<?xml version="1.0"?>
<News hasArchived="true" page="2" pageCount="7" pageSize="10" timestamp="Tue, 28 Apr 2026 01:25:41 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=2&amp;tag=talks">
<NewsItem contentIssues="true" id="116410" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/116410">
<Title>talk: Users&#8217; Preferences for Enhanced Misinformation Warnings on Twitter</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/01/twitter3.jpg" rel="nofollow external" class="bo"><img width="1024" height="461" src="https://www.csee.umbc.edu/wp-content/uploads/2022/01/twitter3-1024x461.jpg" alt="" style="max-width: 100%; height: auto;"></a><hr><p><strong>The UMBC Cyber Defense Lab presents</strong></p><h2><strong>Context, a Red Flag, or Both? Users’ Preferences for Enhanced Misinformation Warnings on Twitter</strong></h2><h3><strong>Prof. Filipo Sharevski<br><a href="https://acal.cdm.depaul.edu" rel="nofollow external" class="bo">Adversarial Cybersecurity Automation Lab</a><br>DePaul University</strong></h3><h3><strong>12–1pm ET Friday, 4 Feb. 2022, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>Warning users about hazardous information on social media is far from a simple usability task. The so-called soft moderation must balance between debunking falsehoods and avoiding moderation bias while avoiding disrupting the social media consumption flow. Platforms thus employ visually indistinguishable warning tags with generic text under a suspected misinformation content. This approach resulted in an unfavorable outcome where the warnings “backfired” and users believed the misinformation more, not less. To address this predicament, we developed enhancements to the misinformation warnings where users are advised on the context of the information hazard and exposed to standard warning iconography.</p><p>Balancing for comprehensibility, the enhanced warning tags provide context in regards to (1) fabricated facts; and (2) improbable interpretations of facts. Instead of the generic “Get the facts about the COVID-19 vaccine” warning, users in the first case are warned about “Strange, Potentially, Adverse Misinformation (SPAM): If this were an email, this would have ended up in your spam folder” and in the second case about “For Facts Sake (FFS): In this tweet, facts are missing, out of context, manipulated, or missing a source.” The SPAM warning tag contextualizes misinformation with an analogy to an already known phenomenon of spam email, while the FFS warning tag as an acronym blends with the characteristic communication Twitter behavior with compact language due to the tweets’ length restriction. The text-only warning tags were then paired with the hereto ignored usable security intervention when it comes to misinformation: red flags as watermarks over the suspected misinformation tweets. The tag-and-flag variant provided an option for us also to test user receptivity to warnings that incorporate contrast (red), gestalt iconography for general warnings (flag), and actionable advice for inspection (watermark).</p><p>We ran an A/B evaluation with Twitter’s original warnings in a usability study with 337 participants. The majority of the participants preferred the enhancements as a nudge towards recognizing and avoiding misinformation. The enhanced warnings were most favored by the politically left-leaning and to a lesser degree moderate participants, but they also appealed to roughly a third of the right-leaning participants. The education level was the only demographic factor shaping participants’ preferences for the proposed enhancements. Through this work, we are the first to perform an A/B evaluation of enhanced social media warnings providing context and introducing visual design frictions in interacting with hazardous information. Our sentiment analysis towards soft moderation in general, and enhanced warning tags in particular from a political and demographic perspective, provides the basis for our recommendations about future refinements, frictions, and adaptations of soft moderation towards secure and safe behavior on social media.</p><p>About the Speaker. <a href="https://www.cdm.depaul.edu/Faculty-and-Staff/Pages/faculty-info.aspx?fid=1341" rel="nofollow external" class="bo">Dr. Filipo Sharevski</a> (*protected email*) is an assistant professor of cybersecurity and director of the Adversarial Cybersecurity Automation Lab (<a href="https://acal.cdm.depaul.edu">https://acal.cdm.depaul.edu</a>). His main research interest is adversarial cybersecurity automation, m/disinformation, usable security, and social engineering. Sharevski earned the PhD degree in interdisciplinary information security at Purdue University, CERIAS in 2015.</p><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2022/01/talk-users-preferences-for-enhanced-misinformation-warnings-on-twitter/" rel="nofollow external" class="bo">talk: Users’ Preferences for Enhanced Misinformation Warnings on Twitter</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Context, a Red Flag, or Both? Users’ Preferences for Enhanced Misinformation Warnings on Twitter  Prof. Filipo Sharevski Adversarial Cybersecurity Automation...</Summary>
<Website>https://www.csee.umbc.edu/2022/01/talk-users-preferences-for-enhanced-misinformation-warnings-on-twitter/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/116410/guest@my.umbc.edu/f1b878c125177394163a14f2a598021e/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 30 Jan 2022 17:22:13 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="115623" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/115623">
<Title>talk: Building Resilience against Cyberattacks, 12pm ET, Dec 15</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/12/drone.png" rel="nofollow external" class="bo"><img width="1024" height="461" src="https://www.csee.umbc.edu/wp-content/uploads/2021/12/drone-1024x461.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h5><strong><a href="http://artiamas.umd.edu/" rel="nofollow external" class="bo">ArtIAMAS</a> Seminar Series, Co-organized by UMBC, UMCP, and the Army Research Lab</strong></h5><hr><h2><strong>Building Resilience against Cyberattacks</strong></h2><h2><strong>Aryya Gangopadhyay, UMBC</strong></h2><hr><h4><strong>12-1 PM ET Wednesday, 15 December 15, 2021<br>Online via <a href="https://umbc.webex.com/meet/nroy" rel="nofollow external" class="bo">webex</a> </strong></h4><hr><p>In this talk, we will address the issue of building resilient systems in the face of cyberattacks. We will present a defense mechanism for cyberattacks using a three-tier architecture that can be used to secure army assets and tactical information. The top tier represents the front-end where autonomous sensing and inferencing through AI models take place by UAVs, UGVs, etc. We will illustrate how models can be defended against data poisoning attacks. In the middle tier, we focus on building cyber defense against attacks in federated learning environments, where models are trained on a large corpus of decentralized data without transferring raw data over a communication channel. The bottom tier represents back-end servers that train deep learning models with large amounts of data that can subsequently be pushed to the edge for inferencing. We will demonstrate how adaptive models can be developed for detecting and preventing various types of attacks at this level.</p><p><a href="https://sites.google.com/site/homearyya/" rel="nofollow external" class="bo">Dr. Aryya Gangopadhyay</a> is a Professor in the Information Systems department at the University of Maryland, Baltimore County. Dr. Gangopadhyay has a courtesy appointment as a Professor in Computer Science and Electrical Engineering at UMBC. He is also the Director of the <a href="https://cards.umbc.edu/" rel="nofollow external" class="bo">Center for Real-time Sensing and Autonomy</a> (CARDS) at UMBC. His research interests include adversarial machine learning at the edge, cybersecurity, and smart cities. He has graduated 16 Ph.D. students and is currently mentoring several others at UMBC. He has published over 125 peer-reviewed research articles and has received extramural support from ARL, NSF, NIST, the Department of Education, and IBM.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/12/talk-building-resilience-against-cyberattacks-12pm-et-dec-15/" rel="nofollow external" class="bo">talk: Building Resilience against Cyberattacks, 12pm ET, Dec 15</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>ArtIAMAS Seminar Series, Co-organized by UMBC, UMCP, and the Army Research Lab   Building Resilience against Cyberattacks  Aryya Gangopadhyay, UMBC   12-1 PM ET Wednesday, 15 December 15, 2021...</Summary>
<Website>https://www.csee.umbc.edu/2021/12/talk-building-resilience-against-cyberattacks-12pm-et-dec-15/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/115623/guest@my.umbc.edu/aa1b72aa3f32f6e87007a518014d42f9/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 09 Dec 2021 16:05:18 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="115283" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/115283">
<Title>talk: Shadow IT in Higher Ed: Survey &amp; Case Study for Cybersecurity, 12-1 Fri 12-3</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/11/shadow-it-tweet-1.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/11/shadow-it-tweet-1-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a>Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval.<hr><h4>The UMBC Cyber Defense Lab presents</h4><h3><strong>Shadow IT in Higher Education: Survey and Case Study for Cybersecurity</strong></h3><h4>Selma Gomez Orr, Cyrus Jian Bonyadi, Enis Golaszewski, and Alan T. Sherman<br>UMBC Cyber Defense Lab</h4><h4>Joint work with Peter A. H. Peterson (University of Minnesota Duluth), Richard Forno, Sydney Johns, and Jimmy Rodriguez</h4><h4>12-1:00 pm, Friday, 3 December 2021, online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h4><hr><p>We explore shadow information technology (IT) at institutions of higher education through a two-tiered approach involving a detailed case study and comprehensive survey of IT professionals. In its many forms, shadow IT is the software or hardware present in a computer system or network that lies outside the typical review process of the responsible IT unit. We carry out a case study of an internally built legacy grants management system at the University of Maryland, Baltimore County that exemplifies the vulnerabilities, including cross-site scripting and SQL injection, typical of such unauthorized and ad-hoc software. We also conduct a survey of IT professionals at universities, colleges, and community colleges that reveals new and actionable information regarding the prevalence, usage patterns, types, benefits, and risks of shadow IT at their respective institutions.</p><p>Further, we propose a security-based profile of shadow IT, involving a subset of elements from existing shadow IT taxonomies, that categorizes shadow IT from a security perspective. Based on this profile, survey respondents identified the predominant form of shadow IT at their institutions, revealing close similarities to findings from our case study.</p><p>Through this work, we are the first to identify possible susceptibility factors associated with the occurrence of shadow IT-related security incidents within academic institutions. Correlations of significance include the presence of certain graduate schools, the level of decentralization of the IT department, the types of shadow IT present, the percentage of security violations related to shadow IT, and the institution’s overall attitude toward shadow IT. The combined elements of our case study, profile, and survey provide the first comprehensive view of shadow IT security at academic institutions, highlighting the tension between its risks and benefits, and suggesting strategies for managing it successfully.</p><hr><p>Dr. Selma Gomez Orr (*protected email* ) received her Ph.D. from Harvard University in the field of decision sciences. She also holds Masters degrees in applied mathematics, engineering sciences, and business administration, also from Harvard. She has worked in the private sector in the fields of cybersecurity and data analytics. Most recently, as a CyberCorps Scholarship for Service (SFS) Scholar, Dr. Orr completed a Master’s of Professional Studies in both cybersecurity and data science at UMBC.</p><p>Cyrus Jian Bonyadi (*protected email* ) is a computer science Ph.D. student and former SFS scholar studying consensus theory at UMBC under the direction of Alan T. Sherman, Sisi Duan, and Haibin Zhang.</p><p>Enis Golaszewski (*protected email* ) is a Ph.D. student at UMBC under Alan T. Sherman where he studies, researches, and teaches cryptographic protocol analysis. A former SFS scholar, Golaszewski helps lead annual research studies that analyze and break software at UMBC.</p><p>Dr. Alan T. Sherman (*protected email*) is a professor of computer science, director of CDL, and associate director of UMBC’s Cybersecurity Center. His main research interest is high-integrity voting systems. Sherman earned the Ph.D. degree in computer science at MIT in 1987 studying under Ronald L. Rivest.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: Feb 4, Filipo Sharevski</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/11/talk-shadow-it-in-higher-ed-survey-case-study-for-cybersecurity-12-1-fri-12-3/" rel="nofollow external" class="bo">talk: Shadow IT in Higher Ed: Survey &amp; Case Study for Cybersecurity, 12-1 Fri 12-3</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval.  The UMBC Cyber Defense Lab presents  Shadow IT in...</Summary>
<Website>https://www.csee.umbc.edu/2021/11/talk-shadow-it-in-higher-ed-survey-case-study-for-cybersecurity-12-1-fri-12-3/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/115283/guest@my.umbc.edu/39d95801f3853f6884030ec740dcbf93/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 28 Nov 2021 21:06:07 -0500</PostedAt>
<EditAt>Sun, 28 Nov 2021 21:06:07 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="100998" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100998">
<Title>talk: Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking, 12-1pm ET 4/30</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a><hr><h4>T<em>he UMBC Cyber Defense Lab presents</em></h4><hr><h2><strong>Thinking Like an Attacker:<br>Towards a Definition and Non-Technical Assessment of Adversarial Thinking</strong></h2><hr><h3><strong>Prof. Peter A. H. Peterson<br>Department of Computer Science<br>University of Minnesota Duluth</strong></h3><hr><h3><strong>12:00–1:00 pm ET,  Friday, 30 April 2021<br>via <a href="https://www.google.com/url?q=http://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw0NzFbKL9rpMeiZq08wCs5u" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p><em>“Adversarial thinking” (AT)</em>, sometimes called the “security mindset” or described as the ability to “think like an attacker,” is widely accepted in the computer security community as an essential ability for successful cybersecurity practice. Supported by intuition and anecdotes, many in the community stress the importance of AT, and multiple projects have produced interventions explicitly intended to strengthen individual AT skills to improve security in general. However, there is no agreed-upon definition of “adversarial thinking” or its components, and accordingly, no test for it. Because of this absence, it is impossible to meaningfully quantify AT in subjects, AT’s importance for cybersecurity practitioners, or the effectiveness of interventions designed to improve AT. Working towards the goal of a characterization of AT in cybersecurity and a non-technical test for AT that anyone can take, I will discuss existing conceptions of AT from the security community, as well as ideas about AT in other fields with adversarial aspects including war, politics, law, critical thinking, and games. I will also describe some of the unique difficulties of creating a non-technical test for AT, compare and contrast this effort to our work on the CATS and Security Misconceptions projects, and describe some potential solutions. I will explore potential uses for such an instrument, including measuring a student’s change in AT over time, measuring the effectiveness of interventions meant to improve AT, comparing AT in different populations (e.g., security professionals vs. software engineers), and identifying individuals from all walks of life with strong AT skills—people who might help meet our world’s pressing need for skilled and insightful security professionals and researchers. Along the way, I will give some sample non-technical adversarial thinking challenges and describe how they might be graded and validated.</p><hr><p><a href="https://www.google.com/url?q=https://www.d.umn.edu/~pahp/&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw2KbY0Y-8OtY454pn3qRo0E" rel="nofollow external" class="bo"> Peter A. H. Peterson</a> is an assistant professor of computer science at the University of Minnesota Duluth, where he teaches and directs the <em>Laboratory for Advanced Research in Systems (LARS)</em>, a group dedicated to research in operating systems and security, with a special focus on research and development to make security education more effective and accessible. He is an active member of the <em>Cybersecurity Assessment Tools (CATS)</em> project working to create and validate two concept inventories for cybersecurity, is working on an NSF-funded grant to identify and remediate commonsense misconceptions about cybersecurity, and is also the author of several hands-on security exercises for Deterlab that have been used at many institutions around the world. He earned his Ph.D. from the University of California, Los Angeles for work on <em>“adaptive compression”</em>—systems that make compression decisions dynamically to improve efficiency. He can be reached at *protected email*.</p><hr><p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email* </a><em>Support for this event was provided in part by the National Science Foundation under SFS grant </em><em>DGE-1753681</em><em>. </em><em>The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. </em><strong>Upcoming CDL Meetings: </strong>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/talk-thinking-like-an-attacker-towards-a-definition-and-non-technical-assessment-of-adversarial-thinking-1-2pm-et-4-23/" rel="nofollow external" class="bo">talk: Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking, 12-1pm ET 4/30</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking   Prof. Peter A. H. Peterson Department of Computer...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/talk-thinking-like-an-attacker-towards-a-definition-and-non-technical-assessment-of-adversarial-thinking-1-2pm-et-4-23/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100998/guest@my.umbc.edu/b9eb41315e9af41ec2b20963321b76ce/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 16 Apr 2021 22:05:06 -0400</PostedAt>
<EditAt>Fri, 16 Apr 2021 22:05:06 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="100551" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100551">
<Title>talk: MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game, 12-1 ET 4/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/adversary.png" rel="nofollow external" class="bo"><img width="1024" height="256" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/adversary-1024x256.png" alt="" style="max-width: 100%; height: auto;"></a><h5><em>The UMBC Cyber Defense Lab presents</em></h5><hr><h2><strong>MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game</strong></h2><hr><h3><strong>Akriti Anand, Richard Baldwin, Sudha, Kosuri, Julie Nau, and Ryan Wunk-Fink<br>UMBC Cyber Defense Lab</strong></h3><h4><strong>joint work with Alan Sherman, Marc Olano, Linda Oliva, Edward Zieglar, and Enis Golazewski</strong></h4><h3><strong>12:00 noon–1 pm ET, Friday, 9 April 2021<br>online via <a href="https://www.google.com/url?q=http://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw0NzFbKL9rpMeiZq08wCs5u" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>We present our progress and plans in developing <em>MeetingMayhem</em>, a new web-based educational exercise that helps students learn adversarial thinking in communication networks. The goal of the exercise is to arrange a meeting time and place by sending and receiving messages through an insecure network that is under the control of a malicious adversary.  Players can assume the role of participants or an adversary.  The adversary can disrupt the efforts of the participants by intercepting, modifying, blocking, replaying, and injecting messages.  Through this engaging authentic challenge, students learn the dangers of the network, and in particular, the Dolev-Yao network intruder model. They also learn the value and subtleties of using cryptography (including encryption, digital signatures, and hashing), and protocols to mitigate these dangers.  Our team is developing the exercise in spring 2021 and will evaluate its educational effectiveness.</p><hr><p><em>Akriti Anand </em>(*protected email*) is an MS student in computer science working with Alan Sherman.  She is the lead software engineer and focuses on the web frontend. <em>Richard Baldwin </em>(*protected email*) is a BS student in computer science, a member of Cyberdawgs, and lab manager for the Cyber Defense Lab. <em>Sudha Kosuri </em>(*protected email*) is a MS student in computer science.  She is working on the frontend (using React and Flask) and its integration with the backend. <em>Julie Nau </em>(*protected email*) is a BS student in computer science.  She is working on the backend and on visualizations. <em>Ryan Wunk-Fink </em>(*protected email*) is a PhD student in computer science working with Alan Sherman. He is developing the backend.</p><hr><p>Host: Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email* </a><em>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.</em></p><p> Upcoming CDL Meetings: April 23, Peter Peterson (Univ. of Minnesota Duluth), Adversarial thinking; May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/talk-meetingmayhem-teaching-adversarial-thinking-through-a-web-based-game/" rel="nofollow external" class="bo">talk: MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game, 12-1 ET 4/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game   Akriti Anand, Richard Baldwin, Sudha, Kosuri, Julie Nau, and Ryan Wunk-Fink UMBC...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/talk-meetingmayhem-teaching-adversarial-thinking-through-a-web-based-game/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100551/guest@my.umbc.edu/bd9a50f5089d5fb7803fb276e43742af/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 04 Apr 2021 20:20:01 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="100066" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100066">
<Title>talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning.png" rel="nofollow external" class="bo"><img width="1024" height="451" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning-1024x451.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h2><strong>Transparent Dishonesty: Front-Running Attacks on Blockchain</strong></h2><hr><h3><strong>Professor Jeremy Clark<br>Concordia Institute for Information Systems Engineering<br>Concordia University, Montreal, Canada</strong></h3><hr><h3><strong>12–1 pm ET Friday, March 26, 2021<br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>We consider front-running to be a course of action where an entity benefits from prior access to privileged market information about upcoming transactions and trades. Front-running has been an issue in financial instrument markets since the 1970s. With the advent of blockchain technology, front-running has resurfaced in new forms we explore here, instigated by blockchain’s decentralized and transparent nature. I will discuss our “systemization of knowledge” paper which draws from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain. Additionally, we carry out a detailed analysis of Status.im initial coin offering (ICO) and show evidence of abnormal miner’s behavior indicative of front-running token purchases. Finally, we map the proposed solutions to front-running into useful categories.</p><hr><p><a href="https://users.encs.concordia.ca/~clark/" rel="nofollow external" class="bo">Jeremy Clark</a> is an associate professor at the Concordia Institute for Information Systems Engineering. At Concordia, he holds the NSERC/Raymond Chabot Grant Thornton/Catallaxy Industrial Research Chair in Blockchain Technologies. He earned his Ph.D. from the University of Waterloo, where his gold medal dissertation was on designing and deploying secure voting systems including Scantegrity—the first cryptographically verifiable system used in a public sector election. He wrote one of the earliest academic papers on Bitcoin, completed several research projects in the area, and contributed to the first textbook. Beyond research, he has worked with several municipalities on voting technology and testified to both the Canadian Senate and House finance committees on Bitcoin. email: *protected email*</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings: April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking;<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/" rel="nofollow external" class="bo">talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Transparent Dishonesty: Front-Running Attacks on Blockchain   Professor Jeremy Clark Concordia Institute for Information Systems Engineering Concordia...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100066/guest@my.umbc.edu/d4bc2ab5111c08f1abdbdbda8c5ad757/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Mar 2021 16:56:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99477" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99477">
<Title>talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><em>The UMBC Cyber Defense Lab presents</em></h4><h2><strong>Moving Target Mobile IPv6 Defense</strong></h2><h3><strong>Prof.</strong> <strong>Vahid Heydari<br>Computer Science, Rowan University</strong></h3><h4><strong>12:00–1 pm ET, Friday, 26 February 26, 2021</strong></h4><h4>remotely via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx  </a></h4><hr><p>Remote cyberattacks can be started from an unlimited distance through the Internet. These attacks include particular actions that allow attackers to compromise systems remotely. Address-based Distributed Denial-of-Service (DDoS) attacks and remote exploits are two main categories of these attacks. A remote exploit takes advantage of a bug or vulnerability to view or steal data or gain unauthorized access to a vulnerable system. Current security solutions in IPv6 such as IPsec, firewall, and Intrusion Detection and Prevention System (IDPS) can prevent remote attacks against known vulnerability exploits. However, zero-day exploits can defeat the best firewalls and IDPSs due to using undisclosed and uncorrected computer application vulnerability. Therefore, a new solution is needed to prevent these attacks. This talk discusses a Moving Target Mobile IPv6 Defense (MTM6D) that randomly and dynamically changes the IP addresses to prevent remote attacks in the reconnaissance step. The talk briefly covers the wide range of applications of MTM6D including critical infrastructure networks, virtual private networks, web servers, Internet-controlled robots, and anti-censorship.</p><p><a href="https://csm.rowan.edu/departments/cs/facultystaff/compsci_full_part/heydari.html" rel="nofollow external" class="bo"> Vahid Heydari</a> received the M.S. degree in Cybersecurity and the Ph.D. degree in Electrical and Computer Engineering from the University of Alabama in Huntsville. He is currently an Associate Professor of Computer Science and the Director of the Center for Cybersecurity Education and Research at Rowan University, Glassboro, NJ. He is also a co-founder of a cybersecurity startup ObtegoCyber. His research interests include moving target defenses, mobile ad-hoc, sensor, and vehicular network security. He is a member of ACM, IEEE Computer Society and Communications Society. </p><p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*, </a>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. Upcoming CDL Meetings:</p><p>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security<br>Mar 26, Jeremy Clark (Concordia)<br>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game<br>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/" rel="nofollow external" class="bo">talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Moving Target Mobile IPv6 Defense  Prof. Vahid Heydari Computer Science, Rowan University  12:00–1 pm ET, Friday, 26 February 26, 2021  remotely via WebEx  ...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99477/guest@my.umbc.edu/b263066653caa243e383338d141a32f9/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Feb 2021 19:44:51 -0500</PostedAt>
<EditAt>Sun, 21 Feb 2021 19:44:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="98823" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/98823">
<Title>talk: 2021 SFS Research Study: Vulnerabilities in UMBC&#8217;s Incident Management System, 12-1 Jan. 29</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/01/sfs2.png" rel="nofollow external" class="bo"><img width="1024" height="432" src="https://www.csee.umbc.edu/wp-content/uploads/2021/01/sfs2-1024x432.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>The 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System</strong></h2><h3><strong>Cyrus Bonyadi and Enis Golaszewski</strong><br>CSEE Department, UMBC</h3><h3>12:00noon–1pm Friday, 29 January 2021</h3><h3>remotely via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><hr><p><strong> </strong>January 11–15, 2020, UMBC scholars in the CyberCorps: Scholarship for Service (SFS) and the DoD Cybersecurity Scholarship (CySP) programs collaboratively analyzed the security of UMBC’s Incident Management System (IMS). Students found numerous serious issues, including race conditions, code-injection, and cross-site scripting attacks, improper API implementation, and denial-of-service attacks. We present findings, recommendations, and details of these vulnerabilities.</p><p>UMBC’s Incident Management System (IMS) is a web application under development by UMBC’s DoIT to supplement their RequestTracker (RT). IMS allows DoIT security staff to supplement the information in RT by linking IMS incidents to RT tickets. IMS incidents store additional information and files regarding existing and potential security campaigns. Using the information in IMS and RT, DoIT generates executive reports, which can influence decisions related to budget, training, and other security concerns. Our study is helping to improve the architecture and implementation of IMS.</p><p>Participants comprised BS, MS, MPS, and Ph.D. students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College (MC) and Prince George’s Community College (PGCC) to complete their four-year degrees at UMBC.</p><p>About the Speakers. <em>Cyrus Jian Bonyadi</em> is a Ph.D. Student at UMBC working on distributed computing consensus theory. He is an alumnus of the varsity CyberDawgs team. email: *protected email*  Enis Golaszewski is a Ph.D. Student at UMBC working on protocol analysis. He is a leading member of the Protocol Analysis Lab under Dr. Sherman. email: *protected email*, </p><hr><p>Host: Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm.  All meetings are open to the public. Upcoming CDL Meetings:</p><ul><li>Feb 12, Richard Carback (xxnetwork), Startup lessons learned</li><li>Feb 26, Vahid Heydari (Rowan University)</li><li>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security</li><li>Mar 26, Jeremy Clark (Concordia)</li><li>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game</li><li>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking</li><li>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</li></ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/01/talk-2021-sfs-research-study-vulnerabilities-in-umbcs-incident-management-system-12-1-jan-29/" rel="nofollow external" class="bo">talk: 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System, 12-1 Jan. 29</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System  Cyrus Bonyadi and Enis Golaszewski CSEE Department, UMBC  12:00noon–1pm Friday, 29 January 2021  remotely via...</Summary>
<Website>https://www.csee.umbc.edu/2021/01/talk-2021-sfs-research-study-vulnerabilities-in-umbcs-incident-management-system-12-1-jan-29/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/98823/guest@my.umbc.edu/e1c770981082bf24494dd3e617b48316/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 29 Jan 2021 09:30:31 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="97805" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/97805">
<Title>talk: Tim Brennan on &#8220;Economics of Law&#8221; &#8211; Insights into Cybersecurity Policy, 12pm Tue 12/8</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/12/Tim_Brennan-1024x512.png" alt="" style="max-width: 100%; height: auto;"><em>Tim Brennan speaks at a research forum on campus. Photo by Marlayna Demond ’11 for UMBC.</em><hr><h3><strong>The UMBC Center for Cybersecurity (UCYBR) Presents</strong></h3><hr><h1><strong>“Economics of Law”</strong> –<br><strong> Insights into Cybersecurity Policy</strong><br></h1><h2><strong>Dr. Tim Brennan<br>Professor Emeritus, UMBC</strong></h2><h3><br><strong>Tuesday 8 December 2020 from 12-1 pm</strong></h3><h4><strong><a href="https://umbc.webex.com/umbc/j.php?MTID=m5cd8c627716efe8c1836abae054ccbc8" rel="nofollow external" class="bo">Webex</a>, Meeting #: 120 246 4425</strong></h4><hr><p>Cybersecurity raises questions about who owns data and how best to discourage security breaches.  This talk will offer some unexpected and perhaps controversial perspectives from economics on relevant questions, including: Who presumptively should own data?  What is the purpose of liability law?  Should those who violate data security always be liable, or only if they fail to take appropriate measures to prevent leaks?  Could “the market” solve the problem, e.g., by people choosing where to shop on the basis of data security?  Would regulation be a better means than liability to promote cybersecurity?  Don’t expect answers to these questions; my hope is to stimulate and hopefully inform the discussion.  If time allows, I’ll review some major actions by the Federal Trade Commission, who is the lead national agency policing privacy-related conduct. </p><hr><p><a href="https://cybersecurity.umbc.edu/tim-brennan/" rel="nofollow external" class="bo">Dr. Tim Brennan</a> is professor emeritus of public policy and economics at UMBC, retiring in July 2020 after thirty years on the UMBC faculty.  He has also been FCC Chief Economist, held the T.D. MacDonald Chair in the Canadian government’s Competition Bureau, and served on the staff of the White House Council of Economic Advisers.  Before UMBC, he was an associate professor of telecommunications and public policy at George Washington University and a staff economist at the US Department of Justice Antitrust Division.  He has over 130 articles and book chapters and books on competition policy, economic regulation, telecommunications and energy policy, intellectual property, and economic methods.  His MA in math and Ph..D. in economics are from the University of Wisconsin.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/12/talk-tim-brennan-on-economics-of-law-insights-into-cybersecurity-policy-12pm-tue-12-8/" rel="nofollow external" class="bo">talk: Tim Brennan on “Economics of Law” – Insights into Cybersecurity Policy, 12pm Tue 12/8</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Tim Brennan speaks at a research forum on campus. Photo by Marlayna Demond ’11 for UMBC.  The UMBC Center for Cybersecurity (UCYBR) Presents   “Economics of Law” –  Insights into Cybersecurity...</Summary>
<Website>https://www.csee.umbc.edu/2020/12/talk-tim-brennan-on-economics-of-law-insights-into-cybersecurity-policy-12pm-tue-12-8/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/97805/guest@my.umbc.edu/319e308ce9369bba3f0d0ae6ecff59ce/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 02 Dec 2020 10:21:32 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="97455" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/97455">
<Title>talk: Cybersecurity &amp; Local Government: Findings from a Nationwide Survey, 12-12 EST 11/19</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/11/norris-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h2><strong>Cybersecurity and Local Government: Findings from a Nationwide Survey</strong></h2><h2><strong>Donald Norris &amp; Laura Mateczun</strong></h2><h3><strong>11:00-12:00 EST, Thursday, Nov 19, 2020</strong></h3><h4><a href="https://umd.zoom.us/webinar/register/WN_V5kzYAijSWicRldpKzqXxw" rel="nofollow external" class="bo">register</a> to get the webinar link</h4><hr><p>This talk will discuss data and results from the first nationwide survey of cybersecurity among local or grassroots governments in the United States, examines how these governments manage this important function. As we have shown elsewhere, cybersecurity among local governments is increasingly important because these governments are under constant or nearly constant cyberattack. Due to the frequency of cyberattacks, as well as the probability that at least some attacks will succeed and cause damage to local government information systems, these governments have a great responsibility to protect their information assets. This, in turn, requires these governments to manage cybersecurity effectively, something our data show is largely absent at the American grassroots. That is, on average, local governments fail to manage cybersecurity well. After discussing our findings, we conclude and make recommendations for ways of improving local government cybersecurity management.</p><p><a href="https://publicpolicy.umbc.edu/donald-f-norris/" rel="nofollow external" class="bo">Donald F. Norris</a> is Professor Emeritus, School of Public Policy, University of Maryland, Baltimore County. His principal field of study is public management, specifically information technology in governmental organizations, including electronic government and cybersecurity. He has published extensively in refereed journals in these areas. He received a B.S. in history from the University of Memphis and an M.A. and a Ph. D. in political science from the University of Virginia.</p><p><a href="https://www.linkedin.com/in/laura-mateczun/" rel="nofollow external" class="bo">Laura Mateczun</a> is a graduate of the University of Maryland Francis King Carey School of Law, and a member of the Maryland Bar. She is currently a Ph.D. student at the University of Maryland, Baltimore County School of Public Policy studying public management. Her research interests involve local government cybersecurity, criminal justice, and the importance of equity in</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/11/talk-cybersecurity-local-government-findings-from-a-nationwide-survey-12-12-est-11-19/" rel="nofollow external" class="bo">talk: Cybersecurity &amp; Local Government: Findings from a Nationwide Survey, 12-12 EST 11/19</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Cybersecurity and Local Government: Findings from a Nationwide Survey  Donald Norris &amp; Laura Mateczun  11:00-12:00 EST, Thursday, Nov 19, 2020  register to get the webinar link   This talk...</Summary>
<Website>https://www.csee.umbc.edu/2020/11/talk-cybersecurity-local-government-findings-from-a-nationwide-survey-12-12-est-11-19/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/97455/guest@my.umbc.edu/fcf05cf48b157cdc6cba7d4dd8c6db94/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 14 Nov 2020 19:46:36 -0500</PostedAt>
</NewsItem>

</News>
