  {"id":514,"date":"2020-03-24T18:48:32","date_gmt":"2020-03-24T18:48:32","guid":{"rendered":"https:\/\/wwwdev.smca.ucf.edu\/research\/?page_id=58"},"modified":"2026-02-18T14:46:36","modified_gmt":"2026-02-18T14:46:36","slug":"cyber-security-privacy","status":"publish","type":"page","link":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/","title":{"rendered":"Cyber Security and Privacy"},"content":{"rendered":"<p>Âé¶¹Ó³»­´«Ã½\u2019s Cyber Security and Privacy Cluster is on the cutting edge of data protection by not only understanding and exploring existing ways to stay secure but also inventing new ones. The cluster also focuses on understanding the social implications new technology and the Internet of Things have\u00a0on our daily lives.<\/p>\n<p>This research provides the modern world with much needed solutions to both the human and the technological causes of security and privacy problems. This aids people, businesses and the government and enhances faculty expertise for teaching students.<\/p>\n<p>Security and privacy problems can involve human users, physical facilities, hardware, software, communication protocols and potential attackers.<\/p>\n<p>The cluster spans many disciplines\u00a0\u2013\u00a0computer science, computer engineering, industrial engineering and management systems, legal studies, mathematics, optics and photonics, philosophy, political science, psychology and statistics \u2013 to meet these security and privacy challenges head on.<\/p>\n","protected":false},"excerpt":{"rendered":"Âé¶¹Ó³»­´«Ã½\u2019s Cyber Security and Privacy Cluster is on the cutting edge of data protection by not only understanding and exploring existing ways to stay secure but also inventing new ones. The cluster also focuses on understanding the social implications new technology and the Internet of Things have\u00a0on our daily lives. This research provides the modern&hellip;","protected":false},"author":6,"featured_media":875,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-template-cluster.php","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"class_list":["post-514","page","type-page","status-publish","has-post-thumbnail","hentry","category-cluster"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security &amp; Privacy | Âé¶¹Ó³»­´«Ã½ Faculty Cluster Initiative<\/title>\n<meta name=\"description\" content=\"This cluster will focus on security (a technical construct), privacy (a social construct) and their intersection (a socio-technical system).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security &amp; Privacy | Âé¶¹Ó³»­´«Ã½ Faculty Cluster Initiative\" \/>\n<meta property=\"og:description\" content=\"This cluster will focus on security (a technical construct), privacy (a social construct) and their intersection (a socio-technical system).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Research\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-18T14:46:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"409\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/\",\"url\":\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/\",\"name\":\"Cyber Security & Privacy | Âé¶¹Ó³»­´«Ã½ Faculty Cluster Initiative\",\"isPartOf\":{\"@id\":\"https:\/\/www.ucf.edu\/research\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg\",\"datePublished\":\"2020-03-24T18:48:32+00:00\",\"dateModified\":\"2026-02-18T14:46:36+00:00\",\"description\":\"This cluster will focus on security (a technical construct), privacy (a social construct) and their intersection (a socio-technical system).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#primaryimage\",\"url\":\"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg\",\"contentUrl\":\"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg\",\"width\":1280,\"height\":409,\"caption\":\"Âé¶¹Ó³»­´«Ã½ Cyber lap opening group shot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ucf.edu\/research\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security and Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ucf.edu\/research\/#website\",\"url\":\"https:\/\/www.ucf.edu\/research\/\",\"name\":\"Research\",\"description\":\"Just another EDURES CMS QA Admin site Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ucf.edu\/research\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security & Privacy | Âé¶¹Ó³»­´«Ã½ Faculty Cluster Initiative","description":"This cluster will focus on security (a technical construct), privacy (a social construct) and their intersection (a socio-technical system).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security & Privacy | Âé¶¹Ó³»­´«Ã½ Faculty Cluster Initiative","og_description":"This cluster will focus on security (a technical construct), privacy (a social construct) and their intersection (a socio-technical system).","og_url":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/","og_site_name":"Research","article_modified_time":"2026-02-18T14:46:36+00:00","og_image":[{"width":1280,"height":409,"url":"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/","url":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/","name":"Cyber Security & Privacy | Âé¶¹Ó³»­´«Ã½ Faculty Cluster Initiative","isPartOf":{"@id":"https:\/\/www.ucf.edu\/research\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg","datePublished":"2020-03-24T18:48:32+00:00","dateModified":"2026-02-18T14:46:36+00:00","description":"This cluster will focus on security (a technical construct), privacy (a social construct) and their intersection (a socio-technical system).","breadcrumb":{"@id":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#primaryimage","url":"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg","contentUrl":"https:\/\/www.ucf.edu\/research\/wp-content\/uploads\/sites\/2\/2020\/06\/cyber_lab_group_shot.jpg","width":1280,"height":409,"caption":"Âé¶¹Ó³»­´«Ã½ Cyber lap opening group shot"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ucf.edu\/research\/"},{"@type":"ListItem","position":2,"name":"Cyber Security and Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.ucf.edu\/research\/#website","url":"https:\/\/www.ucf.edu\/research\/","name":"Research","description":"Just another EDURES CMS QA Admin site Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ucf.edu\/research\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/pages\/514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/comments?post=514"}],"version-history":[{"count":63,"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/pages\/514\/revisions"}],"predecessor-version":[{"id":6167,"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/pages\/514\/revisions\/6167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/media\/875"}],"wp:attachment":[{"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/media?parent=514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ucf.edu\/research\/wp-json\/wp\/v2\/categories?post=514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}