<?xml version="1.0"?>
<News hasArchived="true" page="15" pageCount="17" pageSize="10" timestamp="Sun, 19 Apr 2026 18:37:24 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=15">
<NewsItem contentIssues="true" id="75472" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/75472">
<Title></Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/04/security-keyboard.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/04/security-keyboard-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h3>The UMBC Cyber Defense Lab presents</h3>
    <h1><strong>Human Factors in Cyber Security</strong></h1>
    <h2><strong>Dr. Josiah Dykstra</strong></h2>
    <h3>Cyber Security Researcher, US Department of Defense</h3>
    <h3>12:00–1:00pm Friday, 13 April 2018, ITE 229, UMBC</h3>
    <p>Humans play many roles in the effectiveness of cyber security. While users are often blamed for security compromises, human strengths and weaknesses also affect people who perform design, implementation, configuration, monitoring, analysis, and response. The fields of human computer interaction generally, and usable security specifically, have drawn attention and research to some aspects of human factors, but many opportunities remain for future work.</p>
    <p>In this talk, I describe several of my research projects related to human factors in cyber security. The first was a study of how individual differences affect cyber security behavior, and active follow-on research to predict users who might become victimized. The second was a study of stress and fatigue in security operations centers, including a new survey instrument for collecting data in tactical environments. The third was a research prototype using augmented reality to assist humans in cyber security analysis, and an analysis of preliminary results.</p>
    <p>Finally, I will present and invite discussion about a new idea for improving security by making it “disappear.” Despite decades of tools and techniques for secure development, and valiant work at adoption and usability, it is clear that many users cannot or will not avail themselves of appropriate cyber security options. It may be time to rethink the amount of interaction required for most users, and if hands-off, behind-the-scenes cyber defense should be the norm.</p>
    <hr><p><a href="https://josiahdykstra.com/" rel="nofollow external" class="bo">Josiah Dykstra</a> serves as a Senior Executive Service government civilian and Subject Matter Expert for Computer Network Operations research in the Laboratory for Telecommunication Sciences within the Research Directorate of the National Security Agency. His research includes human augmentation, cyber risk assessment, and cyber effects. He is an active collaborator with academic, industry, and government researchers around the country. Dykstra earned the PhD degree in computer science at UMBC in 2013 studying under Alan T. Sherman. Dr. Dykstra is the author of the 2016 O’Reilly book, <a href="http://shop.oreilly.com/product/0636920037231.do" rel="nofollow external" class="bo">Essential Cybersecurity Science</a>, Fellow of the American Academy of Forensic Sciences, and winner of the Presidential Early Career Award for Scientists and Engineers.</p>
    <hr><p>Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/04/umbc-talk-human-factors-in-cybersecurity-josiah-dykstra-hci/" rel="nofollow external" class="bo">🗣️ talk: Human Factors in Cyber Security, 12-1 Fri 4/13, ITE 229, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Human Factors in Cyber Security   Dr. Josiah Dykstra   Cyber Security Researcher, US Department of Defense   12:00–1:00pm Friday, 13 April 2018, ITE 229, UMBC...</Summary>
<Website>https://www.csee.umbc.edu/2018/04/umbc-talk-human-factors-in-cybersecurity-josiah-dykstra-hci/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/75472/guest@my.umbc.edu/ae3856ee524c6c1193b62d7d794add15/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 08 Apr 2018 16:27:11 -0400</PostedAt>
<EditAt>Sun, 08 Apr 2018 16:27:11 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="75116" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/75116">
<Title>talk: Cybersecurity as a Team Sport &#8211; Understanding Counsel&#8217;s Role, 6pm Wed 4/4</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/03/speaker-series-1024x252.png" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>The <a href="http://shadygrove.umbc.edu/cyber/" rel="nofollow external" class="bo">UMBC at Shady Grove Cybersecurity Program</a> Presents</h4>
    <h1><strong><a href="http://shadygrove.umbc.edu/cyber/speakerseries" rel="nofollow external" class="bo">Cybersecurity as a Team Sport – Understanding Counsel’s Role</a></strong></h1>
    <h2>Allison Bender J.D.</h2>
    <h3><strong>6:00-8:00pm Wednesday, 4 April 2018</strong></h3>
    <p><strong>The Universities at Shady Grove</strong><br><strong> Building III (Camille Kendall Academic Center) Room 4230</strong><br><strong> 9636 Gudelsky Drive, Rockville, Maryland 20850</strong><br><strong> <a href="https://www.shadygrove.umd.edu/about-usg/directions-transportation" rel="nofollow external" class="bo">Directions/Parking</a></strong></p>
    <p>In this presentation by seasoned incident response counsel, Allison Bender, you will gain a risk-informed perspective on the role of counsel in cybersecurity governance and incident response. Also, learn strategies for more effective communication and cooperation with other cybersecurity stakeholders (e.g., IT, IT Security, HR, Communications, business leaders, senior executives and the board); and take away practical tips for prioritizing efforts that help tame the chaos of cybersecurity incident response while maintaining privilege as appropriate.</p>
    <hr><p>Allison Bender counsels Fortune 50 companies and startups in a range of industries on cybersecurity and privacy matters in the U.S. and internationally. Drawing from her roots in government, national security, and R&amp;D, she helps clients navigate legal issues associated with emerging technologies and aids clients in strategically managing legal, financial, and reputational cybersecurity risks. Allison translates technical, operational, legal, and policy issues to create practical solutions for clients’ legal challenges. Her cybersecurity and national security preparedness counseling is informed by over 80 incident response efforts. When drafting corporate policies and considering product design options, Allison’s advice is seasoned in the management of breaches involving personal data, intellectual property, payment card information, export controlled technical data, and other regulated information. Her experience also extends to counseling on cybersecurity and national security due diligence in mergers and acquisitions, vendor management, and transactions. From DHS, Allison brings experience in incident response as well as cybersecurity policy, information sharing, liability, and incentives. She was the primary operational legal counsel for the federal response to the Heartbleed vulnerability, the USIS-KeyPoint data breach, and the Healthcare.gov data breach.</p>
    <p>Hosts: Dr. Behnam Shariati (*protected email*) and the UMBC Graduate Cybersecurity Association at USG</p>
    <p>The UMBC Graduate Cybersecurity Association at USG is an organization created and managed by UMBC Cybersecurity graduate students at Shady Grove. The mission of Cybersecurity Association is to promote the study of Cybersecurity and to raise Cybersecurity awareness and knowledge in the community through panel discussions, conferences, and Cyber competitions. Also, the Cybersecurity Association aspires to create a supportive and positive learning environment in which every member has the opportunity to network, learn, and grow.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/03/talk-cybersecurity-team-sport-understanding-counsels-role/" rel="nofollow external" class="bo">talk: Cybersecurity as a Team Sport – Understanding Counsel’s Role, 6pm Wed 4/4</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC at Shady Grove Cybersecurity Program Presents   Cybersecurity as a Team Sport – Understanding Counsel’s Role   Allison Bender J.D.   6:00-8:00pm Wednesday, 4 April 2018   The Universities...</Summary>
<Website>https://www.csee.umbc.edu/2018/03/talk-cybersecurity-team-sport-understanding-counsels-role/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/75116/guest@my.umbc.edu/2f5b7b7cf26b697d3ec816f5139a17d5/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 27 Mar 2018 22:35:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="74886" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74886">
<Title></Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/03/blockchain-technology.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/03/blockchain-technology.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1>Global Impact, Promise &amp; Perils of Blockchain</h1>
    <p>UMBC Professors <a href="https://www.csee.umbc.edu/haibin-zhang/" rel="nofollow external" class="bo">Haibin Zhang</a> (Computer Science and Electrical Engineering) and <a href="http://karuna.informationsystems.umbc.edu/" rel="nofollow external" class="bo">Karuna Joshi</a> (Information Systems) will be panelists for an event focused on the impact, promise and perils of blockchain technologies at the <a href="http://www.bwtechumbc.com/" rel="nofollow external" class="bo">bwtech@UMBC Research &amp; Technology Park</a>. The event will take place from 8:15 to 11:15am on Tuesday, March 20 2018 at and will include breakfast and time for networking.  They will be joined on the panel by <a href="https://www.linkedin.com/in/marcus-edwards/" rel="nofollow external" class="bo">Marcus Edwards</a>, from Northrop Grumman’s Cyber &amp; Intelligence Mission Solutions, <a href="https://www.linkedin.com/in/steve-cook-15283a/" rel="nofollow external" class="bo">Steve Cook</a> of Verizon Enterprise Solutions, <a href="https://www.linkedin.com/in/sean-manion-6383a64/" rel="nofollow external" class="bo">Sean Manion</a> of  Science Distributed and moderator <a href="https://www.linkedin.com/in/razvan-miutescu-83b44912/" rel="nofollow external" class="bo">Razvan Miutescu</a> of Whiteford, Taylor &amp; Preston, LLP.   For more information and tickets are available on <a href="https://www.eventbrite.com/e/cyberinnovation-briefing-the-global-impact-promise-perils-of-blockchain-tickets-42796523554" rel="nofollow external" class="bo">eventbrite</a>.</p>
    <h1><a href="https://www.eventbrite.com/e/cyberinnovation-briefing-the-global-impact-promise-perils-of-blockchain-tickets-42796523554" rel="nofollow external" class="bo"><strong>CyberInnovation Briefing: The Global Impact, Promise &amp; Perils of Blockchain</strong></a></h1>
    <h4>8:15 – 11:15 Tuesday, March 20, 2018</h4>
    <h4>bwtech@UMBC Research &amp; Technology Park<br>
    5520 Research Park Drive, Baltimore, MD 21228</h4>
    <p>Cryptocurrency market capitalizations have soared over the past year and new innovative blockchain applications are continuing to emerge seemingly by the day. However, the average end-user is left to singularly make sense of a vast and global marketplace that is rapidly converging the core tenets of economics and technology development. The future prospects of traditional business and financial models is uncertain as blockchain technology leaves key decision makers in an untenable position to either adopt and adapt or simply be left behind. Industry and academic experts in the field will discuss the pros and cons and opportunities and challenges of this disruptive technology movement.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/03/umbc-cyberinnovation-briefing-global-impact-promise-perils-of-blockchain/" rel="nofollow external" class="bo">🗣️ CyberInnovation Briefing: Global Impact, Promise &amp; Perils of Blockchain</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Global Impact, Promise &amp; Perils of Blockchain   UMBC Professors Haibin Zhang (Computer Science and Electrical Engineering) and Karuna Joshi (Information Systems) will be panelists for an event...</Summary>
<Website>https://www.csee.umbc.edu/2018/03/umbc-cyberinnovation-briefing-global-impact-promise-perils-of-blockchain/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74886/guest@my.umbc.edu/071b57ec9d7f66fc52ec392277325cb1/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 16 Mar 2018 08:34:37 -0400</PostedAt>
<EditAt>Fri, 16 Mar 2018 08:34:37 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="74657" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74657">
<Title>talk: Creating Educational Cybersecurity Assessment Tools, 12pm Fri 3/9</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h4><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/03/cybersecurity_education.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/03/cybersecurity_education.jpg" alt="" style="max-width: 100%; height: auto;"></a></h4>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1><strong>   Creating Educational Cybersecurity Assessment Tools</strong></h1>
    <h3>Alan T. Sherman<br>
    Department of Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h3>12:00–1:00pm Friday, March 9, 2018, ITE 229, UMBC</h3>
    <p>The Cybersecurity Assessment Tools (CATS) Project provides rigorous evidence-based instruments for assessing and evaluating educational practices. The first CAT will be a Cybersecurity Concept Inventory (CCI) that measures how well students understand basic concepts in cybersecurity (especially adversarial thinking) after a first course in the field. The second CAT will be a Cybersecurity Curriculum Assessment (CCA) that measures how well students understand core concepts after completing a full cybersecurity curriculum. These tools can help identify pedagogies and content that are effective in teaching cybersecurity.</p>
    <p>In fall 2014, we carried out a Delphi process that identified core concepts of cybersecurity. In spring 2016, we interviewed twenty-six students to uncover their understandings and misconceptions about these concepts. In fall 2016, we generated our first assessment tool—-a draft CCI, comprising approximately thirty multiple-choice questions. Each question targets a concept; incorrect answers are based on observed misconceptions from the interviews. In fall 2017, we began drafting CCA questions. This year we are validating the draft CCI using cognitive interviews, expert reviews, and psychometric testing. In this talk, I highlight our progress to date in developing the CCI and CCA. Audience members will be given an opportunity to answer sample questions.</p>
    <p>Presently there is no rigorous, research-based method for measuring the quality of cybersecurity instruction. Validated assessment tools are needed so that cybersecurity educators have trusted methods for discerning whether efforts to improve student preparation are successful.</p>
    <p>Joint work with Linda Oliva, David DeLatte, Enis Golaszewski, Geet Parekh, Konstantinos Patsourakos, Dhananjay Phatak, Travis Scheponik (UMBC); Geoffrey Herman, Dong San Choi, Julia Thompson (University of Illinois at Urbana-Champaign)</p>
    <hr><p>Alan T. Sherman is a professor of computer science at UMBC in the CSEE Department and Director of UMBC’s Center for Information Security and Assurance. His main research interest is high-integrity voting systems. He has carried out research in election systems, algorithm design, cryptanalysis, theoretical foundations for cryptography, applications of cryptography, and cybersecurity education. Dr. Sherman is also an editor for Cryptologia and a private consultant performing security analyses. Sherman earned the PhD degree in computer science at MIT in 1987 studying under Ronald L. Rivest. <a href="http://www.csee.umbc.edu/~sherman">www.csee.umbc.edu/~sherman</a></p>
    <p>Support for this research was provided in part by the National Security Agency under grants H98230-15-1-0294 and H98230-15-1-0273 and by the National Science Foundation under SFS grant 1241576.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/03/talk-umbc-creating-educational-cybersecurity-assessment-tools/" rel="nofollow external" class="bo">talk: Creating Educational Cybersecurity Assessment Tools, 12pm Fri 3/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents      Creating Educational Cybersecurity Assessment Tools   Alan T. Sherman  Department of Computer Science and Electrical Engineering  University of Maryland,...</Summary>
<Website>https://www.csee.umbc.edu/2018/03/talk-umbc-creating-educational-cybersecurity-assessment-tools/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74657/guest@my.umbc.edu/91bd7edf5610385a524077e8ba7c9efc/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 09 Mar 2018 07:30:42 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="74319" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74319">
<Title>UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/capture-the-flag.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h1>UMBC Cyber Dawgs<br>
    Capture The Flag Cybersecurity Competition</h1>
    <p>The national champion <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">UMBC Cyber Dawgs</a> will hold the second annual computer security Capture The Flag (CTF) competition on Sunday, March 11th from 11am-7pm in the UC Ballroom. This CTF event is a Jeopardy-style competition where teams of four people use their laptops to discover answers to questions about cybersecurity, including network forensics, reverse engineering, reconnaissance, and cryptography. Each question has a point value based upon its difficulty and whichever team has the most points at the end wins!</p>
    <p>The competition is open to all current UMBC students and student from a few other nearby schools. Both beginners and experts are welcome to participate.</p>
    <p>Prizes will be awarded to the top teams. There will also be door prizes for randomly selected participants as well as T-Shirts for everyone. Some prizes from last year include Raspberry Pis, a Wireless Pineapple Nano, a YARD Stick One, and a Chromebook! Lunch and dinner (Lima’s Chicken) will be provided for everyone.</p>
    <p>Students who are interested must <a href="https://goo.gl/forms/g2oxUMeyKYlf2QVD3%22" rel="nofollow external" class="bo">register</a> online in advance and bring a laptop to the event. Please note any dietary restrictions on the registration form as well as your T-Shirt size. See the <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">event website</a> for more information</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/" rel="nofollow external" class="bo">UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Dawgs  Capture The Flag Cybersecurity Competition   The national champion UMBC Cyber Dawgs will hold the second annual computer security Capture The Flag (CTF) competition on Sunday,...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74319/guest@my.umbc.edu/2e5232853dad24355b1c4efb82961c8a/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 26 Feb 2018 23:53:40 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="74246" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74246">
<Title>talk: Circuit Complexity of One-Way Boolean Functions, 12pm Fri 2/23, ITE229</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/oneway.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/oneway-1024x537.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h3><em>The UMBC Cyber Defense Lab presents</em></h3>
    <h1><strong>Experimentally Measuring the Circuit Complexity</strong><br><strong>of One-Way Boolean Functions</strong></h1>
    <h2><em>Brian Weber, CSEE, UMBC<br></em></h2>
    <h2>12:00–1:00pm, <span>Friday, 23 February 2018, ITE 229</span></h2>
    <p>I present preliminary results from an exhaustive search for <a href="https://en.wikipedia.org/wiki/One-way_function" rel="nofollow external" class="bo">one-way functions</a> in certain classes of small Boolean functions.   One-way functions are functions that are easy to compute but hard to invert.  They are vital for cryptography, yet no one has proven their existence for arbitrary input sizes.  For any bounded circuit model of computation, it is possible to search exhaustively over all possible Boolean functions of restricted size and thereby determine for the searched class the maximum disparity between the complexity of any function and its inverse.  Throughout, we assume a circuit model in which each gate has fan-in 2 and fan-out 1.</p>
    <p>In his 1985 dissertation at MIT, Steven Boyack carried out the first such search.  For any positive integers <em>n</em> and <em>M</em>, let <em>F<sub>n,M</sub></em> denote the set of Boolean functions with <em>n</em> inputs and <em>M</em>outputs. Using circuit size as the complexity measure, Boyack searched the space of every combinatorial function in <em>F<sub>3,3 </sub></em>by searching each of 52 equivalency classes of functions in this space.  He found that every function class in this space has an identically sized inverse.  He was able to prove that functions do exist with more complex inverses outside the space he searched, but not by more than a constant factor.</p>
    <p>In spring 2017, using circuit depth as the complexity measure, I searched all injective functions up to <em>F<sub>8,8</sub></em> whose coordinate functions are in <em>F<sub>2,1</sub></em>.  A coordinate function in this context refers to the function that computes an individual output bit.  In addition, I searched up to <em>F<sub>4,4 </sub></em>allowing coordinate functions in <em>F<sub>3,1</sub></em>.  In the space I searched, the most one-way function has fixed depth of 1, and an inverse depth exactly equal to the input size of the function. That is, for each 2 &lt; <em>n</em> &lt; 9, the hardest inverse in the space I searched has a depth of <em>n</em>, where <em>n</em> is the number of input bits. In addition, a search space allowing a larger fan-in for the coordinate functions did not yield functions less invertible than were found in the original search space.</p>
    <p><em>Brian Weber</em> is a senior BS/MS computer engineering student and SFS scholar at UMBC.  He hopes to extend the work presented here into his Master’s thesis next year.  Email: *protected email*</p>
    <p><strong>Host:</strong> Alan T.  Sherman, *protected email*Support for this research was provided in part by the National Science Foundation under SFS grant 1241576.</p>
    <p><em>The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-talk-experimentally-measuring-circuit-complexity-one-way-boolean-functions/" rel="nofollow external" class="bo">talk: Circuit Complexity of One-Way Boolean Functions, 12pm Fri 2/23, ITE229</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Experimentally Measuring the Circuit Complexity of One-Way Boolean Functions   Brian Weber, CSEE, UMBC    12:00–1:00pm, Friday, 23 February 2018, ITE 229   I...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-talk-experimentally-measuring-circuit-complexity-one-way-boolean-functions/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74246/guest@my.umbc.edu/186a018dd105cdb013ccb23caf98fdaa/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>sfs</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 22 Feb 2018 22:28:33 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="73767" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73767">
<Title>UMBC&#8217;s Haibin Zhang shares tips to secure data in the cloud</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/Cybersecurity_locked-screen-1920x768.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/Cybersecurity_locked-screen-1920x768.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1><strong>UMBC’s Haibin Zhang shares tips to secure data in the cloud</strong></h1>
    <p>As more consumers rely on cloud-based data storage for everything from family photos to financial information, both experts and general users have voiced concerns about cloud security. In a new <a href="https://theconversation.com/us" rel="nofollow external" class="bo"><em>Conversation</em></a> article recently published by <em>Scientific American</em>, <a href="https://www.csee.umbc.edu/~hbzhang/" rel="nofollow external" class="bo"><strong>Haibin Zhang</strong>,</a> assistant professor of computer science and electrical engineering, explains precautions consumers can take to protect their files in the cloud.</p>
    <p>Zhang explains that data stored and secured using commercial cloud storage systems is encrypted, which means that without the key, the information looks like a series of meaningless characters. Encryption keys have the potential to be misused, if they end up in the wrong hands, which can compromise the security of files stored in a cloud.</p>
    <p>“Just like regular keys, if someone else has them, they might be stolen or misused without the data owner knowing,” says Zhang. “And some services might have flaws in their security practices that leave users’ data vulnerable.”</p>
    <p>Zhang notes that some cloud services allow customers to maintain their encryption key themselves, which give the consumer the control in ensuring that their data remains safe. Other services keep the encryption keys internally and manage the security for their customers. He says that while each option has benefits, it is important to recognize that “some services might have flaws in their security practices that leave users’ data vulnerable.”</p>
    <p>To keep data secure in the cloud, Zhang suggests using enhanced security features offered by cloud storage companies and taking additional precautions that are available to individual customers. He recommends that people use a cloud storage service that allows customers to encrypt their data before uploading it for storage, and to rely on services that have been “validated by independent security researchers.”</p>
    <p>Read “How secure is your data when it’s stored in the cloud?” in <a href="https://theconversation.com/how-secure-is-your-data-when-its-stored-in-the-cloud-90000" rel="nofollow external" class="bo"><em>The Conversation </em></a>for Zhang’s additional recommendations on securing data on the cloud. The piece also appeared in <a href="https://www.scientificamerican.com/article/how-secure-is-your-data-when-it-rsquo-s-stored-in-the-cloud/" rel="nofollow external" class="bo"><em>Scientific American</em></a>, and has so far been read nearly 20,000 times.</p>
    <p><em>Adapted from a UMBC <a href="https://news.umbc.edu/umbcs-haibin-zhang-shares-tips-to-secure-data-in-the-cloud/" rel="nofollow external" class="bo">News article</a> by <a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo">Megan Hanks</a>. Photo by Yuri Samoilov, <a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow external" class="bo">CC by 2.0</a>.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-haibin-zhang-tips-secure-data-cloud-cybersecurity-computer-security/" rel="nofollow external" class="bo">UMBC’s Haibin Zhang shares tips to secure data in the cloud</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s Haibin Zhang shares tips to secure data in the cloud   As more consumers rely on cloud-based data storage for everything from family photos to financial information, both experts and...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-haibin-zhang-tips-secure-data-cloud-cybersecurity-computer-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73767/guest@my.umbc.edu/ac1cc011dc557e189defafd6aae1fa07/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>faculty-and-staff</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 07 Feb 2018 14:14:06 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="73664" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73664">
<Title>talk: Results of the 2018 SFS Research Study at UMBC, 12pm Fri 2/9, ITE228</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity-1024x536.jpg" alt="cybersecurity" style="max-width: 100%; height: auto;"></a></p>
    <p><em>The UMBC Cyber Defense Lab presents</em></p>
    <h1><strong>Results from the January 2018 SFS Research Study at UMBC</strong></h1>
    <h3><strong>Enis Golaszewski<br>
    Department of Information Systems</strong><br><strong>University of Maryland, Baltimore County</strong></h3>
    <h4><strong>12:00–1:00pm, Friday, 9 February 2018, ITE 228 (or nearby)</strong></h4>
    <p>January 22-26, 2018, UMBC SFS scholars worked collaboratively to analyze the security of a targeted aspect of the UMBC computer system.  The focus of this year’s study was the WebAdmin module that enables users to perform various functions on their accounts, including changing the password.  Students identified vulnerabilities involving failure to sanitize user input properly and suggested mitigations.  Participants comprised BS, MS, MPS, and PhD students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College and Prince George’s Community College to complete their four-year degrees at UMBC. We hope that other universities can benefit from our motivational and educational strategy of cooperating with the university’s IT staff to engage students in active project-based learning centering on focused questions about the university computer system.</p>
    <p><em>This project was supported in part by the National Science Foundation under SFS grant 1241576.</em></p>
    <p><a href="https://www.linkedin.com/in/ennis-golaszewski-88742179/" rel="nofollow external" class="bo"><strong>Enis Golaszewski</strong></a> (*protected email*) is a PhD student and SFS scholar in computer science working with Dr. Sherman on blockchain, protocol analysis, and the security of software-defined networks.</p>
    <p><strong>Host:</strong> Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-results-2018-research-study-umbc-cybersecurity-security/" rel="nofollow external" class="bo">talk: Results of the 2018 SFS Research Study at UMBC, 12pm Fri 2/9, ITE228</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Results from the January 2018 SFS Research Study at UMBC   Enis Golaszewski  Department of Information Systems University of Maryland, Baltimore County...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/talk-results-2018-research-study-umbc-cybersecurity-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73664/guest@my.umbc.edu/ceecd69001ec678793247f539105a2f0/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Feb 2018 21:08:32 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="73663" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73663">
<Title>talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" alt="hardware cybersecurity" style="max-width: 100%; height: auto;"></a></h1>
    <h1><strong>Towards Hardware Cybersecurity</strong></h1>
    <h3><strong><a href="https://ece.gmu.edu/~hhomayou/goal.html" rel="nofollow external" class="bo">Professor Houman Homayoun</a><br>
    George Mason University<br></strong></h3>
    <h4><strong><span>11:00am-12:00pm Tuesday, 20 Febuary 2018</span>, ITE 325, UMBC</strong></h4>
    <p>Electronic system security, trust and reliability has become an increasingly critical area of concern for modern society. Secure hardware systems, platforms, as well as supply chains are critical to industry and government sectors such as national defense, healthcare, transportation, and finance.</p>
    <p>Traditionally, authenticity and integrity of data has been protected with various security protocol at the software level with the underlying hardware assumed to be secure, and reliable. This assumption however is no longer true with an increasing number of attacks reported on the hardware. Counterfeiting electronic components, inserting hardware trojans, and cloning integrated circuits are just few out of many malicious byproducts of hardware vulnerabilities, which need to be urgently addressed.</p>
    <p>In the first part of this talk I will address the security and vulnerability challenges in the horizontal integrated hardware development process. I will then present the concept of hybrid spin-transfer torque CMOS look up table based design which is our latest effort on developing a cost-effective solution to prevent physical reverse engineering attacks.</p>
    <p>In the second part of my talk I will present how information at the hardware level can be used to address some of the major challenges of software security vulnerabilities monitoring and detection methods. I will first discuss these challenges and will then show how the use of data at the hardware architecture level in combination with an effective machine learning based predictor helps protecting systems against various classes of hardware vulnerability attacks.</p>
    <p>I will conclude the talk by emphasizing the importance of this emerging area and proposing a research agenda for the future.</p>
    <p><a href="https://ece.gmu.edu/~hhomayou" rel="nofollow external" class="bo">Dr. Houman Homayoun</a> is an Assistant Professor in the Department of Electrical and Computer Engineering at George Mason University. He also holds a courtesy appointment with the Department of Computer Science as well as Information Science and Technology Department. He is the director of GMU’s Accelerated, Secure, and Energy-Efficient Computing Laboratory (ASEEC).  Prior to joining GMU, Houman spent two years at the University of California, San Diego, as NSF Computing Innovation (CI) Fellow awarded by the CRA-CCC. Houman graduated in 2010 from University of California, Irvine with a Ph.D. in Computer Science. He was a recipient of the four-year University of California, Irvine Computer Science Department chair fellowship. Houman received the MS degree in computer engineering in 2005 from University of Victoria and BS degree in electrical engineering in 2003 from Sharif University of Technology. Houman conducts research in hardware security and trust, big data computing, and heterogeneous computing, where he has published more than 80 technical papers in the prestigious conferences and journals on the subject. Since 2012 he leads ten research projects, a total of $7.2 million in funding, supported by DARPA, AFRL, NSF, NIST, and GM on the topics of hardware security and trust, big data computing, heterogeneous architectures, and biomedical computing. Houman received the 2016 GLSVLSI conference best paper award for developing a manycore accelerator for wearable biomedical computing. Since 2017 he has been serving as an Associate Editor of IEEE Transactions on VLSI. He is currently serving as technical program co-chair of 2018 GLSVLSI conference.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/" rel="nofollow external" class="bo">talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Towards Hardware Cybersecurity   Professor Houman Homayoun  George Mason University    11:00am-12:00pm Tuesday, 20 Febuary 2018, ITE 325, UMBC   Electronic system security, trust and reliability...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73663/guest@my.umbc.edu/346faa5a3054d6e7d0b17a902843a9e0/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Feb 2018 19:08:51 -0500</PostedAt>
<EditAt>Sat, 17 Feb 2018 19:08:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="72825" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72825">
<Title>UMBC faculty, alumni and partners discuss cybersecurity and industry challenges</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2017/12/CyberPressEvent_3.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/12/CyberPressEvent_3.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1><strong>UMBC faculty, alumni and corporate partners discuss cybersecurity and industry challenges</strong></h1>
    <p>Cybersecurity is regularly a headliner in the news, especially when personal information stored online has been compromised, whether through a breach, hack, or threat. On Thursday, December 7, UMBC hosted experts from industry and academia at the National Press Club to discuss the cyber challenges professionals face, and how those groups can work together to prepare future generations of cybersecurity professionals.</p>
    <p>Scott Shane, a reporter with <em>The New York Times</em>, led the discussion with five panelists representing industry, small business, and higher education. “I think it’s fair to say the internet was built without adequate attention to security,” stated Shane, who writes about cyber and information attacks regularly. “It’s almost like somebody who starts a bank with branches all over the world, and after it’s up and running and has millions of account holders, suddenly starts to think about safes, locks on the doors and bulletproof glass. I think that’s sort of the stage that we’re at right now.”</p>
    <p>UMBC President <strong>Freeman Hrabowski </strong>and <strong>Anupam Joshi</strong>, professor and chair of computer science and electrical engineering, and director of the Center for Cybersecurity at UMBC, were joined by alumni and partners who have been working on the challenge of educating the workforce together. Hrabowski explained that there are currently about 350,000 unfilled cybersecurity jobs, and that number is expected to continue to grow. By 2021, it is anticipated that there will be approximately three million job openings in cyber-related fields.</p>
    <p>Over the course of his professional career, Nigel Faulkner, chief technology officer at T. Rowe Price, has experienced the emergence of technology and many changes. “As the CTO of a medium-large company, cyber is a defensive investment for us. The best thing that can happen is nothing happens,” Faulkner said, adding that he is always thinking about whether the company is investing enough, doing the right thing, and making the right connections in the industry to keep clients’ information safe.</p>
    <p>As president and founder of TCecure, LLC, and cybersecurity academic innovation officer for University System of Maryland (USM), <strong>Tina Williams</strong> ’02, computer science, shared the importance of building security into technology from the beginning, rather than adding these features on at the “tail end of a development cycle.” Not only does her company handle security, they also monitor threats and risks that can compromise the technology’s health. In her role at USM, Williams represents the system as a whole to integrate academia and academic research, relationships, and resources into what’s taking place nationally, at the Federally Funded Research and Development Centers.</p>
    <p>As head of UMBC’s Center for Cybersecurity, Joshi explained that UMBC is combating these national challenges by partnering with industry and government leaders to conduct research that addresses specific real-world needs that benefit both. Collaborative relationships, such as UMBC’s work with Northrop Grumman and T. Rowe Price, is one way that UMBC is working to cultivate the next generation of cybersecurity talent.</p>
    <p>As an alumna of UMBC and a current employee at Northrop Grumman, <strong>Lauren Mazzoli </strong>’15, computer science and mathematics, M.S. ’17, computer science, a systems engineer in the Future Technical Leaders Program at Northrop Grumman, discussed her experience in the Cyber Scholars Program. The Cyber Scholars Program works to increase the participation of women and underrepresented minorities in the field. Mazzoli explained that her experience at UMBC, in the Cyber Scholars Program, and working alongside mentors on and off-campus led her to be involved with continuing to encourage women to pursue careers in cybersecurity. “For me it’s been a product of the relationship between academia and industry, that have allowed me to find my own career path, and at the same time help others find theirs,” she explained, noting her passion for helping students consider careers in cybersecurity and related fields.</p>
    <p>“We know there’s a huge workforce that we need and we can’t fill that pipeline. So yes, we need more women, yes, we need students of all backgrounds, but we need diversity of thought, experience, education, and problem-solving skills,” said Mazzoli, adding that it is important for students to know from a young age that cybersecurity is a field they can pursue.</p>
    <p><em>Adapted from a <a href="http://news.umbc.edu/umbc-faculty-alumni-and-corporate-partners-discuss-cybersecurity-and-industry-challenges/" rel="nofollow external" class="bo">UMBC News article</a> article written by <a href="https://oia.umbc.edu/about-us/our-team/person/zr66298/" rel="nofollow external" class="bo">Megan Hanks</a> Photo by Abnet Shiferaw ’11, visual arts. </em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/12/umbc-faculty-alumni-and-partners-discuss-cybersecurity-and-industry-challenges/" rel="nofollow external" class="bo">UMBC faculty, alumni and partners discuss cybersecurity and industry challenges</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    UMBC faculty, alumni and corporate partners discuss cybersecurity and industry challenges   Cybersecurity is regularly a headliner in the news, especially when personal information stored...</Summary>
<Website>https://www.csee.umbc.edu/2017/12/umbc-faculty-alumni-and-partners-discuss-cybersecurity-and-industry-challenges/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72825/guest@my.umbc.edu/dfa76de7478d788248e005724b8a3d28/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 14 Dec 2017 20:39:18 -0500</PostedAt>
</NewsItem>

</News>
