Cybersecurity and Embedded Systems
The need to secure embedded systems Charles Parker Do you drive a car? have you in the last five years flown on an airplane? Have you purchased any goods that were shipped to your location? If you have answered Yes to any of these, then embedded systems have played a role in your life. Generally, you can separate the cybersecurity area of operations into the enterprise and embedded systems. The enterprise is the systems we learn so much about in school and for certifications.
Cybersecurity and Military Autonomous Vehicles
Security isn’t just for the consumer vehicle market by Charles Parker Vehicles continue to be targeted by malicious attackers and cybersecurity researchers. There is a certain notoriety involved with successfully exploiting a vehicle and/or its modules. This is a quick track to your 15 minutes of fame. The modules focussed on recently have been concentrated on the consumer market. This is a natural extension, as the consumer market is massive, with cars everywhere across the
Cybersecurity and Critical Infrastructure
Dr. Jane LeClair The recent cyber attack on the Colonial Pipeline has created a good deal of disruption in the lives of people in the SE United States. It also clearly demonstrated how vulnerable the elements of our critical infrastructure are despite years of warning by cyber professionals. In review, the 16 elements or sectors that comprise what is commonly accepted as critical infrastructure are: Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams
Cybersecurity and Data Science
How can data science assist cybersecurity? -Charles Parker, II Cybersecurity has tended to be siloed from other areas. When other areas of the business receive emails from the security department, the first thought is “Ugh, more training.” There are however other areas in the organization that are able to assist cybersecurity. Data science and mining are able to assist security in defending the company. Cybersecurity is familiar with the field mostly from one application-the