Bridge Linking Engineering and Society
Total Page:16
File Type:pdf, Size:1020Kb
Fall 2019 CYBERSECURITY The BRIDGE LINKING ENGINEERING AND SOCIETY A Framework to Understand Cybersecurity David D. Clark Cybersecurity: Revisiting the Definition of Insider Threat Nicole Lang Beebe and Frederick R. Chang Learning from Cybersecurity Breaches: The Trouble with Recommended Best Practices Josephine Wolff Cybersecurity in Higher Education: One University’s Approach Christian Hamer Policy Dimensions of Cybersecurity Engineering Challenges Fred B. Schneider and Lynette I. Millett Raising Awareness of Security Challenges for the Internet of Trillions of Things John A. Stankovic and Jack W. Davidson Security of Connected and Automated Vehicles Mashrur Chowdhury, Mhafuzul Islam, and Zadid Khan What Every Engineer Should Know about Cybersecurity Thomas A. Longstaff and Noelle K. Allon EES Perspective: When White Hats Wear Black Hats: The Ethics of Cybersecurity C. Dianne Martin A Call to the Engineering Community to Address Human Trafficking Jonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey The mission of the National Academy of Engineering is to advance the well-being of the nation by promoting a vibrant engineering profession and by marshalling the expertise and insights of eminent engineers to provide independent advice to the federal government on matters involving engineering and technology. The BRIDGE NATIONAL ACADEMY OF ENGINEERING Gordon R. England, Chair John L. Anderson, President Corale L. Brierley, Vice President Julia M. Phillips, Home Secretary James M. Tien, Foreign Secretary Martin B. Sherwin, Treasurer Editor in Chief: Ronald M. Latanision Managing Editor: Cameron H. Fletcher Production Associate: Penelope Gibbs The Bridge (ISSN 0737-6278) is published quarterly by the National Acad emy of Engineering, 2101 Constitution Avenue NW, Washington, DC 20418. Periodicals postage paid at Washington, DC. Vol. 49, No. 3, Fall 2019 Postmaster: Send address changes to The Bridge, 2101 Constitution Avenue NW, Washington, DC 20418. Changes of address or requests to unsubscribe should be sent to [email protected]. Papers are presented in The Bridge on the basis of general interest and timeliness. They reflect the views of the authors and not necessarily the position of the National Academy of Engineering. The Bridge is printed on recycled paper. C © 2019 by the National Academy of Sciences. All rights reserved. Mission Statement of The Bridge The Bridge publishes articles on engineering research, education, and practice; science and technology policy; and the interface between engineering and technology and society. The intent is to stimulate debate and dialogue both among members of the National Academy of Engineering (NAE) and in the broader community of policymakers, educators, business leaders, and other interested individuals. The Bridge relies on its editor in chief, NAE members, and staff to identify potential issue topics and guest editors. Invited guest editors, who have expertise in a given issue’s theme, are asked to select authors and topics, and inde- pendent experts are enlisted to assess articles for publication. The quarterly has a distribution of about 7,000, including NAE members, members of Congress, libraries, universities, and interested individuals all over the country and the world. Issues are freely accessible at www.nae.edu/Publications/Bridge.aspx. A complete copy of The Bridge is available in PDF format at www.nae.edu/TheBridge. Some of the articles in this issue are also available as HTML documents and may contain links to related sources of information, multimedia files, or other content. The Volume 49, Number 3 • Fall 2019 BRIDGE LINKING ENGINEERING AND SOCIETY Editors’ Note 3 Cybersecurity: A Growing Challenge for Engineers and Operators Ruth A. David and Robert F. Sproull Features 6 A Framework to Understand Cybersecurity David D. Clark An internet-centric view of cybersecurity challenges sheds light on ways to address them. 12 Cybersecurity: Revisiting the Definition of Insider Threat Nicole Lang Beebe and Frederick R. Chang The definition of insider threat must be expanded from the malicious human insider to include the unwitting human insider and the technological insider. 20 Learning from Cybersecurity Breaches: The Trouble with Recommended Best Practices Josephine Wolff Previous incidents highlight the need for clear, specific guidance on cybersecurity best practices and incentives for their use. 27 Cybersecurity in Higher Education: One University’s Approach Christian Hamer We believe it is critical to involve and work with our community as much as possible to support the mission of the university. 33 Policy Dimensions of Cybersecurity Engineering Challenges Fred B. Schneider and Lynette I. Millett Efforts to address cybersecurity challenges require theoretical perspectives, practical and organizational approaches, and policy understanding. 40 Raising Awareness of Security Challenges for the Internet of Trillions of Things John A. Stankovic and Jack W. Davidson The massive scale and decentralized nature of the IoTT provide attackers with a large attack surface for exploitation. (continued on next page) 46 Security of Connected and Automated Vehicles Mashrur Chowdhury, Mhafuzul Islam, and Zadid Khan We describe cyberattack surfaces and potential solutions for securing connected and automated vehicles and transportation infrastructure. 57 What Every Engineer Should Know about Cybersecurity Thomas A. Longstaff and Noelle K. Allon Cybersecurity is not an end in itself but an ongoing set of practices throughout the system lifecycle to achieve system goals and requirements. 62 EES Perspective: When White Hats Wear Black Hats: The Ethics of Cybersecurity C. Dianne Martin 67 A Call to the Engineering Community to Address Human Trafficking Jonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey There are opportunities for engineering to make transformative contributions to the curtailment of human trafficking. 74 An Interview with… Deanne Bell, TV Host and Founder-CEO of Future Engineers News and Notes 83 NAE Newsmakers 84 2019 China-America Frontiers of Engineering Hosted by Qualcomm in San Diego 86 Summer Interns in the NAE Program Office 87 Calendar of Meetings and Events 87 In Memoriam 89 Publications of Interest The National Academy of Sciences was established in 1863 by an emy of Sciences to advise the nation on medical and health issues. Act of Congress, signed by President Lincoln, as a private, nongov- Members are elected by their peers for distinguished contributions to ernmental institution to advise the nation on issues related to science medicine and health. Dr. Victor J. Dzau is president. and technology. Members are elected by their peers for outstanding contributions to research. Dr. Marcia McNutt is president. The three Academies work together as the National Academies of Sciences, Engineering, and Medicine to provide independent, objec- The National Academy of Engineering was established in 1964 tive analysis and advice to the nation and conduct other activities under the charter of the National Academy of Sciences to bring the to solve complex problems and inform public policy decisions. The practices of engineering to advising the nation. Members are elected Academies also encourage education and research, recognize out- by their peers for extraordinary contributions to engineering. Dr. John standing contributions to knowledge, and increase public understand- L. Anderson is president. ing in matters of science, engineering, and medicine. The National Academy of Medicine (formerly the Institute of Medicine) Learn more about the National Academies of Sciences, Engineering, was established in 1970 under the charter of the National Acad- and Medicine at www.nationalacademies.org. 3 Editors’ Note larly, complex infrastructures on which people depend for transportation, energy, communications, food pro- duction, water distribution, and healthcare delivery are increasingly computerized, as are the manufacturing and design processes that will create the next genera- tion of systems and infrastructures. To be sure, the engineers who design and develop Ruth A. David (NAE) is retired these systems and infrastructures play a vital role in president and chief executive addressing security concerns, but they cannot antici- officer of ANSER. pate every conceivable threat that may manifest during operational use of their product—particularly since new attack surfaces are introduced when individual systems are connected to networks. Cybersecurity is defined by the National Institute of Standards and Technology (NIST 2011, p. B-3) as Robert F. Sproull (NAE) is “the ability to protect or defend the use of cyberspace retired vice president and direc- from cyber attacks,” and cyberspace is defined as “a tor of Oracle Labs and now an global domain within the information environment adjunct professor of computer consisting of the interdependent network of informa- science at the University of tion systems infrastructures including the Internet, Massachusetts at Amherst. tele communications networks, computer systems, and embedded processors and controllers.” Thus, cyber- Cybersecurity: security focuses on thwarting attack vectors that exploit network connections, but those connections A Growing Challenge for typically occur in individual systems put into use by Engineers and Operators individual, organizational, or institutional operators who therefore play an equally vital role