{"id":174,"date":"2017-07-18T20:54:43","date_gmt":"2017-07-18T20:54:43","guid":{"rendered":"https:\/\/magazine.hmc.edu\/spring-2017\/?p=174"},"modified":"2017-08-08T19:22:24","modified_gmt":"2017-08-08T19:22:24","slug":"people-centric-security","status":"publish","type":"post","link":"https:\/\/magazine.hmc.edu\/spring-2017\/people-centric-security\/","title":{"rendered":"People-Centric Security"},"content":{"rendered":"<p><strong>People are at the enter of technology.<\/strong>\u00a0We tend to focus on RAM storage or the signal strength of our wireless networks, but phone calls bring us together. The Internet of Things triggers the thermostat to warm up our homes.<\/p>\n<p>However, like most human endeavors, technology remains remarkably susceptible to human error. As Matthew Wright \u201999 puts it, \u201cmany security problems in practice are due to people.\u201d An expert in cybersecurity, Wright has made pioneering contributions to the field precisely because he\u2019s kept Harvey Mudd\u2019s mission statement firmly in mind: to better understand the societal impact of the technology we create.<\/p>\n<p>Appointed in 2016 as director of the Center for Cybersecurity at Rochester Institute of Technology, Wright will have many opportunities to keep people at the center of his research. He describes cybersecurity as protecting computers and networks against attacks that would gain access to the information they contain. This information ranges from personal health records to military secrets.<\/p>\n<figure id=\"attachment_180\" aria-labelledby=\"figcaption_attachment_180\" class=\"wp-figure wp-figure-wp-image-180 aligncenter\"><a href=\"https:\/\/magazine.hmc.edu\/spring-2017\/wp-content\/uploads\/sites\/8\/2017\/07\/feature-7-01.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-180 size-full\" src=\"https:\/\/magazine.hmc.edu\/spring-2017\/wp-content\/uploads\/sites\/8\/2017\/07\/feature-7-01.jpg\" alt=\"Matthew Wright '99\" width=\"1060\" height=\"707\" srcset=\"https:\/\/magazine.hmc.edu\/spring-2017\/wp-content\/uploads\/sites\/8\/2017\/07\/feature-7-01.jpg 1060w, https:\/\/magazine.hmc.edu\/spring-2017\/wp-content\/uploads\/sites\/8\/2017\/07\/feature-7-01-300x200.jpg 300w, https:\/\/magazine.hmc.edu\/spring-2017\/wp-content\/uploads\/sites\/8\/2017\/07\/feature-7-01-768x512.jpg 768w, https:\/\/magazine.hmc.edu\/spring-2017\/wp-content\/uploads\/sites\/8\/2017\/07\/feature-7-01-1024x683.jpg 1024w\" sizes=\"auto, (max-width: 1060px) 100vw, 1060px\" \/><\/a><figcaption id=\"figcaption_attachment_180\" class=\"wp-caption wp-caption-text-wp-image-180 aligncenter-figcaption\">Matthew Wright &#8217;99<\/figcaption><\/figure>\n<p>Wright says, \u201cWe are studying new password designs where the system generates random passwords and then provides tools based on lessons from cognitive psychology that help the user remember them.\u201d However, there are other parts of society in this equation: those who attack computer networks. Thanks to Wright\u2019s direction, the Center is focusing on both of these angles. Researchers are working on user-centered issues but also exploring the tools cyber attackers can use through a process that simulates attacks on networks to find and eliminate vulnerabilities.<\/p>\n<p>Wright\u2019s work to thwart attackers involves contributing to and optimizing an online anonymity system. This system encrypts and fragments your private information and the information you send over the internet like the pieces of a jigsaw puzzle. It\u2019s difficult for attackers to find all the pieces, decrypt them and get the whole picture. The anonymity system also breaks the puzzle into differently interlocking pieces every 10 minutes. Prateek Mitall, Wright\u2019s longtime colleague and an assistant professor and head of the Security and Privacy Lab at Princeton University, considers this effort \u201cgroundbreaking work [that] has laid the foundation for the next generation of secure and privacy-preserving systems.\u201d<\/p>\n<p>As for the rest of us who are trying to remember those strong passwords to preserve our privacy, Wright explains the motivation for his human-centered research: \u201cWe\u2019re asking users who are not security experts, who are not skilled in memorization techniques, for [a password] that is both secure and memorable.\u201d Wright thinks that the software should work harder, not the user.<\/p>\n<p>He has upgraded memorization techniques for graphical passwords to incorporate visual, verbal and spatial cues to aid all types of learners. This novel approach opens up new avenues to solving complex problems, such as keyboard sniffing and shoulder-surfing.<\/p>\n<p>But Wright is also very conscientious of the students he\u2019s shoulder-to-shoulder with at the Center. His goals include \u201chigh-quality, hands-on education of the next generation.\u201d And when he looks for examples of that type of teaching, he pulls from his experiences at Harvey Mudd. He\u2019s grateful to many of his professors for their passion and their commitment to active learning, especially professors Ran Libeskind-Hadas (CS) and Arthur Benjamin (mathematics).<\/p>\n<p>He says, \u201cMy time at Mudd helped me to understand how to be successful without being the smartest person in the room and to recognize what others can bring to the table and how it can help the team. My goal in this leadership position is to help some similarly talented [people] be as successful as possible by mentoring them and helping them in any way that I can.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>People are at the enter of technology.\u00a0We tend to focus on RAM storage or the signal strength of our wireless [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-174","post","type-post","status-publish","format-standard","hentry","category-features"],"acf":[],"_links":{"self":[{"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/posts\/174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/comments?post=174"}],"version-history":[{"count":0,"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/posts\/174\/revisions"}],"wp:attachment":[{"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/media?parent=174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/categories?post=174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/magazine.hmc.edu\/spring-2017\/wp-json\/wp\/v2\/tags?post=174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}