Fall 2020 ITM Undergraduate Advising Notes

March 24, 2020 author: Comments off

The Fall 2020 ITM Undergraduate Advising Notes are now available here at Fall 2020 ITM Undergraduate Advising Notes and at http://itm.iit.edu/data/Fall2020ITMUndergraduateAdvisingNotes.pdf. (Revised 4/2/2020)

Google Drive File Stream

February 12, 2020 author: Comments off

Google Drive File Stream: We’ve recently had a great addition to our Google for Education services: Google Drive File Stream.
Like many good things around here, this was brought to our attention by one of our students.
Google Drive File Stream, once installed on your Windows PC or Mac, will mount your Illinois Tech Google Drive as a local drive on your system. You can treat it just like any other drive; in Windows it even has a drive letter. And it’s fast. You get two directories on the drive: your own Google Drive and your Shared Drives (what used to he called Team Drives). Log onto your Illinois Tech Google account and go to https://support.google.com/drive/answer/7329379 to download the app and get started. First uninstall the Google Drive application or Google Drive Backup and Sync app if you have either installed. For some reason the text in the installation app on both PCs we installed it on appeared as gibberish, but you might want to use the command-line installer anyway. Open a command line in your download directory, and run “GoogleDriveFSSetup --silent --desktop_shortcut --gsuite_shortcuts=false“. There is a daily limit of 750 GB of file transfer but this just means you can’t upload your terabyte hard drive all in one day. A HUGE workflow enhancer; enjoy!

NIST Big Data interoperability Framework

February 12, 2020 author: Comments off

Most of us are familiar with the huge quantity of cybersecurity publications from the National Institute for Standards and Technology, but they have a standardization role that reaches far beyond security. A prime example that many of us might find useful is the NIST Big Data interoperability Framework (NBDIF). Built as a vendor-neutral, technology- and infrastructure-independent ecosystem; it can enable Big Data stakeholders (e.g. data scientists, researchers, etc.) to utilize the best available analytics tools to process and derive knowledge through the use of standard interfaces between swappable architectural components. It is a series of 10 NIST Special Publications:

NBDIF V3.0 Final Version

  1. NIST SP 1500-1r2  -- Volume 1: Definitions
  2. NIST SP 1500-2r2  -- Volume 2: Taxonomies
  3. NIST SP 1500-3r2  -- Volume 3: Use Case & Requirements
  4. NIST SP 1500-4r2  -- Volume 4: Security and Privacy
  5. NIST SP 1500-5    -- Volume 5: Architectures White Paper Survey
  6. NIST SP 1500-6r2  -- Volume 6: Reference Architecture
  7. NIST SP 1500-7r2  -- Volume 7: Standards Roadmap
  8. NIST SP 1500-9r1  -- Volume 8: Reference Architecture Interface
  9. NIST SP 1500-10r1 -- Volume 9: Modernization and Adoption

All found at https://bigdatawg.nist.gov/V3_output_docs.php. And as always with everything from NIST (since our tax dollars paid for this), it’s free.

Foreign Affairs IT Fellowship – U.S. Department of State

December 19, 2019 author: Comments off

Through the Foreign Affairs IT Fellowship, the U.S. Department of State is seeking to attract top-notch tech talent to the Foreign Service ranks that reflects the diversity of the United States. Women, members of minority groups historically underrepresented in the Foreign Service and students with financial need are encouraged to apply to this challenging and rewarding opportunity. Two ITM students have been selected for this program in the past, Akvile Kisis and Andreas Vassilakos. You can see a video of Akvile’s experiences in this program at https://www.faitfellowship.org/videos/akvile-travel-make-a-global-impact-and-have-a-unique-it-job/ . We are pleased to be one of only two institutions that has had more than one student selected for this program, and they are certainly looking for more from us. The program pays for the last two years of undergraduate education or for graduate education in information technology, with a stipend and two summer internships. Students completing the program serve for five years as Foreign Service Specialists in the U.S. State Department. You must be a U.S. citizen to apply, and applications are due February 15, 2020 update: midnight February 14, 2020. Full details can be found at https://www.faitfellowship.org/  and the application is at https://www.faitfellowship.org/how-to-apply/ . Andreas has generously offered to assist students in completing the application; you can contact him at avassilakos@hawk.iit.edu.

DoD Cyber Scholarships for 2020-2021

December 5, 2019 author: Comments off

The U.S. Department of Defense is offering Cyber Scholarships to U.S. citizens who will be Juniors, Seniors, or graduate students in the fall of 2019. Because we are a National Center of Academic Excellence in Cyber Defense Education, you may be eligible to apply.  This is a one-year scholarship covering full books, tuition, and a $25,000 stipend for undergraduates or a $30,000 stipend for graduate students. The scholarships are renewable but require a new application each year. After graduation, scholarship recipients will work one year of federal service in a cyber security or digital forensics role for each year of scholarship support, or four years of military service. Applicants must be eligible for a security clearance. Applicants are not limited to students in the Department of Information Technology and Management but may also be students in Computer Science, Computer Engineering, Electrical Engineering, and Business, but because of the nature of the application, knowledge of and a clear understanding of cyber security is a necessity. Please read the scholarship details document carefully and completely before filling out the application. An official transcript must accompany your application and should be attached, unopened, to the application. A complete printed and signed physical application must be delivered to the ITM Department office, Perlstein Hall suite 223 no later than 8:30am Monday February 17th so we can evaluate and include your scholarship in our funding request, which is due February 28th. When you submit your physical application, you will be given instructions for uploading a digital copy of your application in PDF format. Multiple files may be submitted as a .zip file but all files must be PDF files.

The application and full details of the scholarship are included below.

If you have read all of the materials and you still have questions, please contact Professor Ray Trygstad at trygstad@iit.edu. Please include “DOD Cyber Scholarship” as the first thing in the subject line of your email.

Fall 2019 ITM Student Handbooks

August 16, 2019 author: Comments off
Categories: Uncategorized Tags:

DoD Cyber Scholarships for 2019-2020

January 25, 2019 author: Comments off

The U.S. Department of Defense is offering Cyber Scholarships to U.S. citizens who will be Juniors, Seniors, or graduate students in the fall of 2019 This is a one-year scholarship covering full books, tuition, and a $25,000 stipend for undergraduates or a $30,000 stipend for graduate students. The scholarships are renewable but require a new application each year. After graduation, scholarship recipients will work one year of federal service in a cyber security or digital forensics role for each year of scholarship support, or four years of military service. Applicants must be eligible for a security clearance. Applicants are not limited to students in the Department of Information Technology and Management but may also be students in Computer Science, Computer Engineering, Electrical Engineering, and Business, but because of the nature of the application, knowledge of and a clear understanding of cyber security is a necessity. Please read the scholarship details document carefully and completely before filling out the application. A printed and signed physical application must be delivered to the ITM Department office, Perlstein Hall suite 223 no later than 8:30am Monday February 18th so we can evaluate and include your scholarship in our funding request, which is due February 28th. The application and full details of the scholarship are included below. 

Contact Professor Ray Trygstad for questions: trygstad@iit.edu. Please include “DOD Cyber Scholarship” as the first thing in the subject line of your email.

Hotel business centers can steal your life

December 2, 2018 author: Comments off

Many of us travel regularly for business or pleasure, and even though most of us probably haul along our own computer or tablet, occasionally we have to print something. Gee, right there off the hotel lobby is the business center, which today is often equipped with a nice color laser printer. How convenient! And how dangerous.

How do we get the document from our device to the printer? Most if us would probably think, oh, that’s easy. I’ll just pop it into Google Drive, or One Drive, or Apple Cloud. Then I’ll log in with the browser on the office center machine, print my stuff, and I’m done! I just did this at the hotel I’m staying at in Florida. Logged into the system, running Windows 10, and brought up Google Chrome. I looked at the photo icon on the upper right corner of the browser, and I see a picture of one of my colleagues…he never logged off from using it the day before! It turns out that closing Chrome does not log you out, even though logic says it should. I logged him off, logged in to Google, did my printing from content on Google Drive, and logged off.

Because neither Google nor Microsoft requires two-factor authentication, leaving an account logged in will allow the next system user to change your password. Once that’s done, everything in that account is theirs and not yours. Wow. Scary. Rebooting might fix it, but in normal operation, these systems hardly ever get rebooted.

Once logged off, I clicked the login icon on the upper right corner of the default Google Search screen. This took me to a list of the users that had previously logged into Google using this browser listing their name, their email address, and even their photo if their account had one linked to it. And there I was, as well as my colleague. At the bottom of the screen was a “remove login” selection. Clicking it placed an X next to each user on the list, and clicking the X removed that user from the list. Does it remove it from the system as well, or just from this list? I don’t know, and haven’t yet had time to research it.

I then moved to the machine next to this which I had used the day before. I looked at the list of Google users in Chrome, and there I was! I removed my entry and the other 10 on the screen—one at a time, of course—then I closed Chrome and logged out of the system.

I know it seems like a bit much expecting hotels to control this serious vulnerability on their office center system, but frankly most users will never even be aware of the danger, and if the hotels don’t take positive steps to control this it will never happen. I did some quick research to try to find a Chrome plugin to automatically log users out when the browser is closed, and to prevent the user list from being retained, but if there is such a beast, I didn’t find it. Clearly this is a need, and to be perfectly honest, one that the hotels and anyone else providing public access to Google logins on Chrome should expect to pay for. Free business plan: write it. Then write about it. Frankly, people are crazy not to protect their users like this.

—Ray Trygstad

Spring 2019 ITM Undergraduate Advising Notes are now available

October 16, 2018 author: Comments off

Spring 2019 ITM Undergraduate Advising Notes are now available! Click the link to see them…

The Fall 2018 ITM Student Handbooks are here!

August 15, 2018 author: Comments off