Archive

Archive for the ‘Security’ Category

WiCyS Conference Support Applications Now Open

September 1st, 2020 Comments off

WiCyS 2021Happy September 1st or in COVID-19 times… March 185th! We’re pleased to announce that Women in CyberSecurity (WiCyS) has their #WiCyS2021 applications for scholarships, grants, and fellowship awards OPEN! This opportunity is what WiCyS lives for… to pay it forward ❤️
Apply here: www.wicys.org/scholarships-grants-and-fellowship-awards

Post-Quantum Cryptography

September 1st, 2020 Comments off

Quantum computing is expected to change the face of cybersecurity. What is the quantum threat to  public key #cryptography? Over in the CNSP #blogCSNP COO and co-founder Emily Stamm shares the current state of post-quantum cryptography. Read it here: https://lnkd.in/gPWeSVx

Post Quantum Crypto

Nice Conference and Expo: Students Attend Free!

August 10th, 2020 Comments off

The National Initiative for Cybersecurity Education (NICE) Conference and Expo in November 2020 will be virtual and online this year, and registration for students is free! The annual NICE Conference and Expo brings together thought leaders from industry, government, academia, and non-profit organizations to address the community’s cybersecurity education, training, and workforce needs. This year’s conference, hosted by Florida International University and New America will host over 30 presentations, 40 professional exhibitors, and a projected 800+ attendees.

The National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST), is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development. The mission of NICE is to energize and promote a robust network and an ecosystem of cybersecurity education, training, and workforce development. NICE fulfills this mission by coordinating with government, academic, and industry partners to build on existing successful programs, facilitate change and innovation, and bring leadership and vision to increase the number of skilled cybersecurity professionals helping to keep our nation secure.

For more information go to https://www.niceconference.org/.

Categories: Job Skills, Security, Stuff for Students Tags:

Centers for Academic Excellence Virtual Career Fair

August 10th, 2020 Comments off


The 4th annual CAE in Cybersecurity Virtual Career Fair, sponsored by National Cybersecurity Training and Education (NCyTE) Center and the National Science Foundation, is right around the corner! This career fair brings together students and alumni from over 300 institutions across the Nation designated as National Centers of Academic Excellence in Cybersecurity with employers offering internships, temporary, part-time, and full-time employment. This year, the CAE Virtual Career Fair will take place on September 4th, 2020, from 9am to 1pm Pacific Time.
Each year, the number of undergraduate and graduate students and alumni participating in this event continues to grow. Participants come from a variety of disciplines, including cybersecurity, security studies, computer science, engineering, math, physics, policy, and project management. Students from CAEs in Research (CAE-R), Cyber Defense Education (CAE-CDE), and Cyber Operations (CAE-CO) are invited to participate for FREE. The ITM Department, through our Center for Cyber Security and Forensics Education, has been a National Center of Academic Excellence in Cyber Defense Education since 2016.

Students and alumni can submit resumes before the virtual career fair begins to allow employers to view resumes before the career fair. Students will also have the ability to build their profiles within the environment to ensure success. Students can participate in a series of workshops leading up to the CAE Virtual Career Fair to help them build their resume and interview skills.

For more information and to register, please visit www.caecommunity.org.

Categories: Jobs, Security, Stuff for Students Tags:

ITM Professor Thomas Johnson Profiled as IDG Connect Secret CSO

August 10th, 2020 Comments off


ITM Adjunct Industry Professor Thomas “T.J.” Johnson was recently profiled by the I.T. website IDG Connect as “The Secret CSO.” The CISO at Server Central Turing Group, as an ITM faculty member Professor Johnson is a winner of the Jeffrey Kimont Memorial Teaching Award and is a member of the ITM Curriculum Committee and the Center for Cyber Security and Forensics Education Advisory Board. He received his Master of Information Technology and Management in May 2012. Congratulations to T.J. for this recognition of his professional expertise!

Categories: faculty, Security Tags:

New Tool for Cybersecurity Career Planning

August 10th, 2020 Comments off


The Cyber Career Pathways Tool from the U.S. Cybersecurity and Infrastructure Security Agency will help you identify, build, and navigate a potential cyber career pathway by increasing your understanding of the knowledge, skills, and abilities needed to begin, transition, or advance your cyber career. The tool presents a new and interactive way to explore work roles within the NICE Cybersecurity Workforce Framework. It depicts the cyber workforce as five distinct, yet complementary, skill communities. It also highlights core attributes among each of the 52 work roles and offers actionable insights for employers, professionals, and individuals considering a career in cyber. https://niccs.us-cert.gov/workforce-development/cyber-career-pathways.

DoD Cyber Scholarships for 2020-2021

December 5th, 2019 Comments off

The U.S. Department of Defense is offering Cyber Scholarships to U.S. citizens who will be Juniors, Seniors, or graduate students in the fall of 2019. Because we are a National Center of Academic Excellence in Cyber Defense Education, you may be eligible to apply.  This is a one-year scholarship covering full books, tuition, and a $25,000 stipend for undergraduates or a $30,000 stipend for graduate students. The scholarships are renewable but require a new application each year. After graduation, scholarship recipients will work one year of federal service in a cyber security or digital forensics role for each year of scholarship support, or four years of military service. Applicants must be eligible for a security clearance. Applicants are not limited to students in the Department of Information Technology and Management but may also be students in Computer Science, Computer Engineering, Electrical Engineering, and Business, but because of the nature of the application, knowledge of and a clear understanding of cyber security is a necessity. Please read the scholarship details document carefully and completely before filling out the application. An official transcript must accompany your application and should be attached, unopened, to the application. A complete printed and signed physical application must be delivered to the ITM Department office, Perlstein Hall suite 223 no later than 8:30am Monday February 17th so we can evaluate and include your scholarship in our funding request, which is due February 28th. When you submit your physical application, you will be given instructions for uploading a digital copy of your application in PDF format. Multiple files may be submitted as a .zip file but all files must be PDF files.

The application and full details of the scholarship are included below.

If you have read all of the materials and you still have questions, please contact Professor Ray Trygstad at trygstad@iit.edu. Please include “DOD Cyber Scholarship” as the first thing in the subject line of your email.

DoD Cyber Scholarships for 2019-2020

January 25th, 2019 Comments off

The U.S. Department of Defense is offering Cyber Scholarships to U.S. citizens who will be Juniors, Seniors, or graduate students in the fall of 2019 This is a one-year scholarship covering full books, tuition, and a $25,000 stipend for undergraduates or a $30,000 stipend for graduate students. The scholarships are renewable but require a new application each year. After graduation, scholarship recipients will work one year of federal service in a cyber security or digital forensics role for each year of scholarship support, or four years of military service. Applicants must be eligible for a security clearance. Applicants are not limited to students in the Department of Information Technology and Management but may also be students in Computer Science, Computer Engineering, Electrical Engineering, and Business, but because of the nature of the application, knowledge of and a clear understanding of cyber security is a necessity. Please read the scholarship details document carefully and completely before filling out the application. A printed and signed physical application must be delivered to the ITM Department office, Perlstein Hall suite 223 no later than 8:30am Monday February 18th so we can evaluate and include your scholarship in our funding request, which is due February 28th. The application and full details of the scholarship are included below. 

Contact Professor Ray Trygstad for questions: trygstad@iit.edu. Please include “DOD Cyber Scholarship” as the first thing in the subject line of your email.

Hotel business centers can steal your life

December 2nd, 2018 Comments off

Many of us travel regularly for business or pleasure, and even though most of us probably haul along our own computer or tablet, occasionally we have to print something. Gee, right there off the hotel lobby is the business center, which today is often equipped with a nice color laser printer. How convenient! And how dangerous.

How do we get the document from our device to the printer? Most if us would probably think, oh, that’s easy. I’ll just pop it into Google Drive, or One Drive, or Apple Cloud. Then I’ll log in with the browser on the office center machine, print my stuff, and I’m done! I just did this at the hotel I’m staying at in Florida. Logged into the system, running Windows 10, and brought up Google Chrome. I looked at the photo icon on the upper right corner of the browser, and I see a picture of one of my colleagues…he never logged off from using it the day before! It turns out that closing Chrome does not log you out, even though logic says it should. I logged him off, logged in to Google, did my printing from content on Google Drive, and logged off.

Because neither Google nor Microsoft requires two-factor authentication, leaving an account logged in will allow the next system user to change your password. Once that’s done, everything in that account is theirs and not yours. Wow. Scary. Rebooting might fix it, but in normal operation, these systems hardly ever get rebooted.

Once logged off, I clicked the login icon on the upper right corner of the default Google Search screen. This took me to a list of the users that had previously logged into Google using this browser listing their name, their email address, and even their photo if their account had one linked to it. And there I was, as well as my colleague. At the bottom of the screen was a “remove login” selection. Clicking it placed an X next to each user on the list, and clicking the X removed that user from the list. Does it remove it from the system as well, or just from this list? I don’t know, and haven’t yet had time to research it.

I then moved to the machine next to this which I had used the day before. I looked at the list of Google users in Chrome, and there I was! I removed my entry and the other 10 on the screen—one at a time, of course—then I closed Chrome and logged out of the system.

I know it seems like a bit much expecting hotels to control this serious vulnerability on their office center system, but frankly most users will never even be aware of the danger, and if the hotels don’t take positive steps to control this it will never happen. I did some quick research to try to find a Chrome plugin to automatically log users out when the browser is closed, and to prevent the user list from being retained, but if there is such a beast, I didn’t find it. Clearly this is a need, and to be perfectly honest, one that the hotels and anyone else providing public access to Google logins on Chrome should expect to pay for. Free business plan: write it. Then write about it. Frankly, people are crazy not to protect their users like this.

—Ray Trygstad

ITM Department and C2SAFE to host Women in Cyber Security 2018

October 4th, 2017 Comments off

The Department of Information Technology and Management and the Center for Cyber Security and Forensics Education are pleased to announce that we will host the Fifth Annual Women in Cyber Security (WiCyS) Conference. This National Science Foundation funded event will be held March 23 through March 24, 2018 at the Hilton Chicago. It is the mission of WiCyS to bring together women in cybersecurity from academia, research and industry from across the United States. The event is exclusively designed as the forum for speakers and guests to exchange knowledge, experience, networking, and mentoring to raise interest in the field of cybersecurity. We will be seeking volunteers to assist with the conference and to meet arriving delegates at the airports later this fall.

ITM Associate Chair Ray Trygstad will serve as conference co-chair, while Amber Chatellier and Angela Jarka of the ITM Department comprise the conference logistics staff.