• Login
    View Item 
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Institute for Information Security & Privacy Cybersecurity Lecture Series
    • View Item
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Institute for Information Security & Privacy Cybersecurity Lecture Series
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Cyber Science: The Third Frontier

    Thumbnail
    View/Open
    johnson-bey.mp4 (425.6Mb)
    johnson-bey_videostream.html (1.167Kb)
    transcript.txt (42.64Kb)
    thumbnail.jpg (69.46Kb)
    Date
    2019-10-11
    Author
    Johnson-Bey, Charles
    Metadata
    Show full item record
    Abstract
    Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”; electronic cyber-attack and cyber-defense illustrates the current entire domain of Cyber Security. Significant investment has gone into protecting networks, training staff to operate expensive architecture, and ultimately changing how business operations are conducted. Attacks are common place and resources in high demand. However, much of these capabilities required the development of unique methods to deal with chaotic information, to pick up subtle data changes, and to fine tune networks and computer systems. There is a possibility of expanding these capabilities from a two-tier war fighting model (Cyber Defense and Cyber Offense) over to a new third tier, Cyber Science. This enables cyber capabilities to provide profit back to a business instead of being a sunk cost (re. insurance policy of sorts). We envision a near future that allows Cyber engineering to build new solutions that aren’t mired in “Us versus Them” but is used for the betterment of society. These take the form of new quantum-based data structures, new approaches to biologic science analytics, new ways to connect the worlds of IOT, MTM, and humans, and more. We explore where this makes sense and highlight a possible way to engage cyber engineering groups into a profit center.
    URI
    http://hdl.handle.net/1853/61978
    Collections
    • Institute for Information Security & Privacy Cybersecurity Lecture Series [149]

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CollectionDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Statistics

    View Usage StatisticsView Google Analytics Statistics
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology