Multidisciplinary Security

July/August 2015

IEEE Security & Privacy magazine cover

In This Issue

Multidisciplinary perspectives are becoming more important as our technology becomes more pervasive. It's important for us to think about security and privacy broadly so that we understand the context in which our technology will be perceived and used. Read full article »

About IEEE Security & Privacy

IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.

Articles from IEEE Security & Privacy

Information Security Compliance over Intelligent Transport Systems: Is IT Possible?

Information Security Compliance over Intelligent Transport Systems: Is IT Possible?

Your new car is also a sophisticated cyber platform. This article looks at the security risks that cyber system brings into the equation. Read full article »

Weakness in Depth: A Voting Machine's Demise

Weakness in Depth: A Voting Machine's Demise

Every voting system examined over the past decade has had severe security vulnerabilities, with some even allowing complete exploitation over a Wi-Fi network. The combination of vulnerabilities exhibits "weakness in depth," rather than the "defense in depth" frequently suggested as a model. Read full article »


Authentication at Scale

Arguing that it's time to give up on elaborate password rules, Google Vice President of Security Eric Grosse and engineer Mayank Upadhyay present a better way to achieve stronger user identification. Read full article »


Silver Bullet Security Podcast with Gary McGraw

Silver Bullet Security Podcast logo

Steve Bellovin and Matt Green discuss “Crypto Wars II”
We thought the “crypto wars” were resolved in the late 1990s. But the introduction of encrypted devices — specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat — has resurfaced the debate. FBI Director Comey and other law enforcement groups are concerned about what they call “going dark” and are stressing the need for back door access (called extraordinary access). But is this really a good idea? Didn’t we already fight this battle during the first crypto wars? Matthew Green and Steve Bellovin, two authors of the recently released Keys Under Doormats paper, discuss the dangerous ramifications of this request. More podcast episodes »