<?xml version="1.0"?>
<News hasArchived="true" page="15" pageCount="19" pageSize="10" timestamp="Tue, 28 Apr 2026 17:59:03 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?mode=pawpularity&amp;page=15">
<NewsItem contentIssues="true" id="80129" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80129">
<Title>Richard Forno: Threats remain to US voting system &#8211; and voters&#8217; perceptions of reality</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/file-20181106-74772-egm5dt_slider.jpg" style="max-width: 100%; height: auto;">As Americans go to the polls, the voting process and the information environment are still not secure. <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Election-2018-Georgia/c0c2653a5cff44eeb562ada74c3d17bc/3/0" rel="nofollow external" class="bo">AP Photo/David Goldman</a></span>
    <h1><strong>Threats remain to US voting system – and voters’ perceptions of reality</strong></h1>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence the American public’s choices when they cast their ballots.</p>
    <p>On the day of the election, there were a number of <a href="https://www.propublica.org/article/oops-we-forgot-to-plug-in-the-voting-machine" rel="nofollow external" class="bo">early hitches in voting at individual polling places</a>, such as <a href="https://bklyner.com/sloppy-start-on-election-day/" rel="nofollow external" class="bo">polling places opening late</a> and vote-counting machines not plugged in. But there seem not – at least not yet – to be major <a href="https://www.propublica.org/electionland/" rel="nofollow external" class="bo">problems across the country</a>.</p>
    <p>However, not all the election-related news and information voters have been encountering in recent days and weeks is accurate, and some of it is deliberately misleading. As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.</p>
    <h2>Securing election systems</h2>
    <p>America’s electoral process remains highly fragmented, because of the country’s cherished tradition of decentralized government and local control. While this may leave some individual communities’ voting equipment potentially vulnerable to attack, the nation’s voting process overall may be more trustworthy as a result of this fragmentation. With no unified government agency or office to provide, administer and protect election technologies, there’s not one central national element that could fail or be attacked.</p>
    <p>Across the country, though, many districts’ voters will cast ballots with the <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">help of machines</a> that have <a href="https://theconversation.com/americas-aging-voting-machines-managed-to-survive-another-election-68100" rel="nofollow external" class="bo">long-standing</a> <a href="https://theconversation.com/aging-voting-machines-threaten-election-integrity-54523" rel="nofollow external" class="bo">security concerns</a>. Fortunately, <a href="https://www.axios.com/five-states-without-paper-trail-of-votes-32801015-4ba1-4b41-80ca-ebab2cdda087.html" rel="nofollow external" class="bo">45 states</a> keep a paper record of each vote cast – whether for fear of threats to voting integrity or just <a href="https://www.the-parallax.com/2018/11/03/funding-secure-voting/" rel="nofollow external" class="bo">budget constraints preventing purchase</a> of newer gear. But that means <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">five states</a> – Louisiana, Georgia, South Carolina, New Jersey and Delaware – don’t keep paper records of their voters’ choices.</p>
    <p><a href="https://www.politico.com/newsletters/morning-cybersecurity/2018/07/12/voting-machine-vendors-under-pressure-277054" rel="nofollow external" class="bo">Voting machine vendors have been reluctant</a> to appear before Congress to explain their systems’ security practices – <a href="https://www.usatoday.com/story/tech/2017/07/30/hackers-defcon-conference-exploit-vulnerabilities-voting-machines/523639001/" rel="nofollow external" class="bo">and shortcomings</a>. However, <a href="https://fcw.com/articles/2018/10/02/nielsen-election-cyber-dhs.aspx" rel="nofollow external" class="bo">federal agencies have helped some states</a> reduce the likelihood of voting machines being hacked or physically tampered with.</p>
    <h2>Beyond voting machines</h2>
    <p>Election security is about much more than voting machines and vote-counting systems, though they are the most visible technologies at work on Election Day. State systems that track voter registrations, or allow users to register online, are enticing targets for hackers, too. Security firm Carbon Black reported that <a href="https://www.forbes.com/sites/daveywinder/2018/10/30/81-5m-voter-records-for-sale-on-dark-web-ahead-of-midterm-elections/" rel="nofollow external" class="bo">81 million voter records from 20 states</a> are available in online forums. This data, obtained by hacking various official and corporate databases, could be used to facilitate voter fraud or sow confusion at polling places on Election Day: How would you feel if you were told that someone using your name and address had already voted?</p>
    <p>There are security concerns even in states like Oregon, where everyone votes on paper and mails in their ballots in advance of Election Day. That <a href="https://lmtribune.com/northwest/phishing-attempts-on-oregon-election-officials-increase/article_938cbf55-cc7d-532b-8f6c-f27bf0150040.html" rel="nofollow external" class="bo">state’s election officials were targeted by hackers</a> seeking to gain access to <a href="https://arstechnica.com/tech-policy/2018/11/file-sharing-software-on-state-election-servers-could-expose-them-to-intruders/" rel="nofollow external" class="bo">state email and database systems</a>. With that access, attackers might be able to digitally impersonate a government official to send false or confusing emails, press releases or other notifications to citizens, journalists or poll workers.</p>
    <p>Also at risk are public-facing official websites that carry election information. Merely changing the reported location of polling places or voting hours could prevent some people from voting. Also vulnerable are states’ methods of announcing preliminary election results. At a major internet security conference in August, children were able to compromise replicas of several states’ election-reporting systems. The most remarkable was that in just 10 minutes, an <a href="https://www.pbs.org/newshour/nation/an-11-year-old-changed-election-results-on-a-replica-florida-state-website-in-under-10-minutes" rel="nofollow external" class="bo">11-year-old boy cracked the security</a> on a copy of the Florida secretary of state’s website and was able to change the publicly announced vote totals for candidates. That could be enough to cast doubt on whatever was later reported as the official results – and the integrity of the system itself.</p>
    <h2>Managing information on social media</h2>
    <p>A more difficult threat to defend against is <a href="https://theconversation.com/how-the-russian-government-used-disinformation-and-cyber-warfare-in-2016-election-an-ethical-hacker-explains-99989" rel="nofollow external" class="bo">information warfare</a>, which doesn’t attack voting machines or election officials’ computers. Rather, it <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">targets voters’ perceptions and decisions</a>, seeking to influence how they vote.</p>
    <p>Long before the 2016 U.S. presidential election, information warfare was influencing elections around the world, including in <a href="https://www.washingtonpost.com/business/economy/russian-disinformation-on-facebook-targeted-ukraine-well-before-the-2016-us-election/2018/10/28/cc38079a-d8aa-11e8-a10f-b51546b10756_story.html" rel="nofollow external" class="bo">Ukraine</a>, <a href="https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html" rel="nofollow external" class="bo">Myanmar</a> and <a href="https://www.wired.co.uk/article/egypt-fake-news-facebook-oppress-women" rel="nofollow external" class="bo">Egypt</a>. But after 2016, <a href="https://www.theverge.com/2018/11/5/18056610/facebook-mark-warner-congress-cambridge-analytica" rel="nofollow external" class="bo">Facebook and Twitter came under intense scrutiny</a> for their role in providing digital environments that facilitated the spread of misinformation to sow discontent, and special counsel Robert Mueller began <a href="https://theconversation.com/if-the-12-indicted-russians-never-face-trial-in-the-us-can-anything-be-gained-99997" rel="nofollow external" class="bo">investigating Russians’ influence efforts</a>.</p>
    <p>In the run-up to the 2018 midterms, Russians and others were still hard at work trying to influence Americans to vote in ways that help foreign interests. In October, the U.S. Department of Justice charged a Russian woman with <a href="https://thehill.com/policy/national-security/412287-russian-woman-charged-with-interfering-in-midterm-elections" rel="nofollow external" class="bo">creating thousands of fake social media accounts</a> allegedly representing American citizens to “<a href="https://www.justice.gov/opa/pr/russian-national-charged-interfering-us-political-system" rel="nofollow external" class="bo">create and amplify divisive social media and political content</a>” before the election.</p>
    <p>This year, though, unlike two years ago, <a href="https://www.nytimes.com/2018/10/20/us/politics/2018-digital-misinformation-roundup.html" rel="nofollow external" class="bo">social media companies are taking action</a>. Twitter and Facebook have both <a href="https://theconversation.com/why-do-so-many-people-fall-for-fake-profiles-online-102754" rel="nofollow external" class="bo">deleted thousands of accounts</a> <a href="https://theconversation.com/hate-speech-is-still-easy-to-find-on-social-media-106020" rel="nofollow external" class="bo">they identified</a> as engaging in <a href="https://theconversation.com/even-a-few-bots-can-shift-public-opinion-in-big-ways-104377" rel="nofollow external" class="bo">propaganda and influence-peddling</a>. And they have <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">made other efforts</a> to <a href="https://www.wired.com/story/inside-facebooks-plan-to-safeguard-2018-election/" rel="nofollow external" class="bo">identify and fight falsehoods</a> on their platforms, too.</p>
    <p>Nevertheless, online misinformation continues to thrive. <a href="https://www.knightfoundation.org/reports/disinformation-fake-news-and-influence-campaigns-on-twitter" rel="nofollow external" class="bo">More than 80 percent</a> of the Twitter accounts that often shared links to false and misleading information in 2016 are still active today. And the <a href="https://theconversation.com/unlike-in-2016-there-was-no-spike-in-misinformation-this-election-cycle-105946" rel="nofollow external" class="bo">amount of online misinformation</a> is <a href="https://comprop.oii.ox.ac.uk/research/midterms2018/" rel="nofollow external" class="bo">higher than it was</a> two years ago.</p>
    <h2>Investigating alleged wrongdoing</h2>
    <p>U.S. intelligence and police agencies are concerned about the <a href="https://thehill.com/policy/cybersecurity/412863-officials-prepare-for-potential-false-claims-of-election-interference" rel="nofollow external" class="bo">potential effects of misinformation</a> on the American electorate. But large proportions of the country don’t <a href="https://www.newsmax.com/ronpaul/state-deep-trump-mueller/2018/07/16/id/872012/" rel="nofollow external" class="bo">trust those organizations</a> to be <a href="https://arstechnica.com/tech-policy/2018/11/with-no-evidence-georgias-top-voting-official-accuses-dems-of-cyberattack/" rel="nofollow external" class="bo">politically independent</a>. It doesn’t help that the White House continues to <a href="https://www.washingtonpost.com/politics/without-evidence-trump-and-sessions-warn-of-voter-fraud-in-tuesdays-elections/2018/11/05/e9564788-e115-11e8-8f5f-a55347f48762_story.html" rel="nofollow external" class="bo">claim, without evidence</a>, that <a href="https://www.cnn.com/2018/10/22/politics/donald-trump-voter-fraud/index.html" rel="nofollow external" class="bo">voter fraud</a> is a significant problem.</p>
    <p>Mainstream news organizations can find themselves under scrutiny too, either for <a href="https://www.washingtonpost.com/outlook/2018/10/24/russians-didnt-swing-election-trump-fox-news-might-have/" rel="nofollow external" class="bo">reporting falsehoods</a> that <a href="https://www.pbs.org/newshour/arts/after-a-week-of-russian-propaganda-i-was-questioning-everything" rel="nofollow external" class="bo">appear to gain traction online</a> or for failing to <a href="https://www.poynter.org/news/guide-anti-misinformation-actions-around-world" rel="nofollow external" class="bo">filter out or properly identify inaccurate information</a> for their readers.</p>
    <h2>Looking ahead</h2>
    <p>Protecting democracy is a huge challenge. I’ve written before that it involves <a href="https://theconversation.com/this-election-was-not-hacked-but-it-was-attacked-67511" rel="nofollow external" class="bo">more than technical solutions</a> to computer problems. The U.S. government, and the people it serves, must find the desire and the drive to establish secure and trustworthy procedures for running elections across the country. Education is also key, teaching people from an early age how to recognize propaganda and misinformation, and think critically about the information they encounter. Facts are not subject to alternative views; without widespread agreement on common objective realities, society and government cannot function well.</p>
    <p>Technology continues to evolve, presenting challenges to individuals and society alike. Emerging “<a href="https://theconversation.com/detecting-deepfake-videos-in-the-blink-of-an-eye-101072" rel="nofollow external" class="bo">deepfake</a>” technology is already helping <a href="https://www.lawfareblog.com/deep-fakes-looming-crisis-national-security-democracy-and-privacy" rel="nofollow external" class="bo">create convincing videos of people appearing to say</a> and do things they never said or did. In addition, intelligent social media <a href="https://www.theverge.com/2018/10/15/17980026/social-media-bot-human-difference-ai-study" rel="nofollow external" class="bo">bots are becoming more human-like</a>, making identifying and blocking them much more difficult. That’s just some of the challenges that democracies will face in the future.</p>
    <p>Many of these problems will not have a clearly defined fix, because they involve a nuanced balancing of individual rights and social necessities. Real and lasting solutions must come from civil discourse by rational and objectively informed people who have, above all, the actual honest desire to do it right.<a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/threats-remain-to-us-voting-system-and-voters-perceptions-of-reality-105545" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/" rel="nofollow external" class="bo">Richard Forno: Threats remain to US voting system – and voters’ perceptions of reality</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>As Americans go to the polls, the voting process and the information environment are still not secure. AP Photo/David Goldman  Threats remain to US voting system – and voters’ perceptions of...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80129/guest@my.umbc.edu/cfde4542edba58ca31cbea1ce67bb24d/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 15:03:32 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 15:03:32 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80114" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80114">
<Title>talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/data_privacy_2018.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1>Legal Aspects of Privacy and Data Protection</h1>
    <h3>Razvan Miutescu<br>
    Privacy Counsel, Whiteford, Taylor &amp; Preston</h3>
    <h3>12:00–1:00pm Friday, 9 November 2018, ITE 227, UMBC</h3>
    <p>Privacy and data security continue to be topics of interest for organizations of all sizes. In addition to being concerned about cyber crimes and data breaches occurring more frequently and with higher operational impact, consumers and regulators around the world are focusing on privacy. Individuals are becoming increasingly aware of the value and the use of the information that identifies them or analyzes their conduct and behavior. Privacy laws around the world are becoming stricter. The European Union’s <a href="https://en.wikipedia.org/wiki/General_Data_Protection_Regulation" rel="nofollow external" class="bo">General Data Protection Regulation</a> (GDPR) is viewed as a flagship law that imposes data protection requirements well beyond the borders of the European Economic Area. California recently passed its Consumer Privacy Act, which borrows concepts from the GDPR, leaving no doubt that privacy laws in the United States are also on track to become more complex. In this context, we will discuss practical legal approaches to an organization’s privacy and data security program.</p>
    <p><a href="https://www.wtplaw.com/professionals/razvan-e-miutescu" rel="nofollow external" class="bo">Razvan Miutescu</a> is a technology and information governance attorney with Whiteford, Taylor &amp; Preston. His practice focuses on privacy and data security, information technology transactions and licensing, intellectual property, and data management, including data broker transactions, cloud services, distributed ledgers/blockchain, and related regulatory and compliance matters. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The <a href="https://cisa.umbc.edu/cdl/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a> meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/" rel="nofollow external" class="bo">talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Legal Aspects of Privacy and Data Protection   Razvan Miutescu  Privacy Counsel, Whiteford, Taylor &amp; Preston   12:00–1:00pm Friday, 9 November 2018, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80114/guest@my.umbc.edu/e8a22fb19468481f39cdcfa024b0c615/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 12:26:47 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 12:26:47 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="79464" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/79464">
<Title>Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, &#8230;)</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/header.png" style="max-width: 100%; height: auto;"></p>
    <h1>Professional Graduate Programs Open House, Sat. 10/20</h1>
    <p>The <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">Fall Open House</a> for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB from 9:30-11:30am. Students interested in exploring and/or pursuing these graduate programs (degrees and/or certificates) or just want to learn more about these fields are encouraged to register and attend. CSEE students interested in pursuing a BS/MPS option for selected programs (such as CYBR or Data Science) are especially welcome.</p>
    <p>Programs represented include</p>
    <ul><li>
    <ul><li><strong><a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">Cybersecurity</a></strong></li>
    <li><strong><a href="http://datascience.umbc.edu/" rel="nofollow external" class="bo">Data Science</a></strong></li>
    <li><strong><a href="http://www.umbc.edu/hit/" rel="nofollow external" class="bo">Health Information Technology</a></strong></li>
    <li><a href="http://www.umbc.edu/engm/" rel="nofollow external" class="bo">Engineering Management</a></li>
    <li><a href="http://www.umbc.edu/se/" rel="nofollow external" class="bo">Systems Engineering</a></li>
    <li><a href="http://www.umbc.edu/isd/" rel="nofollow external" class="bo">Instructional Systems Development</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/ipdm/" rel="nofollow external" class="bo">Integrated Product Development &amp; Manufacturing</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/techm/" rel="nofollow external" class="bo">Technical Management</a></li>
    </ul></li>
    </ul><p>Faculty program directors will be presenting in individual breakout sessions and relevant support staff will be on-hand to provide administrative overviews, answer questions, and mingle. Refreshments will be provided.</p>
    <p>If you are interested, please RSVP at <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">https://openhouse.umbc.edu/</a>. If you have questions contact: *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/" rel="nofollow external" class="bo">Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, …)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professional Graduate Programs Open House, Sat. 10/20   The Fall Open House for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79464/guest@my.umbc.edu/a7478305bcb2d96e34dc23e14d28a5dd/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>engineering-management</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>systems-engineering</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 15 Oct 2018 13:41:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="79388" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/79388">
<Title>UMBC students win top prize at Maryland Cyber Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/10/MDCC_DSC_0420.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/10/MDCC_DSC_0420-1024x507.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p>Busy teams of students clustered around laptops in a room overlooking Baltimore’s Inner Harbor on Tuesday, focused on solving as many challenges as possible during a “capture-the-flag” style competition. After hours of intense competition in cyberspace, UMBC’s team emerged victorious, named champions of the college division of the <a href="https://www.fbcinc.com/e/cybermdconference/challenge.aspx" rel="nofollow external" class="bo">2018 Maryland Cyber Challenge</a>.</p>
    <p>Started in 2011, the competition is part of the annual <a href="https://www.fbcinc.com/e/cybermdconference/" rel="nofollow external" class="bo">CyberMaryland Conference</a>. UMBC’s team included <strong>Niara Richards</strong> ‘22, computer science; <strong>Nithya Prakash</strong> ‘22, information systems; <strong>Josh Mpere</strong> ‘19, computer science; <strong>Seamus Burke</strong> ‘20 computer science; and <strong>Swathi Krithivasan</strong> ‘22, computer science. They worked together to test their skills in a series of real-world cybersecurity challenges over the course of two virtual qualifying rounds and then the final competition, beating talented teams from the U.S. Air Force Academy and University of Maryland, University College.</p>
    <p>“It was my first time competing in the Maryland Cyber Challenge, although I have a pretty extensive competition background,” said Burke. “I am especially proud of my freshman teammates who put in a ton of effort, solved challenges, and didn’t get discouraged when the challenges got more difficult.”</p>
    <p>Burke is a Center for Women in Technology (CWIT) Scholar and Mpere is a Cyber affiliate. Richards, Prakash, and Krithivasan all participate in UMBC’s Cyber Scholars Program, which works to prepare the next generation of cybersecurity professionals.</p>
    <p>All five members of the winning team will receive a monetary award and an offer to complete a summer internship to continue growing their experience and skills. Additionally, the university will receive new technologies (including software) to support more UMBC students in developing their cybersecurity skills.</p>
    <p>“The competition was a fantastic experience and gave me a lot of exposure into topics that I otherwise would not have gained, especially as a freshman,” said Krithivasan. “We had a mix of both upper and underclassmen on our team, which really enabled us to learn and grow from working with each other.”</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/umbc-students-win-top-prize-at-maryland-cyber-challenge/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image: Nithya Prakash, Swathi Krithivasan, and Josh Mpere being recognized at the award ceremony. Photo by Mike Lackner, computer science and informatics, and technology instructor at Loyola Blakefield High School.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/umbc-students-win-top-prize-at-maryland-cyber-challenge/" rel="nofollow external" class="bo">UMBC students win top prize at Maryland Cyber Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Busy teams of students clustered around laptops in a room overlooking Baltimore’s Inner Harbor on Tuesday, focused on solving as many challenges as possible during a “capture-the-flag” style...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/umbc-students-win-top-prize-at-maryland-cyber-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79388/guest@my.umbc.edu/d789866d76ec70b6432ec000f86da455/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 11 Oct 2018 14:10:39 -0400</PostedAt>
<EditAt>Thu, 11 Oct 2018 14:10:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="79376" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/79376">
<Title>talk: Results of a student study of UMBC computer systems security</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"></a></h3>
    <h3>The UMBC Cyber Defense Lab presents</h3>
    <p> </p>
    <h1>Results from the January 2018 SFS Research Study at UMBC</h1>
    <h2>Enis Golaszewski, CSEE, UMBC</h2>
    <h3>12:00-1:00pm Friday, 12 October 2018, ITE 227</h3>
    <p>January 22-26, 2018, UMBC SFS scholars worked collaboratively to analyze the security of a targeted aspect of the UMBC computer system. The focus of this year’s study was the WebAdmin module that enables users to perform various functions on their accounts, including changing the password. Students identified vulnerabilities involving failure to sanitize user input properly and suggested mitigations. Participants comprised BS, MS, MPS, and PhD students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College (MC) and Prince George’s Community College (PGCC) to complete their four-year degrees at UMBC. We hope that other universities can benefit from our motivational and educational strategy of cooperating with the university’s IT staff to engage students in active project-based learning centering on focused questions about the university computer system.</p>
    <p>Enis Golaszewski is a PhD student and SFS scholar in computer science working with Dr. Sherman on blockchain, protocol analysis, and the security of software-defined networks.</p>
    <p>This project was supported in part by the National Science Foundation under SFS grant 1241576.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/talk-results-of-a-student-study-of-umbc-computer-systems-security/" rel="nofollow external" class="bo">talk: Results of a student study of UMBC computer systems security</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents       Results from the January 2018 SFS Research Study at UMBC   Enis Golaszewski, CSEE, UMBC   12:00-1:00pm Friday, 12 October 2018, ITE 227   January 22-26,...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/talk-results-of-a-student-study-of-umbc-computer-systems-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79376/guest@my.umbc.edu/6d0ccf28223fa07d9b9e974e1d9d28cb/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 11 Oct 2018 10:25:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78988" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78988">
<Title>MD-AI Meetup holds 1st event at UMBC 6-8pm Wed 10/3, 7th floor library</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/md-ai_fb.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/md-ai_fb-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a><br></p>
    <h1>MD-AI Meetup holds 1st event at UMBC<br>
    6-8pm Wed 10/3, 7th floor library</h1>
    <p> </p>
    
    <p>A new Maryland-based meetup interest group has been established for Artificial Intelligence (<a href="https://www.meetup.com/Maryland-AI/" rel="nofollow external" class="bo">MD-AI Meetup</a>) and will have its first meeting at UMBC this coming Wednesday (Oct 3) from 6:00-8:00pm in the 7th floor of the library.  The first meeting will feature a talk by UMCP Professor <a href="http://users.umiacs.umd.edu/~resnik/" rel="nofollow external" class="bo">Phil Resnik</a> on the state of NLP and an AI research agenda.  Refreshments will be provided.  The meetup is organized by <a href="http://altaplana.com/grimes.html" rel="nofollow external" class="bo">Seth Grimes</a> and supported by <a href="http://tedco.md/" rel="nofollow external" class="bo">TEDCO</a>, local AI startup <a href="http://redshred.com/" rel="nofollow external" class="bo">RedShred</a>, and the <a href="http://www.mdtechcouncil.com/" rel="nofollow external" class="bo">Maryland Tech Council</a>.</p>
    
    <p>If you are interested in attending this and possibly future meetings (which will probably be monthly), go to the <a href="https://www.meetup.com/Maryland-AI/" rel="nofollow external" class="bo">Meetup<span> site</span></a> and join (it’s free) and RSVP to attend this meeting (<span>if there’s still room)</span>.  If you join the meetup and RSVP, you can see who’s registered to attend.</p>
    <p>These meetups are good opportunities to meet and network with people in the area who share interests. It’s a great opportunity for students who are will be looking for internships or jobs in the coming year.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/md-ai-meetup-holds-1st-event-at-umbc-6-8pm-wed-10-3-7th-floor-library/" rel="nofollow external" class="bo">MD-AI Meetup holds 1st event at UMBC 6-8pm Wed 10/3, 7th floor library</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>MD-AI Meetup holds 1st event at UMBC  6-8pm Wed 10/3, 7th floor library        A new Maryland-based meetup interest group has been established for Artificial Intelligence (MD-AI Meetup) and will...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/md-ai-meetup-holds-1st-event-at-umbc-6-8pm-wed-10-3-7th-floor-library/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78988/guest@my.umbc.edu/9f971bc6300fd641f11e4a00be96e2fb/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>nlp</Tag>
<Tag>robotics</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 29 Sep 2018 23:50:53 -0400</PostedAt>
<EditAt>Sat, 29 Sep 2018 23:50:53 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="78945" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78945">
<Title>Machine learning and AI for cybersecurity: a technical chat with DISA</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/text_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/text_cyber.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h3>The UMBC Cyber Defense Lab</h3>
    <p> </p>
    <h1>Machine Learning and Artificial Intelligence: A Technical Chat with the Defense Information Systems Agency</h1>
    <h3>James Curry<br>
    Lead Engineer–DoD Cyber Security Range<br>
    Defense Information Systems Agency (DISA)</h3>
    <h3>12:00–1:00pm Friday, 28 September 2018, ITE 227, UMBC</h3>
    <p>A broad reaching brief on the scope and scale of the DISA Mission, followed by a dive into DISA’s efforts to develop Machine Learning and Artificial Intelligence to help defend the nation’s cyber infrastructure. Attendees are highly encouraged to ask questions.</p>
    <p>James Curry is the Lead Engineer of the DoD Cyber Security Range (CSR). The CSR’s mission is to replicate the DoD Information Network (DODIN) environment at lab scale, while maintaining high-fidelity realism. As Lead Engineer, Mr. Curry led the design, acquisition, and implementation of two first-of-its-kind technologies: a Virtual Internet Access Point (vIAP) and a Virtual Joint Regional Security Stack (vJRSS). These technologies enable the DoD Workforce to train in an IaaS-on-demand environment that realistically matches DISA’s core infrastructure. Mr. Curry is a Scholarship for Service (SFS) recipient (2008-2009) and received his masters and bachelors of science in computer science from New Mexico Tech. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming meetings for Fall 2018 include the following.</p>
    <ul><li>Oct 12 Enis Golaszewski, The 2018 UMBC SFS study</li>
    <li>Oct 26 Enis Golaszewski, Using tools in the formal analysis of cryptographic protocols</li>
    <li>Nov 9 Razvan Mintesu, Legal aspects privacy</li>
    <li>Dec 7 Tim Finin, A knowledge graph for cyber threat intelligence</li>
    </ul>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/machine-learning-and-ai-for-cybersecurity-a-technical-chat-with-disa/" rel="nofollow external" class="bo">Machine learning and AI for cybersecurity: a technical chat with DISA</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab       Machine Learning and Artificial Intelligence: A Technical Chat with the Defense Information Systems Agency   James Curry  Lead Engineer–DoD Cyber Security Range...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/machine-learning-and-ai-for-cybersecurity-a-technical-chat-with-disa/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78945/guest@my.umbc.edu/1d7e79c959c784379822047cd7dd1737/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>machine-learning</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 27 Sep 2018 12:49:08 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78824" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78824">
<Title>Learn cybersecurity skills in NSA&#8217;s Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p> </p>
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018-1024x461.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge</h1>
    <p> </p>
    <p>NSA’s sixth annual <a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">Codebreaker Challenge</a> is a hands-on, cybersecurity engineering challenge in which students work to complete mission-focused objectives and push their university to the top of the competition leaderboard.</p>
    <p>The 2018 scenario involves ransomware and blockchain. A new strain of ransomware has managed to penetrate several critical government networks and NSA has been called upon to assist in remediating the infection to prevent massive data losses. For each infected machine, an encrypted copy of the key needed to decrypt the ransomed files has been stored in a smart contract on the <a href="http://www.ethdocs.org/en/latest/" rel="nofollow external" class="bo">Ethereum blockchain</a> and is set to only be unlocked upon receipt of the ransom payment. Your mission is to ultimately (1) find a way to unlock the ransomware without giving in to the attacker’s demands and (2) figure out a way to recover all of the funds already paid by other victims. Are YOU up to the challenge?</p>
    <p>UMBC students did well, both individually and as a group, in previous challenges.  Let’s make it to the top of the leaderboard this year.</p>
    <ul><li>The challenge is hosted at <a href="https://codebreaker.Ltsnet.net" rel="nofollow external" class="bo">https://codebreaker.Ltsnet.net</a></li>
    <li>The challenge end on December 31st</li>
    <li>Students register for the challenge at<a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">2017 Codebreaker Challenge</a> using their umbc.edu email addresses</li>
    <li>The challenge website has <a href="https://codebreaker.ltsnet.net/resources" rel="nofollow external" class="bo">nine lectures</a> on reverse engineering, so students with little coding or cybersecurity experience can participate</li>
    </ul><p>Feedback from previous iterations of the challenge showed that students were able to learn a great deal from participating. Each student receives a slightly different set of challenge binaries and associated files, so that one student’s solution won’t work for someone else. The binaries are similar enough so that students can work together to understand the problems and develop approaches to solutions and hen implement them independently and register their results.</p>
    <p>The 2018 challenge consists of a series of tasks that are worth a varying amount of points based upon their difficulty. In previous years, tasks had to be solved in order to unlock the next task and rankings were based upon the quantity of solvers that progressed the furthest from each school. This way of ranking heavily weighted progression above participation and did not allow for skipping ahead if a particular task became a stumbling block. So to address these issues, all tasks will be available immediately upon registration and can be solved in any order. The point value associated with each task is based on relative difficulty and schools will be ranked according to total number of points accumulated by their students. It is still recommended to solve tasks in order since the tasks flow with the storyline, but that is no longer a requirement.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/" rel="nofollow external" class="bo">Learn cybersecurity skills in NSA’s Codebreaker Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>           Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge       NSA’s sixth annual Codebreaker Challenge is a hands-on, cybersecurity engineering challenge in...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78824/guest@my.umbc.edu/b5c63a73e1d311c9178ad83678684ddf/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 23 Sep 2018 09:45:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78459" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78459">
<Title>talk: Phishing in an Academic Community, a Study of User Susceptibility and Behavior</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/phishing.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/phishing-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></h3>
    <h3>The UMBC Cyber Defense Lab</h3>
    <h1><strong>Phishing in an Academic Community:<br>
    a Study of User Susceptibility and Behavior</strong></h1>
    <h2><strong>Alejandra Diaz<br></strong><strong>University of Maryland, Baltimore County</strong></h2>
    <h3><strong>12:00–1:00pm, Friday, 14 September 2018, ITE 227</strong></h3>
    <h3><strong>(joint work with Alan T. Sherman Anupam Joshi)</strong></h3>
    <p>We present an observational study on the relationship between demographic factors and phishing susceptibility at the University of Maryland, Baltimore County (UMBC). From March through May 2018, we performed three experiments that delivered phishing attacks to 450 randomly-selected students on three different days (1,350 students total) to examine user click rates and demographics within UMBC’s undergraduate student population. The participants were initially unaware of the study. We deployed the Billing Problem, Contest Winner, and Expiration Date phishing tactics. Experiment 1 impersonated banking authorities; Experiment 2 enticed users with monetary rewards; and Experiment 3 threatened users with account cancellation.</p>
    <p>We found correlations resulting in lowered susceptibility based on college affiliation, academic year progression, cyber training, involvement in cyber clubs or cyber scholarship programs, amount of time spent on the computer, and age demographics. We found no significant correlation between gender and susceptibility. Contrary to our expectations, we observed an inverse correlation between phishing awareness and student resistance to clicking a phishing link. Students who identified themselves as understanding the definition of phishing had a higher susceptibility rate than did their peers who were merely aware of phishing attacks, with both groups of students having a higher susceptibility rate than those with no knowledge whatsoever. Overall, approximately 70% of the students who opened a phishing email clicked on it.</p>
    <p>Alejandra Diaz (*protected email*) is a cyber software engineer at Northrop Grumman. She earned her BS in computer science from UMBC with a concentration in cybersecurity in May 2017, and her MS in computer science in August 2018. As a Cyber Scholar and a Society of Women Studying Information Security Scholar, she has a special interest in the human aspects of cybersecurity.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>Support for this research was provided in part by the National Science Foundation under SFS grant 1241576, the U.S. Department of Defense under CAE grant H988230-17-1-0349, and IBM.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/talk-phishing-in-an-academic-community-a-study-of-user-susceptibility-and-behavior/" rel="nofollow external" class="bo">talk: Phishing in an Academic Community, a Study of User Susceptibility and Behavior</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab   Phishing in an Academic Community:  a Study of User Susceptibility and Behavior   Alejandra Diaz University of Maryland, Baltimore County   12:00–1:00pm, Friday, 14...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/talk-phishing-in-an-academic-community-a-study-of-user-susceptibility-and-behavior/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78459/guest@my.umbc.edu/239c541864336c1f8378903a30fe9277/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 09 Sep 2018 13:40:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78345" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78345">
<Title>NSA highlights strong partnership with UMBC through Featured School campaign</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>NSA highlights strong partnership with UMBC in Featured School campaign</h1>
    <p>Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has led to research, internship, and career opportunities for faculty, students, and alumni. UMBC is the first institution to be highlighted in NSA’s Featured School Series, which launched on September 4.</p>
    <p>“UMBC’s long-standing partnership with NSA has provided valuable experiences for our students, faculty, and alumni to pursue internships, careers, and collaborative research opportunities,” said President Freeman Hrabowski. “Through this work we are helping to address the need for well-trained cyber professionals by creating a network of talented people to protect the state, nation, and world.”</p>
    <p>More than 1100 NSA employees are UMBC alumni, including <strong>Darniet Jennings </strong>‘98, M.S. ‘99, Ph.D. ‘03, information systems management. Jennings continued his dissertation research when he took a job at NSA, where he developed a system to manage big data effectively, which was patented in 2010.</p>
    <div>
    <a href="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" rel="nofollow external" class="bo"><img src="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" alt="" width="100%;float:right;border: 2px solid; padding: 4px;" style="max-width: 100%; height: auto;"></a></div>
    <p>The opportunities at NSA include careers in a broad range of disciplines including cybersecurity, engineering, computer science, language, and biological and chemical sciences. <strong>Regina Hambleton</strong> ‘87, mathematics, has held a number of positions at NSA and is currently the Agency’s deputy director of Engagement and Policy. She began working at NSA while she was a student at UMBC, and participated in a program that allowed her to spend a semester at UMBC taking courses followed by a semester working at NSA.</p>
    <p>The partnership between NSA and UMBC also helps prepare an increasing number of graduates for careers in cybersecurity-related fields, to protect the nation from cyber threats.</p>
    <p><strong>Charles Nicholas</strong>, professor of computer science and electrical engineering, is also highlighted in the Featured School Series campaign. He has spent two sabbaticals at NSA during his time at UMBC, and has mentored students who completed NSA internships, in addition to students who went on to pursue careers at NSA. Nicholas is interested in the intersection of cybersecurity and data science, and the tools that are used to compare malware specimens.</p>
    <p>“There are so many opportunities in the intelligence community, including at NSA,” Nicholas says. “It is important for students interested in those careers to develop technical ability, as well as critical and creative thinking, and I enjoy the chance to help them grow those skills.”</p>
    <p>For more information about the partnership, and a few UMBC alumni who work at NSA, visit the <a href="https://www.nsa.gov/resources/students-educators/featured-schools/umbc.shtml" rel="nofollow external" class="bo">UMBC page on the NSA website</a>.</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/national-security-agency-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image by Marlayna Demond for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">NSA highlights strong partnership with UMBC through Featured School campaign</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    NSA highlights strong partnership with UMBC in Featured School campaign   Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78345/guest@my.umbc.edu/937bbb0918436a7c5bf367c07f1e6516/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Sep 2018 09:12:55 -0400</PostedAt>
<EditAt>Wed, 05 Sep 2018 09:12:55 -0400</EditAt>
</NewsItem>

</News>
