Skip to content
ADVERTISEMENT
Sign In
  • Sections
    • News
    • Advice
    • The Review
  • Topics
    • Data
    • Diversity, Equity, & Inclusion
    • Finance & Operations
    • International
    • Leadership & Governance
    • Teaching & Learning
    • Scholarship & Research
    • Student Success
    • Technology
    • Transitions
    • The Workplace
  • Magazine
    • Current Issue
    • Special Issues
    • Podcast: College Matters from The Chronicle
  • Newsletters
  • Virtual Events
  • Ask Chron
  • Store
    • Featured Products
    • Reports
    • Data
    • Collections
    • Back Issues
  • Jobs
    • Find a Job
    • Post a Job
    • Professional Development
    • Career Resources
    • Virtual Career Fair
  • More
  • Sections
    • News
    • Advice
    • The Review
  • Topics
    • Data
    • Diversity, Equity, & Inclusion
    • Finance & Operations
    • International
    • Leadership & Governance
    • Teaching & Learning
    • Scholarship & Research
    • Student Success
    • Technology
    • Transitions
    • The Workplace
  • Magazine
    • Current Issue
    • Special Issues
    • Podcast: College Matters from The Chronicle
  • Newsletters
  • Virtual Events
  • Ask Chron
  • Store
    • Featured Products
    • Reports
    • Data
    • Collections
    • Back Issues
  • Jobs
    • Find a Job
    • Post a Job
    • Professional Development
    • Career Resources
    • Virtual Career Fair
    Upcoming Events:
    An AI-Driven Work Force
    AI and Microcredentials
Sign In
News

Computer-Security Experts Urge Researchers to Restructure Networks

By Dan Carnevale December 5, 2003

Computer-security experts called on researchers last month to develop long-term cures for security problems instead of just creating “patches” to fix immediate failures.

Eugene Spafford, director of the Center for Education and Research in Information Assurance and Security at Purdue University, told a news conference here that computer scientists should rethink the construction of computer networks so that security is embedded, effective, and easy to use. But smaller, immediate security problems are getting in the way of accomplishing that goal, he said.

To continue reading for FREE, please sign in.

Sign In

Or subscribe now to read with unlimited access for as low as $10/month.

Don’t have an account? Sign up now.

A free account provides you access to a limited number of free articles each month, plus newsletters, job postings, salary data, and exclusive store discounts.

Sign Up

Computer-security experts called on researchers last month to develop long-term cures for security problems instead of just creating “patches” to fix immediate failures.

Eugene Spafford, director of the Center for Education and Research in Information Assurance and Security at Purdue University, told a news conference here that computer scientists should rethink the construction of computer networks so that security is embedded, effective, and easy to use. But smaller, immediate security problems are getting in the way of accomplishing that goal, he said.

“Near-term needs are so pressing that they have soaked up most of the resources and most of the funding and left little for long-term thinking,” Mr. Spafford said. “It’s an ongoing arms race in cyberspace.”

The Computing Research Association and the Association for Computing Machinery organized the news briefing for Mr. Spafford and four other experts to present their conclusions after a four-day conference in Virginia. The briefing also followed a recent announcement by the National Science Foundation that the agency will soon start accepting research proposals for improving computer security under its Cyber Trust program.

Mr. Spafford, who has helped advise the science foundation on computer-security matters, said that some people are choosing not to go online because they are fed up with spam and sick of viruses. With greater network security, he said, people will do more online and better services will become available.

He proposed that researchers should meet four “grand challenges” within 10 years. He identified those challenges as:

  • Stopping the spam, viruses, worms, and denial-of-service attacks that cripple computer networks.
  • Developing tools to create large-scale networks that are highly trustworthy despite being an attractive target for hackers.
  • Creating systems that allow users to be comfortable controlling their own privacy and security.
  • Creating risk-management analyses for computer systems that are as reliable as risk-management analyses for financial investments.

Susan Landau, senior staff engineer at Sun Microsystems, had just begun a presentation on building trustworthy computer networks when her computer slide show went on the fritz. “The problem is, we have a large network environment that doesn’t behave,” she said to laughter in the audience. After the problem was fixed, she added, “We really did not try to plan it this way.”

Medical care could improve tremendously if computer networks were dependable and secure enough to put crucial patient information online, Ms. Landau said. But doctors don’t want to rely on computer networks that could jeopardize the accuracy and confidentiality of patient information. “You need trustworthiness in your networks,” she said.

Dan Geer, an independent security consultant, said risk analyses are important because managers have trouble making decisions about network security without considering the costs and benefits. He encouraged researchers to develop ways to measure security risks. Right now, he said, managers might think they’re spending too much on security if no problems occur.

“We have to have a way to measure things,” Mr. Geer said. “We cannot manage if we cannot measure.”

The other two speakers were Annie I. Antón, an associate professor of software engineering at North Carolina State University, and John Richardson, government technical-liaison director at Intel.

ADVERTISEMENT

Carl E. Landwehr, program director for Cyber Trust at the National Science Foundation, was not at the event but said he hoped it will encourage researchers across the country to come up with proposals for redesigning computer networks and security standards.

“NSF’s special role relative to other research funders, in the government even, is the long-term approach,” Mr. Landwehr says. “NSF tries to energize the research community in some direction, and this is a direction we think we need to go.”

Mr. Spafford said accomplishing the “grand challenges” within 10 years was not just wishful thinking. He used the example of the growth of the telephone industry. Years ago, when relatively few people had telephones, people picked up the receiver and asked the operator to connect them with another party. The operator would manually connect wires to make the call go through.

At the time, observers saw telephone use growing so rapidly that eventually, as Mr. Spafford put it, “everybody would have to be a telephone operator.”

ADVERTISEMENT

And that has, in fact, come true, he said. Because everyone feels comfortable dialing numbers, there is relatively little need for telephone operators any longer. He hopes the same can happen for computer security.

Congress passed a bill last year to authorize more spending on cybersecurity research. Mr. Spafford said he hoped that more money could be made available to help researchers create secure computer networks. “What progress has been made tends to be very episodic,” he said.


http://chronicle.com Section: Information Technology Volume 50, Issue 15, Page A22

We welcome your thoughts and questions about this article. Please email the editors or submit a letter for publication.
Tags
Technology
Share
  • Twitter
  • LinkedIn
  • Facebook
  • Email
ADVERTISEMENT
ADVERTISEMENT

More News

Photo illustration showing internal email text snippets over a photo of a University of Iowa campus quad
Red-state reticence
Facing Research Cuts, Officials at U. of Iowa Spoke of a ‘Limited Ability to Publicly Fight This’
Photo illustration showing Santa Ono seated, places small in the corner of a dark space
'Unrelentingly Sad'
Santa Ono Wanted a Presidency. He Became a Pariah.
Illustration of a rushing crowd carrying HSI letters
Seeking precedent
Funding for Hispanic-Serving Institutions Is Discriminatory and Unconstitutional, Lawsuit Argues
Photo-based illustration of scissors cutting through paper that is a photo of an idyllic liberal arts college campus on one side and money on the other
Finance
Small Colleges Are Banding Together Against a Higher Endowment Tax. This Is Why.

From The Review

Football game between UCLA and Colorado University, at Folsom Field in Boulder, Colo., Sept. 24, 2022.
The Review | Opinion
My University Values Football More Than Education
By Sigman Byrd
Photo- and type-based illustration depicting the acronym AAUP with the second A as the arrow of a compass and facing not north but southeast.
The Review | Essay
The Unraveling of the AAUP
By Matthew W. Finkin
Photo-based illustration of the Capitol building dome propped on a stick attached to a string, like a trap.
The Review | Opinion
Colleges Can’t Trust the Federal Government. What Now?
By Brian Rosenberg

Upcoming Events

Plain_Acuity_DurableSkills_VF.png
Why Employers Value ‘Durable’ Skills
Warwick_Leadership_Javi.png
University Transformation: a Global Leadership Perspective
Lead With Insight
  • Explore Content
    • Latest News
    • Newsletters
    • Letters
    • Free Reports and Guides
    • Professional Development
    • Virtual Events
    • Chronicle Store
    • Chronicle Intelligence
    • Jobs in Higher Education
    • Post a Job
  • Know The Chronicle
    • About Us
    • Vision, Mission, Values
    • DEI at The Chronicle
    • Write for Us
    • Work at The Chronicle
    • Our Reporting Process
    • Advertise With Us
    • Brand Studio
    • Accessibility Statement
  • Account and Access
    • Manage Your Account
    • Manage Newsletters
    • Individual Subscriptions
    • Group and Institutional Access
    • Subscription & Account FAQ
  • Get Support
    • Contact Us
    • Reprints & Permissions
    • User Agreement
    • Terms and Conditions
    • Privacy Policy
    • California Privacy Policy
    • Do Not Sell My Personal Information
1255 23rd Street, N.W. Washington, D.C. 20037
© 2025 The Chronicle of Higher Education
The Chronicle of Higher Education is academe’s most trusted resource for independent journalism, career development, and forward-looking intelligence. Our readers lead, teach, learn, and innovate with insights from The Chronicle.
Follow Us
  • twitter
  • instagram
  • youtube
  • facebook
  • linkedin