Cyberattacks are surging in all categories of the digital sphere and are likely to become more frequent and damaging, states Alexander Perez-Pons, associate professor, Department of Electrical and Computer Engineering.
With high profile attacks on network management company SolarWinds, the Colonial Pipeline, meat processing company JBS and software firm Kaseya, the urgency for professionals who can counteract, contain and even prevent network breeches has moved to the forefront, highlighting the great need for graduates with an M.S. in Computer Engineering, which focuses on network security and takes just 10 months to complete.
“If you look at the horizon, there will be what looks like an explosion in IoT devices—more devices everywhere recording, monitoring, gathering information,” states Perez-Pons. “These devices make our lives easier, but how can security now not be a major factor?”
Perez-Pons discussed the past 30-plus years of devices and programming and points out that decades ago, the main push was functionality and capability of a product. Security for devices was not a main component.
“Consumers assume that companies are doing their due diligence to protect their data with security measures,” cautions Perez-Pons who admits he does whatever possible to keep his exposure limited.
One common security measure that is taken to limit data exposure is using two-factor identification. Information is a commodity that can be traded even when there are security measures in place—there are privacy concerns today that question how much control you have over your data, he explains. There’s always a possibility that somebody may try to gain access to your devices and this is why two-factor identification is a good thing, because it protects the network.
Read More at FIU Online