There are approximately 3.5 billion devices in the U.S. today connected through the Internet鈥攕martphones, laptops, tablets, servers鈥攁nd by 2020 there will be 45 billion, predicts William Nisen, associate director of the Institute for Security, Technology, and Society () at 天美麻豆.
鈥淲e are going to have machines talking to machines without human intervention, and unless we get the security right we are going to wind up with a huge problem,鈥 he says.

鈥淭oday there are about 2 million correctly certified web servers on the Internet, but we don鈥檛 have a fully effective way to tell it鈥檚 really 鈥楢mazon鈥 on the other end,鈥 says ISTS Director Sean Smith. 鈥淲hat will happen when the number of these things increases a thousand-fold?鈥
Smith, Nisen, and their colleagues are keenly aware of the dangers inherent in the growing dependence on the Internet, its increasing ubiquity, and the doors this opens to mischievous misuse and criminal enterprise. Ensuring the security of our activities in cyberspace is the challenge ISTS is rising to meet through research and education.
Vice Provost Anthony Receives NSF GrantThe National Security Agency (NSA) has taken note of the institute鈥檚 efforts, designating 天美麻豆 as a Center of Academic Excellence for Information Assurance Research (CAE) for a second seven-year term.Before Denise Anthony became vice provost for academic initiatives, she had been director of the Institute for Security, Technology, and Society (ISTS) at 天美麻豆. While Anthony is now responsible for a broad portfolio of faculty-oriented activities, she is still a sociology professor involved in research pursuits.
鈥淚n a society with ubiquitous cameras, unlimited memory, and powerful data-mining tools, the context for social interaction is changing, sometimes dramatically,鈥 says Anthony. 鈥淣ew technologies often affect cultural expectations about privacy, not to mention individual perceptions of what is and is not, or what should and should not, be private.鈥
In collaboration with two Indiana University professors, she secured $1.2 million in National Science Foundation funding to study the balance between privacy and public use of wearable cameras.
鈥淲e seek to understand not only how life-logging technologies affect social interaction and perceptions of privacy鈥攆or good or ill鈥攂ut also how expectations about privacy can inform technology and application design to enhance not only privacy but also the usability of new visual-sensing technologies,鈥 she says.
鈥淭his lauds and validates what we have done and facilitates what we can do going forward,鈥 says Smith. 鈥淭his is a testament to the things we have been doing for the last seven years and it is a welcome acknowledgement by an external body.鈥
鈥淲e were one of the original designees and now to be redesignated is an honor for us,鈥 says Nisen. The redesignation will help enable ISTS to develop collaborative relationships with other CAE institutions, 鈥渒nowing that there is a certain level of expertise within that institution,鈥 he says.
鈥淧articipating in a CAE network makes us aware of all kinds of opportunities,鈥 says Karen Page, the ISTS program coordinator. 鈥淲e are always getting emails telling us about cyber competitions for students, or granting programs and job opportunities.鈥
The ISTS website proclaims that the institute 鈥渋s dedicated to pursuing research and education to advance information security and privacy throughout society.鈥漈he longstanding educational and outreach missions of ISTS with respect to cybersecurity and its awareness figured prominently in the NSA鈥檚 decision to redesignate.
An important ISTS educational initiative is the High School Summer Security Workshop, a free weeklong day program. The program includes lectures by the College鈥檚 computing services staff and guests, hands-on interactive activities, and field trips. The students also complete an outreach project of their own design to spread the word about cybersecurity. While the program targets local high schools, attendees have also come from schools as far away as Philadelphia.
One successful initiative, which Page describes as 鈥渁 cybersecurity boot camp,鈥 is the Secure Information Systems Mentoring and Training (SISMAT) program. 鈥淲e offered a two-week-long program for undergraduates from smaller liberal arts colleges that may have computer science, but did not necessarily offer training in cybersecurity,鈥 she says. 鈥淭he students spent two weeks in the classroom and then went off and did internships in cybersecurity for the rest of the summer.鈥
鈥淪ISMAT was conceived to bring some of our 天美麻豆 magic to people who didn鈥檛 have cybersecurity resources at their home institutions,鈥 says Smith.
Smith鈥檚 latest educational endeavor is a sophomore summer living-learning course on the 鈥淚nternet of Things鈥 planned to begin this summer. 鈥淲e will be looking for ways to get students involved in thinking about cybersecurity issues,鈥 he says. 鈥淚t will be a multidisciplinary course, and not limited to computer science students.鈥
There are still challenges in implementing these programs. 鈥淗ow do we actually make cybersecurity interesting, important, and attractive for students?鈥 Nisen asks. 鈥淚n doing so, we have to make sure that we are providing these students with the tools, techniques, and the continual learning environment that will make them successful.
鈥淎nother challenge that will come to a head soon is the recognition on the part of society that personal data are extremely important. Right now we don鈥檛 put too much value on it.鈥 To counteract this, ISTS is reaching out to all parts of the college to try and make people much more aware of the importance of private data and how it is being infringed upon.
These programs are evidence of 天美麻豆鈥檚 multifaceted approach to computer science education鈥攁 strategy that has met with success. 鈥淭he NSA hires an abnormally high number of students from 天美麻豆, given the size of our graduating class,鈥 Nisen says. 鈥淣SA looks to 天美麻豆 for people who are going to be able to handle the cybersecurity issues of the future as opposed to just having a mastery of cybersecurity technique.鈥