A rewarding collaboration between our Cybersecurity faculty and students
This is a joint faculty-student published research featuring the contributive works of Joe Giordano, Cybersecurity Director and Professor of Practice in Cybersecurity at Utica College, in collaboration with five Utica College Cybersecurity students: Justin Hubman, Zachary Doyle, Robert Payne III, Thomas Woodburn, and Branden McDaniel.
The original publication is one of fourteen chapters in the Evolution of Cyber Technologies and Operations to 2035, Volume 63 of the series Advances in Information Security pp 163-174. The book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare.
Justin M. Hubman, Zachary B. Doyle, Robert L. Payne III, Thomas F. Woodburn, Branden G. McDaniel, and Joseph V. Giordano
Our increasing dependence on cyber technologies, coupled with today’s information intensive environment, puts our personal safety, national security, and economic health at risk. The number of cyber-related incidents such as hacking, white collar crime, fraud, identity theft, cyber terrorism and cyber espionage are expected to rise. The types of perpetrators are also expanding as crime groups from basic hackers, to organized crime, terrorists, and even well-funded nation state actors, recognize the increased volume, reach, risk and reward of cyber crime. As we move toward the Internet of Everything, with even common place things becoming more and more connected to the internet, such as home appliances, and automobiles, in addition to major infrastructure smart grids like utilities, and telecommunication, there is no doubt that there will be more and more entry points that these adversaries can exploit.
These cybersecurity trends also impact the ethical considerations in the field. The scope and continuously-changing cybersecurity landscape makes the development of ethical standards very difficult. Couple that with the global nature of the cyber domain with differing philosophies and views and good and bad actors, and the result is a wide gap in ensuring proper ethical behavior in the cyber domain. One example of this gap is in the debate between the right to privacy and national security.
Topics covered in the Chapter
- :: Systems and Data Security
- :: Data Structures, Cryptology and Information Theory
- :: Law and Economics