- Mathematics, Computing, and Statistics
Lauren E. Provost, who joined the faculty in Fall 2018, earned her doctorate from the University of New Hampshire in mathematics education after an undergraduate degree in computer science at the University of Texas at Austin. Her teaching areas include networking and information assurance, operating systems, computer architecture and special topics in cybersecurity. Lauren Provost’s research area is cybersecurity. She seeks to understand the way users impact the cybersecurity of organizations and the ways training and other methods can impact information security. Users are a key component of any information technology system. Inappropriate or unsafe user behavior is a leading factor in cybersecurity events. Cybersecurity events happen within complex ecosystems; understanding security awareness and security-responsible behavior in relation to users is critical in advancing the field of cybersecurity. Her publications span these areas.
Provost has held various leadership and service positions, including being charged with providing expertise on gender and computer science pathways, appointed by then Governor and now Senator Maggie Hassan along with the New Hampshire Governor’s STEM Task Force. She played a similar role on the Massachusetts Mathematics and Science Advisory Council. She speaks regularly at local and national events regarding equity and STEM pathways. Nationally, she advises the Policy Program Committee for the STEM Equity Pipeline and the National Alliance for Partnerships in Equity (NAPE), enhancing federal legislative activity affecting gender equity in computer science education and workforce development. You can learn more about her work at her website.
What I Teach
- CS 227: Computer Networks
- CS 226: Computer Organization and Architecture
- CS 345: Operating Systems
- CS 327: Cybersecurity
I am currently conducting several case studies with different STEM industries relating to the human factor in cybersecurity. Along with my published articles in journals and conference proceedings, I have a series of working papers at various stages. Each relates to cybersecurity as the digital world remains more vulnerable than ever. Technology uses have shifted dramatically recently, especially with cloud computing and mobility. Technology is one factor in cybersecurity, yet security holes can be created by humans accidentally, via negligence or maliciously. In fact, it is widely acknowledged that employees of an organization are often the weak link in the protection of information and other digital assets. Although some attention has been given to the human factor in cybersecurity, I argue that current frameworks for research are limited in scope and unable to address the complexity of human factors. My research seeks to identify, understand and prevent human factors that relate to technical computer and information security vulnerabilities.
Learn more at the Ethical Hackers facebook page.