February 3, 2017
As our dependance on technology grows, so does the concern of keeping our data safe. With cybersecurity attacks on the rise, IEEE Senior Member Babak D. Beheshti, PhD, weighed in with his thoughts on the evolution of security concerns,offering his expert advice with security tips that can help to protect you and your data.
IEEE Transmitter: What are the biggest cybersecurity trends right now?
Beheshti: An increasing migration of services, data storage and operations to cloud-based platforms has now made them a prime target for cyber attacks. It is not only the cloud infrastructure that needs to be protected, but attackers also can target legitimate API, Application Program Interface, calls to the cloud. These calls can be multiplied in number to the point of saturating the cloud platform, hence accomplishing a successful DDoS attack.
As more and more devices become “web-enabled,” the Internet of Things (IoT) is providing an exponentially larger attack surface. Home automations, wearable devices, automotive connected devices, as well as remotely-accessible components within the critical infrastructure, provide for an abundance of opportunities for takeover of one single device to launch an attack on specific targets.
IEEE Transmitter: What security tips can you offer to ward against attacks?
Beheshti: 1. Avoid password reuse. Once a large data breach has been accomplished, the attackers use the discovered passwords on other well-subscribed web accounts, counting on individuals’ tendency to reuse the same password on multiple accounts. This will inevitably lead to an avalanche effect after a single data breach.
2. Be vigilant in firmware, software, and security patch updates. All devices connected to one’s network must run the latest and safest version of the software. The majority of attacks start with an exploit taking advantage of a known vulnerability for which an update has been released.
IEEE Transmitter: How are biometrics playing a role in combating technology?
Beheshti: Biometrics will have an increasingly significant role in cybersecurity. Close to a billion smart mobile devices will be equipped with an integrated fingerprint sensor in 2017. It is likely that fingerprint technology will be complemented –not replaced — with additional biometric sensors such as iris scanning. Practice of the principle of “depth-in-security,” i.e. use of multiple complementing techniques to authenticate a user, will be a focus for device manufacturers in the years to come. Software that implements facial recognition and or voice authentication should be added to devices.







 AI Through Our Ages
                                              AI Through Our Ages Liquid Infrastructure: Our Planet's Most Precious Resource
                                              Liquid Infrastructure: Our Planet's Most Precious Resource The Impact of Technology in 2025
                                              The Impact of Technology in 2025 Quantum and AI: Safeguards or Threats to Cybersecurity?
                                              Quantum and AI: Safeguards or Threats to Cybersecurity? Why AI Can't Live Without Us
                                              Why AI Can't Live Without Us Bits, Bytes, Buildings and Bridges: Digital-Driven Infrastructure
                                              Bits, Bytes, Buildings and Bridges: Digital-Driven Infrastructure Impact of Technology in 2024
                                              Impact of Technology in 2024 Emerging AI Cybersecurity Challenges and Solutions
                                              Emerging AI Cybersecurity Challenges and Solutions The Skies are Unlimited
                                              The Skies are Unlimited Smart Cities 2030: How Tech is Reshaping Urbanscapes
                                              Smart Cities 2030: How Tech is Reshaping Urbanscapes Impact of Technology 2023
                                              Impact of Technology 2023 Cybersecurity for Life-Changing Innovations
                                              Cybersecurity for Life-Changing Innovations Smarter Wearables Healthier Life
                                              Smarter Wearables Healthier Life Infrastructure In Motion
                                              Infrastructure In Motion The Impact of Tech in 2022 and Beyond
                                              The Impact of Tech in 2022 and Beyond Cybersecurity, Technology and Protecting Our World
                                              Cybersecurity, Technology and Protecting Our World How Technology Helps us Understand Our Health and Wellness
                                              How Technology Helps us Understand Our Health and Wellness The Resilience of Humanity
                                              The Resilience of Humanity Harnessing and Sustaining our Natural Resources
                                              Harnessing and Sustaining our Natural Resources Creating Healthy Spaces Through Technology
                                              Creating Healthy Spaces Through Technology Exceptional Infrastructure Challenges, Technology and Humanity
                                              Exceptional Infrastructure Challenges, Technology and Humanity The Global Impact of IEEE's 802 Standards
                                              The Global Impact of IEEE's 802 Standards Scenes of our Cyber Lives: The Security Threats and Technology Solutions Protecting Us
                                              Scenes of our Cyber Lives: The Security Threats and Technology Solutions Protecting Us How Millennial Parents are Embracing Health and Wellness Technologies for Their Generation Alpha Kids
                                              How Millennial Parents are Embracing Health and Wellness Technologies for Their Generation Alpha Kids Space Exploration, Technology and Our Lives
                                              Space Exploration, Technology and Our Lives Global Innovation and the Environment
                                              Global Innovation and the Environment How Technology, Privacy and Security are Changing Each Other (And Us)
                                              How Technology, Privacy and Security are Changing Each Other (And Us) Find us in booth 31506, LVCC South Hall 3 and experience the Technology Moon Walk
                                              Find us in booth 31506, LVCC South Hall 3 and experience the Technology Moon Walk Virtual and Mixed Reality
                                              Virtual and Mixed Reality How Robots are Improving our Health
                                              How Robots are Improving our Health IEEE Experts and the Robots They are Teaching
                                              IEEE Experts and the Robots They are Teaching See how millennial parents around the world see AI impacting the lives of their tech-infused offspring
                                              See how millennial parents around the world see AI impacting the lives of their tech-infused offspring Take the journey from farm to table and learn how IoT will help us reach the rising demand for food production
                                              Take the journey from farm to table and learn how IoT will help us reach the rising demand for food production Watch technical experts discuss the latest cyber threats
                                              Watch technical experts discuss the latest cyber threats Explore how researchers, teachers, explorers, healthcare and medical professionals use immersive technologies
                                              Explore how researchers, teachers, explorers, healthcare and medical professionals use immersive technologies Follow the timeline to see how Generation AI will be impacted by technology
                                              Follow the timeline to see how Generation AI will be impacted by technology Learn how your IoT data can be used by experiencing a day in a connected life
                                              Learn how your IoT data can be used by experiencing a day in a connected life Listen to technical experts discuss the biggest security threats today
                                              Listen to technical experts discuss the biggest security threats today See how tech has influenced and evolved with the Games
                                              See how tech has influenced and evolved with the Games Enter our virtual home to explore the IoT (Internet of Things) technologies
                                              Enter our virtual home to explore the IoT (Internet of Things) technologies Explore an interactive map  showcasing exciting innovations in robotics
                                              Explore an interactive map  showcasing exciting innovations in robotics Interactively explore A.I. in recent Hollywood movies
                                              Interactively explore A.I. in recent Hollywood movies Get immersed in technologies that will improve patients' lives
                                              Get immersed in technologies that will improve patients' lives