The New York Times A.P. Index October 8, 2002  

Home
Job Market
Real Estate
Automobiles
News
International
National
Politics
Business
Technology
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions


Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Multimedia/Photos
College
Learning Network
Services
Archive
Classifieds
Book a Trip
Personals
Theater Tickets
Premium Products
NYT Store
NYT Mobile
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Member_Center
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Privacy Policy
Newspaper
Home Delivery
Customer Service
Electronic Edition
Media Kit
Community Affairs
Text Version

Discover New Topics in Depth


Only $500 to Open an Internet Account


Ink Cartridges Cost too Much? We Can Help


Go to Advanced Search/Archive Go to Advanced Search/Archive Symbol Lookup
Search Optionsdivide
go to Member Center Log Out
  Welcome, malak

University to Study Combating Cyberterror

By THE ASSOCIATED PRESS

Filed at 3:41 p.m. ET

PITTSBURGH (AP) -- The Defense Department is giving Carnegie Mellon University $35.5 million to develop tools and tactics for fighting cyberterrorism.

The inventions to be researched and engineered at the top computer science school would serve equally well in battling hackers and Internet crooks.

``These problems have always existed. Terrorism only increased the visibility of these problems,'' said Pradeep Khosla, who heads the university's electrical and computer engineering department and directs the new Center for Computer and Communications Security.

Advertisement


The 5-year grant, combined with other federal, state and private funding, gives the center an $8 million budget this year.

Better technology is needed so Internet users can verify the identity of others and keep hackers from infiltrating computer networks, said Khosla.

The center is already researching ways to engineer artificial intelligence into hardware so that components such as disk drives could take countermeasures in a hacker attack. Such components would shut down and even automatically report an incident to network administrators

Researchers are also studying how to use signatures, fingerprints, iris patterns, face recognition technology and voice scans to confirm the identity of computer users.

Khosla believes some combination of those technologies will likely be used in the future.

``You may wear a mask so you look like me, but it's not likely that you're going to look like me, sign (your name) like me and sound like me,'' he said.

Some of the technologies could even be used outside cyberspace.

For example, computer-linked cameras could confirm the identity of an airline pilot and place the plane on autopilot if someone else took the controls or if the pilot unexpectedly left the camera's view, Khosla said.

^------

On the Net:

Center for Computer and Communications Security at http://www.ece.cmu.edu/c3s/





Doing research? Search the archive for more than 500,000 articles:




E-Mail This Article
Printer-Friendly Format
Most E-Mailed Articles

Wake up to the world with home delivery of The New York Times newspaper.
Click Here for 50% off.


Home | Back to A.P. | Search | Corrections | Help | Back to Top

Copyright The Associated Press | Privacy Policy
E-Mail This Article
Printer-Friendly Format
Most E-Mailed Articles


Track news that interests you.
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters


You can solve today's New York Times crossword puzzle online. Click here to learn more.