edu\/news\/wp-json\/wp\/v2\/school?post=3805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}