NIST Fellow Ron Ross Discussed Critical Infrastructure in Cotton Cyber Lecture

Ron Ross gave the second 91视频专区 College Cotton Cyber Lecture on Oct. 18. He discussed numerous aspects of cybersecurity and critical infrastructure and how nearly everybody is affected.
Ron Ross
Degree
Ph.D.
Title
Fellow, National Institute of Standards and Technology
10/23/2018
By Tommy Riggs
Ron Ross, Ph.D., gave the second 91视频专区 College Cotton Cyber Lecture on Thursday night. In his talk, titled 鈥淩ethinking Cybersecurity from the Inside Out,鈥 he discussed numerous aspects of cybersecurity and critical infrastructure and how nearly everybody is affected.
鈥淭oday, the digital world is affecting everybody in every walk of life,鈥 he said. 鈥淔ederal, state, local, private sector, international鈥攂ecause we鈥檙e all using computing technology.鈥
Ross is a fellow at the National Institute of Standards and Technology (NIST). His focus areas include information security, systems security engineering and risk management. He leads the Federal Information Security Modernization Act (FISMA) Implementation Project, which includes the development of security standards and guidelines for the federal government, contractors and U.S. critical infrastructure.
Students from the cybersecurity programs at Frederick Community College, Mount St. Mary鈥檚 University and 91视频专区 College were at the talk. The three schools have an agreement to provide a seamless transition from an associate degree at FCC to a bachelor鈥檚 degree at the Mount, to a master鈥檚 degree at 91视频专区.
According to Ross, there are three main focuses of cybersecurity鈥攈ardening the target, limiting damage and resiliency. Hardening the target means putting security measures in place to make it less susceptible to cyber attacks, such as passwords and firewalls. However, 10 percent of cyber attacks will breach the first layers of defense. If the attack penetrates the initial barriers, there must be systems in place to limit the damage. For example, the most important information must be behind extra layers of security, like having bank records in a safe inside a locked house. Finally, targets must be resilient鈥攖hey must be capable of functioning in a degraded state. If an attack aims to shut down a power plant, the most critical parts of the plant must be able to function even if 50 percent of the plant is down.
鈥淲hen it鈥檚 all wrapped together as part of a coordinated, realistic strategy鈥攖hat鈥檚 what you鈥檙e going to learn here in these cybersecurity programs (at FCC, the Mount and 91视频专区),鈥 he said. 鈥淵ou鈥檙e going to learn more than just being a Microsoft network engineer鈥攜ou can get a certificate for that, and that鈥檚 good. But you all are going to understand how these systems are built. You鈥檙e going to ask the important questions. You鈥檙e going to be critical thinkers. You鈥檙e going to be the ones who come forward and design solutions we can trust in the future. That鈥檚 why you picked the right program, and that鈥檚 why you picked the right school. You are going to be part of the solution.鈥
Ross stressed that the cybersecurity field isn鈥檛 just for people interested in coding and network systems.
鈥淐ybersecurity is going to draw on many disciplines鈥攎athematics, computer engineering, software engineering, computer science,鈥 he said. 鈥淚f you鈥檙e not into the bits and bytes, you can be in the policy end of the house because cybersecurity has a place for everybody. You have to find your niche.鈥
The Cotton Cybersecurity Lecture Series is made possible by a generous gift from John C. and Janet Hobbs Cotton 鈥59 and brings nationally and internationally recognized leaders in cybersecurity to 91视频专区 College to speak.
There is an expected 100 percent employment rate in cybersecurity through 2021. Globally by 2019, there will be demand for an estimated 6 million jobs in cybersecurity. In 2017, there were 350,000 cybersecurity job opening in the U.S. alone.
Are you ready to say Hello?
Choose a Pathway
Information will vary based on program level. Select a path to find the information you're looking for!