{"id":34697,"date":"2019-07-01T10:06:06","date_gmt":"2019-07-01T14:06:06","guid":{"rendered":"https:\/\/web.uri.edu\/engineering\/?page_id=34697"},"modified":"2019-07-01T10:06:06","modified_gmt":"2019-07-01T14:06:06","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/engineering\/research-2\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<section class=\"cl-wrapper cl-hero-wrapper\"><div class=\"cl-hero fullwidth   cl-has-accessibility-controls\"><div class=\"cl-hero-proper\"><div class=\"overlay\"><div class=\"block\"><h1>Cyber Security<\/h1><p>Safegarding our nation\u2019s information systems<\/p><\/div><\/div><div id=\"CybersecurityHero1\" data-video=\"C8vJUpJ3Ado\" data-platform=\"youtube\" class=\"poster\" style=\"background-image:url(https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1555\/Cybersecurity1Still.jpg);\"><\/div><div class=\"cl-accessibility-controls-container\"><div class=\"cl-accessibility-controls\"><div class=\"cl-accessibility-icon\" title=\"Accessibility controls\">Accessibility controls<\/div><div class=\"cl-accessibility-control cl-accessibility-motion-control\"><div class=\"cl-accessibility-control-default\"><div class=\"cl-accessibility-control-button\" title=\"Pause motion\">Pause motion<\/div><div class=\"cl-accessibility-control-label\">Motion: <span class=\"cl-accessibility-syntax\">On<\/span><\/div><\/div><div class=\"cl-accessibility-control-alternate\"><div class=\"cl-accessibility-control-button\" title=\"Play motion\">Play motion<\/div><div class=\"cl-accessibility-control-label\">Motion: <span class=\"cl-accessibility-syntax\">Off<\/span><\/div><\/div><\/div><div class=\"cl-accessibility-control cl-accessibility-contrast-control\"><div class=\"cl-accessibility-control-default\"><div class=\"cl-accessibility-control-button\" title=\"Increase text contrast\">Increase text contrast<\/div><div class=\"cl-accessibility-control-label\">Contrast: <span class=\"cl-accessibility-syntax\">Standard<\/span><\/div><\/div><div class=\"cl-accessibility-control-alternate\"><div class=\"cl-accessibility-control-button\" title=\"Reset text contrast\">Reset text contrast<\/div><div class=\"cl-accessibility-control-label\">Contrast: <span class=\"cl-accessibility-syntax\">High<\/span><\/div><\/div><\/div><div class=\"cl-accessibility-system-setting\"><div class=\"cl-accessibility-toggle\" title=\"Apply my preferences site-wide\"><\/div><div class=\"cl-accessibility-toggle-label\">Apply site-wide<\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<p class=\"type-intro fullwidth\">With computers networks reaching into all aspects of life, keeping data secure is central to the well-being, security, and productivity of our society.<\/p>\n<div><div class=\"cl-wrapper cl-boxout-wrapper\"><div class=\"cl-boxout right  \"><h1>An Interdisciplinary Approach<\/h1><p>Engineering faculty and students work with interdisciplinary teams at the University\u2019s Digital Forensics and Cyber Security Center, a National Center of Academic Excellence in Cyber Defense Education.<\/p><\/div><\/div><\/div>\n<p>One of our most important security priorities is protecting the domestic power grid. Professor Yan (Lindsay) Sun has pioneered a holistic approach to addressing power grid security challenges by analyzing information, signal processing, and networking.<\/p>\n<p>Elsewhere, researchers are developing better secure network protocols that route packets of digital information to their destinations. Faculty and students are working to help people know what online information they can trust when deciding whether to make a purchase, entrust their child to a daycare, or vote for a candidate. Our researchers are looking at ways to manage online reputations, promote trustworthy social computing and secure elections, and to identify deep fake videos.<\/p>\n<hr>\n<div class=\"cl-tiles halves\">\n<div><\/div>\n<div><\/div>\n<\/div>\n<hr>\n<h2>Faculty<\/h2>\n\n<section class=\"cl-wrapper cl-quote-wrapper\"><div class=\"cl-quote  \"><blockquote>We need to protect data, people and the national infrastructure. I am driven by a sense of urgency to combat these threats to our security.<\/blockquote><cite>Yan Sun<\/cite><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>With computers networks reaching into all aspects of life, keeping data secure is central to the well-being, security, and productivity of our society. One of our most important security priorities is protecting the domestic power grid. Professor Yan (Lindsay) Sun has pioneered a holistic approach to addressing power grid security challenges by analyzing information, signal [&hellip;]<\/p>\n","protected":false},"author":4861,"featured_media":0,"parent":32303,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-34697","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/pages\/34697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/users\/4861"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/comments?post=34697"}],"version-history":[{"count":0,"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/pages\/34697\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/pages\/32303"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/engineering\/wp-json\/wp\/v2\/media?parent=34697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}