• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Trends
  • Home
  • / ...
  • /Tech News
  • /Trends

The Weakest Link in Cyber Systems Wears Spectacles

By David Nicol, Editor in Chief, IEEE Security and Privacy

By David Nicol, Editor in Chief, IEEE Security and Privacy on
October 8, 2019
Cybersecurity MonthCybersecurity Month The owner of a small firm responds to an email apparently from the company’s bank, but as a result of the interaction the company’s bank account is cleaned out, wired to an account in Eastern Europe. The purchasing manager of a large company opens a spreadsheet which proports to come from the CFO, but as a result locks the entire company’s IT system up with ransomware. An eager-to-help member of a company’s IT help desk resets a caller’s password after being convinced that the caller is a legitimate user with a problem, but instead hands over a legitimate user’s account to an attacker. A production manager buys a number of inexpensive networked webcams for deployment through the factory, but it turns out that the webcams have hard-wired impossible-to-change passwords which can be discovered on the Internet, an intruder is able to take control of them all and use them as part of a massive army of bots which generate network traffic aimed at a victim IP address. An engineer uses the same password for her bank, her email account, and her on-line account at an internet merchant site. A cyber-attacker penetrates that merchant’s system, gathers all account information, and after running off-line a password cracking program obtains the password of many users, including the engineer. The intruder runs programs that automatically attempt to log in to other Internet sites using discovered email addresses as ids with their paired passwords, and because the engineer used the same password at the bank as at the merchant, the intruder gains access to the engineer’s bank account. Related: During Cybersecurity Month 2019, we offer you the free Oct. 23 webinar "Lessons Learned from Snowden's former NSA boss: Strategies to protect your data." Sign up now and get bonus content of three exclusive articles! These stories have all actually happened or are similar to stories that have happened. The common theme is that people interacting with information systems perform actions that turn out to have significant negative consequences. People are the weakest link in cyber systems. The first line of defense against cyber malfeasance is human awareness of what is happening, what can happen, how it happens, how it can be kept from happening. IEEE Security and Privacy is a magazine devoted to increasing the awareness of its readership to issues like these. Articles in IEEE S&P target a broad spectrum of readers and cover a broad spectrum of topics. An article is expected to provide a view of a topical area, to educate the reader. Recent issues have focused on advances in digital forensics, cyber-security in the Internet of Things, and on the impact of the European GDPR privacy. Planned issues include foci on cyber-security policy, and on hardware-based support for cyber-security. IEEE S&P keeps the computing professional apprised of threats, and counters to those threats in the rapidly changing field of cyber-security.
LATEST NEWS
How to Evaluate LLMs and GenAI Workflows Holistically
How to Evaluate LLMs and GenAI Workflows Holistically
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

How to Evaluate LLMs and GenAI Workflows Holistically

The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent

Exploring the Elegance and Applications of Complexity and Learning in Computer Science

IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award

IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol

Celebrate IEEE Day 2025 with the IEEE Computer Society

Building Community Through Technology: Sardar Patel Institute of Technology (SPIT) Student Chapter Report

IEEE CS and ACM Announce Recipients of 2025 George Michael Memorial HPC Fellowship