The Bridge - Issue 2, 2023 - Cover3

History Spotlight
Protocol Secure (HTTPS), which we always looked for
as we surfed the net.
The 2000s saw massive growth in computer usage
and online activities. Computers were commonplace
both in homes and offices. That offered tremendous
opportunities for cybercriminals. Like viruses in nature,
computer viruses and other threats adapted and
evolved. Viruses no longer needed to be downloaded;
you could catch them just by going to a website. New
threats emerged along with new terms like malware
and ransomware. And the threat also increased as
state-sponsored cyberattacks became commonplace.
To combat these threats, such as computer forensics,
multi-factor authentication, network behavioral analysis
(NBA), real-time protection, threat intelligence,
updated automation, sandboxing, backup and
mirroring, multi-vector attacks, social engineering, and
web application firewalls. New technologies are one
of the tools needed to address cyberattack threats.
Also needed were talented individuals trained to
address this new computer environment.
IEEE members trained in electrical engineering,
computer engineering, and other associated fields
have been involved from the start. But it was also
apparent that university engineering education
needed to be adapted and specialty programs to turn
students into cybersecurity professionals needed to
be developed. As these programs began to emerge
in the 2010s, IEEE, through its work with ABET,
began exploring the need to assess and accredit
these emerging " cyber " protection programs. In
2014 a group of ABET volunteers participated in
the Cyber Education Project and determined an
accrediting program in what they termed the " Cyber
Sciences " was warranted and necessary to ensure
that students graduating were prepared to practice.
In January 2016, IEEE established a committee
to create ABET program criteria for " cybersecurity "
engineering programs. And in March 2016, the CSAB
(Computing Sciences Accreditation Board) established
a committee to create ABET program criteria for
" cybersecurity " computing programs [5]. These new
criteria were approved by ABET in 2018.
Today, there are approximately 20 programs at the
bachelor and associate's degree levels accredited
by ABET and many more programs at colleges
and universities around the world, reflecting the
global nature of this need. Volunteer leaders in the
IEEE Computer Society and IEEE Future Directions
Committee, also recognizing the importance of
focusing attention and resources on the needs of
cybersecurity students and professionals, launched
the IEEE Cybersecurity Initiative in 2014. And on the
IEEE Learning Network today, professionals can find
more than 30 courses related to cybersecurity.
Since the creation of the Creeper in 1971, both
cybersecurity threats and protections have evolved.
The danger remains high, so it is important that the
cybersecurity industry continues to grow and stay
ahead of potential threats. Highly trained information
security analysts and new tools such as AI, machine
learning, and other new technologies need to be
developed. We need to make sure we lock our doors.
References:
[1] D. Braue, (2021, Sept 10), " Global Cybersecurity Spending To Exceed
$1.75 Trillion From 2021-2025, " Cybercrime Magazine, https://
cybersecurityventures.com/cybersecurity-spending-2021-2025/
[2] Bureau of Labor Statistics, (2022, Sept 8), Occupational Outlook
Handbook, Information Security Analysts, https://www.bls.gov/ooh/
computer-and-information-technology/information-security-analysts.htm
[3] V. Davies, (2021, Oct 4), " The History of Cybersecurity, "
Cybermagazine.com, https://cybermagazine.com/cyber-security/
history-cybersecurity
[4] " History of Cyber Security, " Cyber-Security.degree, https://cyber-security.
degree/resources/history-of-cyber-security/
[5] S. Lingafelt, (2017, Nov 11), " The History and Development of a Cyber
Security Program Criteria, " ABET, https://www.abet.org/the-history-anddevelopment-of-a-cyber-security-program-criteria/
To
Learn more:
IEEE Cybersecurity Initiative -
https://cybersecurity.ieee.org/
IEEE Learning Network - https://iln.ieee.org/
ABET - https://www.abet.org/
Burt Dicht is a member of IEEE-HKN's
THE BRIDGE Editorial Board and the
former Director of Student and Academic
Education Programs for the IEEE's
Educational Activities Department. He is
also a member of HKN's Eta Chapter.
HKN.ORG
39
https://cybersecurityventures.com/cybersecurity-spending-2021-2025/ https://cybersecurityventures.com/cybersecurity-spending-2021-2025/ https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm https://cybermagazine.com/cyber-security/history-cybersecurity http://www.Cybermagazine.com https://cybermagazine.com/cyber-security/history-cybersecurity https://cyber-security.degree/resources/history-of-cyber-security/ https://cyber-security.degree/resources/history-of-cyber-security/ https://www.abet.org/the-history-and-development-of-a-cyber-security-program-criteria/ https://www.abet.org/the-history-and-development-of-a-cyber-security-program-criteria/ https://cybersecurity.ieee.org/ https://iln.ieee.org/ https://www.abet.org/ https://hkn.ieee.org/

The Bridge - Issue 2, 2023

Table of Contents for the Digital Edition of The Bridge - Issue 2, 2023

Contents
The Bridge - Issue 2, 2023 - Cover1
The Bridge - Issue 2, 2023 - Cover2
The Bridge - Issue 2, 2023 - Contents
The Bridge - Issue 2, 2023 - 4
The Bridge - Issue 2, 2023 - 5
The Bridge - Issue 2, 2023 - 6
The Bridge - Issue 2, 2023 - 7
The Bridge - Issue 2, 2023 - 8
The Bridge - Issue 2, 2023 - 9
The Bridge - Issue 2, 2023 - 10
The Bridge - Issue 2, 2023 - 11
The Bridge - Issue 2, 2023 - 12
The Bridge - Issue 2, 2023 - 13
The Bridge - Issue 2, 2023 - 14
The Bridge - Issue 2, 2023 - 15
The Bridge - Issue 2, 2023 - 16
The Bridge - Issue 2, 2023 - 17
The Bridge - Issue 2, 2023 - 18
The Bridge - Issue 2, 2023 - 19
The Bridge - Issue 2, 2023 - 20
The Bridge - Issue 2, 2023 - 21
The Bridge - Issue 2, 2023 - 22
The Bridge - Issue 2, 2023 - 23
The Bridge - Issue 2, 2023 - 24
The Bridge - Issue 2, 2023 - 25
The Bridge - Issue 2, 2023 - 26
The Bridge - Issue 2, 2023 - 27
The Bridge - Issue 2, 2023 - 28
The Bridge - Issue 2, 2023 - 29
The Bridge - Issue 2, 2023 - 30
The Bridge - Issue 2, 2023 - 31
The Bridge - Issue 2, 2023 - 32
The Bridge - Issue 2, 2023 - 33
The Bridge - Issue 2, 2023 - 34
The Bridge - Issue 2, 2023 - 35
The Bridge - Issue 2, 2023 - 36
The Bridge - Issue 2, 2023 - 37
The Bridge - Issue 2, 2023 - 38
The Bridge - Issue 2, 2023 - Cover3
The Bridge - Issue 2, 2023 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue3_2023
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue2_2023
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue1_2023
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue3_2022
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue2_2022
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue1_2022
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue3_2021
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue2_2021
https://www.nxtbook.com/nxtbooks/ieee/bridge_issue1_2021
https://www.nxtbook.com/nxtbooks/ieee/bridge_2020_issue3
https://www.nxtbook.com/nxtbooks/ieee/bridge_2020_issue2
https://www.nxtbook.com/nxtbooks/ieee/bridge_2020_issue1
https://www.nxtbook.com/nxtbooks/ieee/bridge_2019_issue3
https://www.nxtbook.com/nxtbooks/ieee/bridge_2019_issue2
https://www.nxtbook.com/nxtbooks/ieee/bridge_2019_issue1
https://www.nxtbook.com/nxtbooks/ieee/bridge_2018_issue3
https://www.nxtbook.com/nxtbooks/ieee/bridge_2018_issue2
https://www.nxtbook.com/nxtbooks/ieee/bridge_2018_issue1
https://www.nxtbookmedia.com