CINXE.COM
Design – IEEE Cybersecurity
<!DOCTYPE html> <html class="no-js" lang="en-US"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <link rel="profile" href="http://gmpg.org/xfn/11" /> <link rel="pingback" href="https://cybersecurity.ieee.org/xmlrpc.php" /> <title>Design – IEEE Cybersecurity</title> <meta name='robots' content='max-image-preview:large' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel="alternate" type="application/rss+xml" title="IEEE Cybersecurity » Feed" href="https://cybersecurity.ieee.org/feed/" /> <link rel="alternate" type="application/rss+xml" title="IEEE Cybersecurity » Comments Feed" href="https://cybersecurity.ieee.org/comments/feed/" /> <link rel="alternate" type="text/calendar" title="IEEE Cybersecurity » iCal Feed" href="https://cybersecurity.ieee.org/events/?ical=1" /> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/cybersecurity.ieee.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='dashicons-css' href='https://cybersecurity.ieee.org/wp-includes/css/dashicons.min.css?ver=6.6.1' type='text/css' media='all' /> <link rel='stylesheet' id='elusive-css' href='https://cybersecurity.ieee.org/wp-content/plugins/menu-icons/vendor/codeinwp/icon-picker/css/types/elusive.min.css?ver=2.0' type='text/css' media='all' /> <link rel='stylesheet' id='menu-icon-font-awesome-css' href='https://cybersecurity.ieee.org/wp-content/plugins/menu-icons/css/fontawesome/css/all.min.css?ver=5.15.4' type='text/css' media='all' /> <link rel='stylesheet' id='foundation-icons-css' href='https://cybersecurity.ieee.org/wp-content/plugins/menu-icons/vendor/codeinwp/icon-picker/css/types/foundation-icons.min.css?ver=3.0' type='text/css' media='all' /> <link rel='stylesheet' id='genericons-css' href='https://cybersecurity.ieee.org/wp-content/plugins/menu-icons/vendor/codeinwp/icon-picker/css/types/genericons.min.css?ver=3.4' type='text/css' media='all' /> <link rel='stylesheet' id='menu-icons-extra-css' href='https://cybersecurity.ieee.org/wp-content/plugins/menu-icons/css/extra.min.css?ver=0.13.16' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://cybersecurity.ieee.org/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1' type='text/css' media='all' /> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='cptch_stylesheet-css' href='https://cybersecurity.ieee.org/wp-content/plugins/captcha/css/front_end_style.css?ver=4.4.5' type='text/css' media='all' /> <link rel='stylesheet' id='cptch_desktop_style-css' href='https://cybersecurity.ieee.org/wp-content/plugins/captcha/css/desktop_style.css?ver=4.4.5' type='text/css' media='all' /> <link rel='stylesheet' id='mh-style-css' href='https://cybersecurity.ieee.org/wp-content/themes/mh_newsdesk/style.css?ver=1.2.2' type='text/css' media='all' /> <link rel='stylesheet' id='mh-font-awesome-css' href='https://cybersecurity.ieee.org/wp-content/themes/mh_newsdesk/includes/font-awesome.min.css' type='text/css' media='all' /> <link rel='stylesheet' id='mh-google-fonts-css' href='https://fonts.googleapis.com/css?family=PT+Serif:300,400,400italic,600,700%7cOswald:300,400,400italic,600,700' type='text/css' media='all' /> <script type="text/javascript" src="https://cybersecurity.ieee.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://cybersecurity.ieee.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://cybersecurity.ieee.org/wp-content/themes/mh_newsdesk/js/scripts.js?ver=6.6.1" id="mh-scripts-js"></script> <script type="text/javascript" src="https://cybersecurity.ieee.org/wp-content/plugins/google-analyticator/external-tracking.min.js?ver=6.5.7" id="ga-external-tracking-js"></script> <link rel="https://api.w.org/" href="https://cybersecurity.ieee.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://cybersecurity.ieee.org/wp-json/wp/v2/pages/8" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://cybersecurity.ieee.org/xmlrpc.php?rsd" /> <link rel="canonical" href="https://cybersecurity.ieee.org/center-for-secure-design/" /> <link rel='shortlink' href='https://cybersecurity.ieee.org/?p=8' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://cybersecurity.ieee.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fcybersecurity.ieee.org%2Fcenter-for-secure-design%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://cybersecurity.ieee.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fcybersecurity.ieee.org%2Fcenter-for-secure-design%2F&format=xml" /> <meta name="tec-api-version" content="v1"><meta name="tec-api-origin" content="https://cybersecurity.ieee.org"><link rel="alternate" href="https://cybersecurity.ieee.org/wp-json/tribe/events/v1/" /><!--[if lt IE 9]> <script src="https://cybersecurity.ieee.org/wp-content/themes/mh_newsdesk/js/css3-mediaqueries.js"></script> <![endif]--> <style type="text/css"></style> <style> .synved-social-resolution-single { display: inline-block; } .synved-social-resolution-normal { display: inline-block; } .synved-social-resolution-hidef { display: none; } @media only screen and (min--moz-device-pixel-ratio: 2), only screen and (-o-min-device-pixel-ratio: 2/1), only screen and (-webkit-min-device-pixel-ratio: 2), only screen and (min-device-pixel-ratio: 2), only screen and (min-resolution: 2dppx), only screen and (min-resolution: 192dpi) { .synved-social-resolution-normal { display: none; } .synved-social-resolution-hidef { display: inline-block; } } </style><link rel="icon" href="https://cybersecurity.ieee.org/wp-content/uploads/2016/05/ieee_apple_favicon_57x57.png" sizes="32x32" /> <link rel="icon" href="https://cybersecurity.ieee.org/wp-content/uploads/2016/05/ieee_apple_favicon_57x57.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://cybersecurity.ieee.org/wp-content/uploads/2016/05/ieee_apple_favicon_57x57.png" /> <meta name="msapplication-TileImage" content="https://cybersecurity.ieee.org/wp-content/uploads/2016/05/ieee_apple_favicon_57x57.png" /> <!-- Google Analytics Tracking by Google Analyticator 6.5.7 --> <script type="text/javascript"> var analyticsFileTypes = []; var analyticsSnippet = 'disabled'; var analyticsEventTracking = 'enabled'; </script> <script type="text/javascript"> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-5565007-49', 'auto'); ga('set', 'anonymizeIp', true); ga('send', 'pageview'); </script> <style id="sccss">/* keep current menu item highlighted */ li.current-menu-item { background: #005A8C; } .entry-meta {float: right;} /* logo in header placement */ .logo-wrap img {padding-top: 20px;}</style><!-- ## NXS/OG ## --><!-- ## NXSOGTAGS ## --><!-- ## NXS/OG ## --> <script src="https://cmp.osano.com/AzyzptTmRlqVd2LRf/d048ee06-a2b2-4547-8c3d-a5f9c80716d1/osano.js"></script> <link rel="stylesheet" href="https://cookie-consent.ieee.org/ieee-cookie-banner.css" type="text/css"/> </head> <body class="page-template page-template-template-full page-template-template-full-php page page-id-8 tribe-no-js page-template-mh-newsdesk mh-right-sb"> <div class="header-top"> <div class="wrapper-inner clearfix"> <nav class="header-nav clearfix"> <div class="menu-top-nav-container"><ul id="menu-top-nav" class="menu"><li id="menu-item-192" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-192"><a href="http://www.ieee.org/">IEEE.org</a></li> <li id="menu-item-15" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-15"><a href="http://ieeexplore.ieee.org/">IEEE Xplore Digital Library</a></li> <li id="menu-item-16" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-16"><a href="http://standards.ieee.org/">IEEE Standards</a></li> <li id="menu-item-195" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-195"><a href="http://spectrum.ieee.org/">IEEE Spectrum</a></li> <li id="menu-item-22" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-22"><a href="http://www.ieee.org/sitemap">More Sites</a></li> </ul></div> </nav> <nav class="social-nav clearfix"> </nav> </div> </div> <div id="mh-wrapper"> <header class="mh-header"> <div class="header-wrap clearfix"> <div class="mh-col mh-1-3 header-logo-full"> <a href="https://cybersecurity.ieee.org/" title="IEEE Cybersecurity" rel="home"> <div class="logo-wrap" role="banner"> <img src="https://cybersec-prod.s3.amazonaws.com/wp-content/uploads/2015/11/17222948/ieee-cybersecurity-logo-280x125.png" height="125" width="280" alt="IEEE Cybersecurity" /> </div> </a> </div> </div> <div class="header-menu clearfix"> <nav class="main-nav clearfix"> <div class="menu-main-container"><ul id="menu-main" class="menu"><li id="menu-item-191" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-191"><a href="http://ieeecybersec.wpengine.com">Home</a></li> <li id="menu-item-634" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-634"><a href="https://cybersecurity.ieee.org/interview/">Interviews</a></li> <li id="menu-item-212" class="menu-item menu-item-type-post_type menu-item-object-page current-menu-item page_item page-item-8 current_page_item menu-item-212"><a href="https://cybersecurity.ieee.org/center-for-secure-design/" aria-current="page">Design</a></li> <li id="menu-item-96" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-96"><a href="https://cybersecurity.ieee.org/try-cybsi/">Try</a></li> <li id="menu-item-635" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-635"><a href="https://cybersecurity.ieee.org/read/">Read</a></li> <li id="menu-item-643" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-643"><a href="https://cybersecurity.ieee.org/attend/">Attend</a></li> <li id="menu-item-782" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-782"><a href="http://ieeecybersec.wpengine.com/cybsi-ambassadors/">Invite</a></li> <li id="menu-item-213" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-213"><a href="https://cybersecurity.ieee.org/about/">About</a></li> <li id="menu-item-154" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-154"><a href="https://cybersecurity.ieee.org/leadership/">Leadership</a></li> <li id="menu-item-156" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-156"><a href="https://cybersecurity.ieee.org/press/">Press</a></li> <li id="menu-item-472" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-472"><a target="_blank" rel="noopener" href="https://twitter.com/ieeecybsi"><i class="_mi dashicons dashicons-twitter" aria-hidden="true"></i><span class="visuallyhidden">Twitter</span></a></li> <li id="menu-item-474" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-474"><a target="_blank" rel="noopener" href="https://www.facebook.com/ieeecybsi/"><i class="_mi dashicons dashicons-facebook-alt" aria-hidden="true"></i><span class="visuallyhidden">Facebook</span></a></li> <li id="menu-item-479" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-479"><a target="_blank" rel="noopener" href="https://www.linkedin.com/groups/8519362"><i class="_mi genericon genericon-linkedin" aria-hidden="true"></i><span class="visuallyhidden">LinkedIn</span></a></li> </ul></div> </nav> <div class="header-sub clearfix"> <div id="ticker" class="news-ticker mh-col mh-2-3 clearfix"> <span class="ticker-title"> Recently Published </span> <ul class="ticker-content"> <li class="ticker-item"> <a class="ticker-item-link" href="https://cybersecurity.ieee.org/blog/2018/10/02/ieee-cybersecurity-award-winners/" title="IEEE Cybersecurity Award Winners"> <span class="ticker-item-date">October 2, 2018</span> <span class="ticker-item-separator">|</span> <span class="ticker-item-title">IEEE Cybersecurity Award Winners</span> </a> </li> <li class="ticker-item"> <a class="ticker-item-link" href="https://cybersecurity.ieee.org/blog/2018/10/01/save-the-date-for-secdev-2019/" title="Save the Date for SecDev 2019"> <span class="ticker-item-date">October 1, 2018</span> <span class="ticker-item-separator">|</span> <span class="ticker-item-title">Save the Date for SecDev 2019</span> </a> </li> <li class="ticker-item"> <a class="ticker-item-link" href="https://cybersecurity.ieee.org/blog/2018/01/31/ieee-secdev-2018-call-for-papers/" title="IEEE SecDev 2018 Call for Papers"> <span class="ticker-item-date">January 31, 2018</span> <span class="ticker-item-separator">|</span> <span class="ticker-item-title">IEEE SecDev 2018 Call for Papers</span> </a> </li> <li class="ticker-item"> <a class="ticker-item-link" href="https://cybersecurity.ieee.org/blog/2017/12/13/robert-cunningham-on-advancing-the-art-and-science-of-cybersecurity/" title="Robert Cunningham on Advancing the Art and Science of Cybersecurity"> <span class="ticker-item-date">December 13, 2017</span> <span class="ticker-item-separator">|</span> <span class="ticker-item-title">Robert Cunningham on Advancing the Art and Science of Cybersecurity</span> </a> </li> <li class="ticker-item"> <a class="ticker-item-link" href="https://cybersecurity.ieee.org/blog/2017/12/06/ieee-trycybsi-partners-on-why-active-learning-is-key-for-mastering-cybersecurity/" title="IEEE TryCybSI Partners on Why Active Learning is Key for Mastering Cybersecurity"> <span class="ticker-item-date">December 6, 2017</span> <span class="ticker-item-separator">|</span> <span class="ticker-item-title">IEEE TryCybSI Partners on Why Active Learning is Key for Mastering Cybersecurity</span> </a> </li> </ul> </div> <aside class="mh-col mh-1-3 header-search"> <form role="search" method="get" class="search-form" action="https://cybersecurity.ieee.org/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Search …" value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form> </aside> </div> </div> </header><div class="page-full-width"><nav class="breadcrumb"><span itemscope itemtype="http://data-vocabulary.org/Breadcrumb"><a href="https://cybersecurity.ieee.org" itemprop="url" class="bc-home"><span itemprop="title">Home</span></a></span> <span class="bc-text">Design</span></nav> <article id="post-8" class="post-8 page type-page status-publish hentry"> <header class="entry-header"> <h1 class="entry-title page-title"> Design </h1> </header> <div class="entry-content clearfix"> <div class="su-row"><div class="su-column su-column-size-1"><div class="su-column-inner su-u-clearfix su-u-trim"> <p><a href="https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/Building_Code_IoT_online.pdf" target="_blank" rel="noopener"><img fetchpriority="high" decoding="async" class="alignleft wp-image-1186" src="http://ieeecybersec.wpengine.com/wp-content/uploads/2017/10/Building_Code_IoT_cover-234x300.jpg" alt="" width="200" height="257" srcset="https://cybersecurity.ieee.org/wp-content/uploads/2017/10/Building_Code_IoT_cover-234x300.jpg 234w, https://cybersecurity.ieee.org/wp-content/uploads/2017/10/Building_Code_IoT_cover-768x985.jpg 768w, https://cybersecurity.ieee.org/wp-content/uploads/2017/10/Building_Code_IoT_cover-798x1024.jpg 798w" sizes="(max-width: 200px) 100vw, 200px" /></a></p> <h3>Building Code for the Internet of Things</h3> <p>The many characteristics that make the IoT different from traditional networked computing also require us to pay particular attention to how to make such systems safe and secure. This Building Code document focuses on the challenges associated with composing systems, rather than building individual programs or devices. We use the concept of smart cities to illustrate how design for safety, security, and privacy must consider emergent properties, and how a system or technology designed for this domain must account for how it might be integrated, reused, or composed with other technologies and systems.</p> </div></div> </div> <div class="su-row"><div class="su-column su-column-size-1"><div class="su-column-inner su-u-clearfix su-u-trim"> <p><a href="https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/BCPSSS.pdf"><img decoding="async" class="alignleft wp-image-1001" src="http://ieeecybersec.wpengine.com/wp-content/uploads/2016/06/BCPSSS-title-page-232x300.jpg" alt="" width="200" height="259" srcset="https://cybersecurity.ieee.org/wp-content/uploads/2016/06/BCPSSS-title-page-232x300.jpg 232w, https://cybersecurity.ieee.org/wp-content/uploads/2016/06/BCPSSS-title-page-768x994.jpg 768w, https://cybersecurity.ieee.org/wp-content/uploads/2016/06/BCPSSS-title-page-791x1024.jpg 791w" sizes="(max-width: 200px) 100vw, 200px" /></a></p> <h3>Building Code for Power System Software Security</h3> <p>Both the attractiveness of power systems as targets of cyberattack and their vulnerability to remote attack via digital networks has been made clear by recent world events. While policy makers seek means to deter such attacks politically, surely the most effective way to reduce their attractiveness as targets is to reduce their vulnerability to such attacks. The results of the workshop presented here have the objective of reducing the vulnerability of future power systems to remote attacks that exploit vulnerabilities in the code – software or firmware – that controls their operation.</p> </div></div> </div> <p> </p> <div class="su-row"><div class="su-column su-column-size-1"><div class="su-column-inner su-u-clearfix su-u-trim"> <h3><a href="https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/BCMDSS.pdf"><img decoding="async" class="alignleft wp-image-354 size-full" src="https://cybersecurity.ieee.org/wp-content/uploads/2015/11/BCMDSS-Cover.jpg" alt="Building Code for Medical Device Software Security Cover" width="200" height="261" /></a>Building Code for Medical Device Software Security</h3> <p>This document aims to start medical device software engineers toward a building code for software security that will reduce the vulnerability of their systems to malicious attacks, just as codes for physical buildings help their designers and builders create structures that resist threats from fire, wind, water, and in some cases, malicious attacks.</p> </div></div> </div> <div class="su-row"><div class="su-column su-column-size-1"><div class="su-column-inner su-u-clearfix su-u-trim"> <h2 class="article_title"><img loading="lazy" decoding="async" class="wp-image-333 size-medium alignnone" src="http://ieeecybersec.wpengine.com/wp-content/uploads/2015/11/IEE-14-TA-026-TA_CFSD_Logo_300dpi_CMYK-300x101.jpg" alt="IEEE CSD Logo" width="300" height="101" srcset="https://cybersecurity.ieee.org/wp-content/uploads/2015/11/IEE-14-TA-026-TA_CFSD_Logo_300dpi_CMYK-300x101.jpg 300w, https://cybersecurity.ieee.org/wp-content/uploads/2015/11/IEE-14-TA-026-TA_CFSD_Logo_300dpi_CMYK.jpg 777w" sizes="(max-width: 300px) 100vw, 300px" /></h2> <p class="article_title">The IEEE Center for Secure Design intends to shift some of the focus in security from finding bugs to identifying common design flaws — all in the hope that software architects can learn from others’ mistakes. To read more about what the Center for Secure Design is,<span class="Apple-converted-space"> </span><a href="http://ieeecybersec.wpengine.com/2014/08/27/facts-about-the-ieee-computer-societys-center-for-secure-design/">read the facts</a>.</p> <p>Center for Secure Design participants — from industry, research, and government — identified the top flaws found in their own internal design reviews, or that were available from external data. Many of the flaws that made the list have been well known for decades, but continue to persist.</p> <div class="su-row"></div> <div class="su-column su-column-size-1"><div class="su-column-inner su-u-clearfix su-u-trim"></div></div> <h3><a href="https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/Top-10-Flaws.pdf"><img loading="lazy" decoding="async" class="alignleft wp-image-353 size-full" src="https://cybersecurity.ieee.org/wp-content/uploads/2015/11/Top-10-Flaws-Cover.jpg" alt="Top 10 Flaws Cover" width="200" height="259" /></a>Avoiding the Top 10 Software Security Design Flaws</h3> <p>Most software built and released typically comes with a set of defects — implementation bugs and design flaws. While there has been a larger focus on finding bugs rather than on identifying flaws, this document intends to shift some of the focus in security from finding bugs to identifying design flaws in the hope that software architects can learn from others’ mistakes.</p> </div></div> </div> <div class="su-row"><div class="su-column su-column-size-1"><div class="su-column-inner su-u-clearfix su-u-trim"> <h3><a href="https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/CSD-telematics.pdf" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignleft wp-image-1248" src="http://ieeecybersec.wpengine.com/wp-content/uploads/2018/01/CSD-telematics-300x232.jpg" alt="" width="200" height="155" srcset="https://cybersecurity.ieee.org/wp-content/uploads/2018/01/CSD-telematics-300x232.jpg 300w, https://cybersecurity.ieee.org/wp-content/uploads/2018/01/CSD-telematics-768x593.jpg 768w, https://cybersecurity.ieee.org/wp-content/uploads/2018/01/CSD-telematics-1024x791.jpg 1024w" sizes="(max-width: 200px) 100vw, 200px" /></a>Design Flaws and Security Considerations for Telematics and Infotainment Systems</h3> <p>This document is a direct result of a discussion from experts on recurring security flaws and vulnerabilities identified within vehicle telematics and infotainment systems. The intended audience for this document is any entity involved in the design, build, implementation, and deployment of those systems.</p> <p> </p> </div></div> </div> <div class="su-row"><div class="su-column su-column-size-1"><div class="su-column-inner su-u-clearfix su-u-trim"> <h3><a href="http://ieeecybersec.wpengine.com/blog/2016/02/17/wearfit-security-design-analysis-of-a-wearable-fitness-tracker/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignleft wp-image-520" src="http://ieeecybersec.wpengine.com/wp-content/uploads/2016/05/WearFit-cover-235x300.jpg" alt="WearFit cover" width="200" height="255" srcset="https://cybersecurity.ieee.org/wp-content/uploads/2016/05/WearFit-cover-235x300.jpg 235w, https://cybersecurity.ieee.org/wp-content/uploads/2016/05/WearFit-cover-768x980.jpg 768w, https://cybersecurity.ieee.org/wp-content/uploads/2016/05/WearFit-cover-803x1024.jpg 803w" sizes="(max-width: 200px) 100vw, 200px" /></a>WearFit: Security Design Analysis of a Wearable Fitness Tracker</h3> <p>In the <a href="http://ieeecybersec.wpengine.com/center-for-secure-design/" target="_blank" rel="noopener">Center for Secure Design</a>‘s latest document, we look at how the <a href="http://ieeecybersec.wpengine.com/2015/11/13/avoiding-the-top-10-security-flaws/" target="_blank" rel="noopener">Top 10 Software Security Design Flaws</a> can be approached within a specific, albeit fictitious, wearable fitness tracking system: the WearFit. We base our analysis as much on real-world systems as possible, providing a broad analysis of threats facing users of wearable fitness-tracking devices.</p> </div></div> </div> <p>Avoiding the Top 10 Software Security Design Flaws is released under the<span class="Apple-converted-space"> </span><a href="http://creativecommons.org/licenses/by-sa/3.0/" target="_blank" rel="noopener">Creative Commons Attribution-ShareAlike 3.0 license</a>. Read more<span class="Apple-converted-space"> </span><a href="http://cybersecurity.aws.ieee.org/2015/11/18/public-access-encouraged/">here</a>.</p> <p>Stay on top of the Center's activities by following <a href="http://twitter.com/ieeecsd" target="_blank" rel="noopener">@ieeecsd on Twitter</a>.</p> </div> </article></div> </div> <footer class="mh-footer"> <div class="wrapper-inner clearfix"> </div> <div class="footer-bottom"> <div class="wrapper-inner clearfix"> <nav class="footer-nav clearfix"> <div class="menu-social-container"><ul id="menu-social" class="menu"><li id="menu-item-318" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-318"><a href="https://twitter.com/ieeecybsi"><i class="_mi dashicons dashicons-twitter" aria-hidden="true"></i><span class="visuallyhidden">Menu Item</span></a></li> <li id="menu-item-1272" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-1272"><a href="https://www.ieee.org/security-privacy.html">IEEE Privacy Policy</a></li> </ul></div> </nav> <div class="copyright-wrap"> <p class="copyright"> Copyright 2016 IEEE. All Rights Reserved. </p> </div> </div> </div> </footer> <script> ( function ( body ) { 'use strict'; body.className = body.className.replace( /\btribe-no-js\b/, 'tribe-js' ); } )( document.body ); </script> <script> /* <![CDATA[ */var tribe_l10n_datatables = {"aria":{"sort_ascending":": activate to sort column ascending","sort_descending":": activate to sort column descending"},"length_menu":"Show _MENU_ entries","empty_table":"No data available in table","info":"Showing _START_ to _END_ of _TOTAL_ entries","info_empty":"Showing 0 to 0 of 0 entries","info_filtered":"(filtered from _MAX_ total entries)","zero_records":"No matching records found","search":"Search:","all_selected_text":"All items on this page were selected. ","select_all_link":"Select all pages","clear_selection":"Clear Selection.","pagination":{"all":"All","next":"Next","previous":"Previous"},"select":{"rows":{"0":"","_":": Selected %d rows","1":": Selected 1 row"}},"datepicker":{"dayNames":["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"dayNamesShort":["Sun","Mon","Tue","Wed","Thu","Fri","Sat"],"dayNamesMin":["S","M","T","W","T","F","S"],"monthNames":["January","February","March","April","May","June","July","August","September","October","November","December"],"monthNamesShort":["January","February","March","April","May","June","July","August","September","October","November","December"],"monthNamesMin":["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],"nextText":"Next","prevText":"Prev","currentText":"Today","closeText":"Done","today":"Today","clear":"Clear"}};/* ]]> */ </script><script type="text/javascript">!function(t,e){"use strict";function n(){if(!a){a=!0;for(var t=0;t<d.length;t++)d[t].fn.call(window,d[t].ctx);d=[]}}function o(){"complete"===document.readyState&&n()}t=t||"docReady",e=e||window;var d=[],a=!1,c=!1;e[t]=function(t,e){return a?void setTimeout(function(){t(e)},1):(d.push({fn:t,ctx:e}),void("complete"===document.readyState||!document.attachEvent&&"interactive"===document.readyState?setTimeout(n,1):c||(document.addEventListener?(document.addEventListener("DOMContentLoaded",n,!1),window.addEventListener("load",n,!1)):(document.attachEvent("onreadystatechange",o),window.attachEvent("onload",n)),c=!0)))}}("wpBruiserDocReady",window); (function(){var wpbrLoader = (function(){var g=document,b=g.createElement('script'),c=g.scripts[0];b.async=1;b.src='https://cybersecurity.ieee.org/?gdbc-client=3.1.43-'+(new Date()).getTime();c.parentNode.insertBefore(b,c);});wpBruiserDocReady(wpbrLoader);window.onunload=function(){};window.addEventListener('pageshow',function(event){if(event.persisted){(typeof window.WPBruiserClient==='undefined')?wpbrLoader():window.WPBruiserClient.requestTokens();}},false);})(); </script><link rel='stylesheet' id='su-shortcodes-css' href='https://cybersecurity.ieee.org/wp-content/plugins/shortcodes-ultimate/includes/css/shortcodes.css?ver=7.3.1' type='text/css' media='all' /> </body> </html>