Cybersecurity Awareness Month / en Mason Competitive Cyber welcomes everyone — no experience needed /news/2023-09/mason-competitive-cyber-welcomes-everyone-no-experience-needed <span>Mason Competitive Cyber welcomes everyone — no experience needed</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 09/28/2023 - 18:43</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="4227b3e8-7067-49df-8413-179d561e61c0"> <div class="cta"> <a class="cta__link" href="https://competitivecyber.club/"> <h4 class="cta__title">Learn About Mason Competitive Cyber <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span><span><span>Students choose ӽ紫ý for a variety of reasons. Computer science sophomore Jax Dunfee came to Mason because of its strong competitive cyber club. Dunfee’s interest in competitive cyber began in high school and has continued into his college years. “When I was looking for colleges, I saw that Mason had a competitive cyber team. So, I investigated it, thought it was cool, looked into it more, and joined when I got here. I've always been into cybersecurity and competitive cyber is a great way to improve my skills.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>The <a href="https://competitivecyber.club/" title="Mason Competitive cyber">Mason Competitive Cybe</a><a href="https://competitivecyber.club/" title="Mason Competitive Cyber">r</a> (MCC) club is open to all and though it mostly comprises students in technical majors, the club welcomes everyone. The group meets twice weekly—virtually on Wednesdays and in person on Fridays. The Friday meeting sometimes includes presentations or talks from industry sponsors or professionals.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>The club also competes in person at events sponsored by other universities like Virginia Military Institute and Virginia Tech. In September, MCC hosted its own international Capture the Flag (CTF) event that attracted more than 3,000 participants and over 1,600 teams. If you’re looking for the heart and soul of MCC, you’ll find it at CTFs. They’re also one of the best ways to learn about hacking and cybersecurity.</span></span></span></span></span></span></span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2023-10/Feature%20image%20Mason%20Competitive%20Cyber_0.jpg" width="300" height="225" alt="students at a table during cybersecurity competition" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Jax Dunfee, in center with teammates Biplav Gautam left, Dylan Knoff on right</figcaption></figure><p><span><span><span><span><span><span><span>“The events are how we put theory in practice,” said Dunfee. “In classes, a lot of times you learn programming that builds a baseline for what you'll be doing in the industry, but frequently you don't have a lot of time to do that--put that theory into practice. But with CTF you get hands-on activities with your teammates and others.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Dunfee describes CTF as a variety of challenges that can range from web app exploitation, binary exploitation, cryptography, or reverse engineering forensics. Teams receive a challenge and a description, that they must solve and then get a flag, and the flags are redeemed for points. The team with the most points wins.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Students who are interested in learning more about MCC can check out the website or attend one of the meetings. “We’re always looking for members,” said Dunfee. No experience necessary.</span></span></span></span></span></span></span></p> <figure class="quote">"The Mason Competitive Cyber Club has been competing in CTFs, and winning, since they formed in 2016. The club leadership and members do an excellent job learning from each other and teaching skills to new members, so as older students graduate and new students roll in, they just keep getting better and have a great time doing it. Club alumni are getting excellent jobs in the cybersecurity world, and they regularly give back to the organization by visiting, talking to members, and hiring our graduates." Jim Jones, Director, Criminal Investigations and Network Analysis Center and MCC faculty advisor</figure></div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/4066" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Thu, 28 Sep 2023 22:43:30 +0000 Martha Bushong 108841 at Commonwealth Cyber Initiative CATAPULT fund launches translational research projects /news/2022-10/commonwealth-cyber-initiative-catapult-fund-launches-translational-research-projects <span>Commonwealth Cyber Initiative CATAPULT fund launches translational research projects</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 10/06/2022 - 14:18</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="90e15bd6-772b-4e20-ba74-f53e2bac4044"> <div class="cta"> <a class="cta__link" href="https://cyberinitiative.org"> <h4 class="cta__title">Learn About the CCI <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span>As researchers and their teams work to answer questions and find solutions for protecting privacy and securing information through cybersecurity innovation, many set their sights on commercialization. Still, the path from research ideas to consumer products can be long and winding. To help straighten the path the Commonwealth Cyber Initiative (CCI) is supporting a Cyber Acceleration, Translation, and Advanced Prototyping for University Linked Technology (CATAPULT) Fund. The fund’s purpose‑‑advance collaborative translational research projects among CCI partners, to speed up the progress of academic research outcomes to the marketplace. </span></span></span></span></p> <p><span><span><span>"It is truly exciting to tap into the breadth of innovation from academic institutions across the Commonwealth and introduce these faculty inventors to the opportunity to expand the impact of their research through commercialization,” says Liza Wilson Durant, associate dean, strategic initiatives and community engagement, College of Engineering and Computing. “It is just the right time for Virginia to support and accelerate cybersecurity innovation as the Commonwealth establishes its role as a magnet for new companies with the best and brightest solutions to the nation's greatest cybersecurity challenges."</span></span></span></p> <p><span><span><span><span>In July 2022 CCI awarded seven teams from four universities in the Northern Virginia Node funding for their projects. These research teams received up to $50,000, with funding increments released based on the achievement of agreed-upon milestones. The teams and their projects are as follows.</span></span></span></span></p> <p><span><span><strong><span><span>Protecting Smartphones from Fingerphoto Spoofing</span></span></strong></span></span><br /><span><span><span><span><a href="https://gmu.edu" title="Mason">ӽ紫ý</a> Assistant Professor <a href="https://volgenau.gmu.edu/profiles/emarasco" title="Marusco profile">Emanuela Marasco’s</a> </span></span><span><span>the project addresses the urgent need for a mechanism that properly secures smartphone technology. Contactless fingerprint authentication allows faster capture times, unattended operations, and high hygiene. These systems, however, are still in the early stages of development. Although researchers are advancing matching, the risk of spoofing for contactless authentication must be mitigated as well. This project addresses the problem.</span></span></span></span></p> <p><strong>Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing  </strong><br /><span><span><span><span>As the number of Internet of Things (IoT) devices has increased rapidly, IoT botnets and information stealer attacks have exploited the vulnerabilities of IoT devices. It is still challenging, however, to detect the initial intrusion on IoT devices before massive attacks. Professor Gang Zhou,</span></span><span><span> from the College of William & Mary, </span></span><span><span>and his partners at Old Dominion University are addressing the challenge of the lack of accurate models in real-time for ubiquitous attack detection with their project.</span></span></span></span></p> <p><strong>Algorithm Evaluation for Backdoor Detection and Mitigation in Remote Sensing Systems</strong><br /><span><span><span><span>Artificial Intelligence (AI) technology has advanced to the point that it is inescapable in life and work. AI models extract knowledge from data to make decisions. Though AI has achieved state-of-the-art performances for many applications, it can be easily deceived by the backdoor attack.<strong> </strong><a href="https://odu.edu" title="Old Dominion University">Old Dominion University</a></span></span><span><span><strong> </strong>Professor<a href="https://www.odu.edu/directory/people/j/jli" title="Jang Li"> Jiang Li</a> </span></span><span><span>and his partners at <a href="https://maxar.com" title="Maxar">Maxar’s</a> </span></span><span><span>project leverages a novel approach to addressing this concern.</span></span></span></span><br />  </p> <p><span><span><strong><span><span>RF Fingerprinting Techniques for Millimeter-Wave Device Authentication in 5G/NextG Wireless Communication</span></span></strong><br /><span><span>Millimeter-wave (mmWave) technology is a key enabler for 5G and NextG wireless communications as it supports applications that require high-throughput and ultra-low latency. Due to the broadcast nature of the wireless medium, however, mmWave communication is vulnerable to various attacks. With this project <a href="https://volgenau.gmu.edu/profiles/kzeng2" title="Kai Zang">Kai Zeng,</a> </span></span><span><span>associate professor, ӽ紫ý</span></span><span><span> and his team aim to develop robust and efficient techniques to address these vulnerabilities.</span></span></span></span></p> <p><strong>Extended Reality Empowered 5G Telemedicine Mentoring</strong> <br /><span><span><span><span>Old Dominion University</span></span><span><span> Associate Professor <a href="https://ww2.odu.edu/~sshetty" title="Shetty">Sachin Shetty</a>’s</span></span><span><span> project looks at the development and commercialization of a 5G telemedicine platform that leverages Extended Reality technologies and a 5G environment. Because 5G technology supports massive capacity connections and fast data rates it has the potential to transform healthcare training and service delivery. One example, 5 G-enabled telemedicine, connects remotely located medical providers and allows access to near real-time data, and permits split-second decision-making critical in health care environments.</span></span></span></span></p> <p><span><span><span><span><strong>Super Timelines</strong><br /> When a cybersecurity incident occurs, analysts need to quickly construct a forensic timeline of events to assess the impact and plan the response. This effort typically involves extracting logs and other artifacts from various sources and then combining them into a single list, ordering them by date and time. Only then can an analyst look for clues to help better understand the course of events before, during, and after the incident. With Super Timelines, Florian Buchholz, </span></span><span><span>professor at <a href="https://jmu.edu" title="James Madison University">James Madison University</a>,</span></span><span><span> and his partners at Gigasheet (https://www.gigasheet.com) will develop a turnkey solution for this problem, based on a modern cloud-based infrastructure.</span></span></span></span></p> <p><span><span><span><span>“Without this funding from CCI, the research and start-ups that are so critical to Virginia’s strategy of building a high-impact cyber economy would not have the opportunity to meet the wonderful members of the tech community who have rallied around them to provide advice, guidance, and structure to launching new products and companies,” says Associate Vice President of the Office of Research Innovation and Economic Development, at ӽ紫ý, Paula Sorrell.</span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Thu, 06 Oct 2022 18:18:33 +0000 Martha Bushong 99511 at Drawing a diverse cybersecurity applicant pool /news/2022-10/drawing-diverse-cybersecurity-applicant-pool <span>Drawing a diverse cybersecurity applicant pool</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 10/06/2022 - 08:54</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span>If you’re developing a program or event and want to learn how to attract a diverse audience, take a lesson from a recent </span></span><a href="https://cyberinitiative.org/" title="Commonwealth Cyber Initiative"><span><span><span>Commonwealth Cyber Initiative (CCI) </span></span></span></a><span><span>success story. </span></span></span></span></span><span><span><span><span><span>This spring, the <a href="https://www.cci-novanode.org/" title="CCI Novanode">CCI Northern Virginia Node </a>sponsored a traineeship and apprenticeship program that attracted about 400 diverse applicants for 21 positions. </span></span></span></span></span></p> <p><span><span><span><span><span><span>On October 27 at 11 a.m. CCI</span></span></span><span><span> NoVa Node Program Manager Jordan Mason will describe his successful outreach strategy, and provide a possible blueprint for you to follow, </span></span><span><span>CCI’s Inclusion & Diversity Committee is sponsoring the event as part of its mission of workforce development which includes a commitment to increasing the number of underrepresented groups in the cybersecurity field. </span></span></span></span></span></p> <p><span><span><span><span><span>Mason’s discussion will focus on strategies that the NoVa Node uses to field diverse cohorts in its programs, with a focus on its Cybersecurity Traineeship and Apprenticeship Program. These topics will include the identification of an ideal threshold in program representation and building relationships.</span></span></span></span></span></p> <p><span><span><span><span><span>About Jordan Mason</span></span></span></span></span><br /><span><span><span><span><span>Mason is a <a href="https://www.pmi.org/certifications/project-management-pmp">certified Project Management Professional</a> who cares deeply about building systems and processes that promote equity and accessibility. Before working in his current role, he spent six years working in Student Affairs at George Washington University, helping the university’s portfolio of student organizations navigate institutional financial policies and processes.</span></span></span></span></span></p> <p><a href="https://www.eventbrite.com/e/drawing-a-diverse-applicant-pool-to-your-cyber-program-tickets-428730904677" title="Register here"><span><span><span><span><span>Register for the webinar here. </span></span></span></span></span></a></p> <div class="align-center"> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2022-10/DEI%20graphic%2010.27%20website.png" width="1280" height="720" loading="lazy" typeof="foaf:Image" /></div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/12556" hreflang="en">Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> </div> </div> </div> </div> </div> Thu, 06 Oct 2022 12:54:47 +0000 Martha Bushong 99476 at Cyber security engineering major competes at Deloitte CCI Cyber Camp /news/2021-10/cyber-security-engineering-major-competes-deloitte-cci-cyber-camp <span>Cyber security engineering major competes at Deloitte CCI Cyber Camp</span> <span><span lang="" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Anonymous (not verified)</span></span> <span>Tue, 10/05/2021 - 08:35</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Sophomore <a href="https://cybersecurity.gmu.edu/">cyber security engineering</a> major Samantha Barry takes every chance she can get to expand and hone her cyber security and computer science skills.     </p> <p>So when she heard about Deloitte’s partnership with the <a href="https://cyberinitiative.org/" target="_blank">Commonwealth Cyber Initiative</a> (CCI) for the Deloitte CCI Cyber Camp, she jumped at the chance to compete, and she won third place for her efforts.   </p> <p>The Cyber Camp spanned across three Saturdays in July and August. “I heard about it from Professor Peggy Brouse,” says Barry. “I figured it would be a good opportunity to learn about different fields in cyber security over the summer.”   </p> <p>Participants worked on 42 challenges that taught and tested skills in cyber analytics, network traffic analysis, reverse engineering, and cryptography. They also participated in resume workshops and mock interviews.   </p> <p>“The professional development workshops were very valuable and gave me a leg up before I start applying to internships,” says Barry.   </p> <p>Barry’s favorite part of the entire camp was the cryptography challenges. CCI set up the challenges in a capture-the-flag format, and for the cryptography ones, students had to decipher codes at different levels of difficulty.   </p> <p>Barry finds cryptography interesting because of its ability to help people. Ever since she found an interest in programming and cyber security, she’s always wanted to use her skills to work in criminal justice. “Working for the FBI is my dream job, one that I hope I can achieve after Mason,” she says.   </p> <p>The other challenges in networking and cyber analytics were more challenging to Barry since she hadn’t been exposed to them as much. But she credits the Cyber Camp for showing her different possibilities in cyber security.     </p> <p>Fellow participants were from schools across the Commonwealth of Virginia like Northern Virginia Community college, Old Dominion University, Virginia Commonwealth University, Virginia Tech, and more.     </p> <p>The first and second place winners were both seniors; Jason Jabbour from the University of Virginia received first place, and Christian Jackson from Old Dominion University won second place.     </p> <p>“It was an honor to place in the Cyber Camp. There were a lot of great competitors,” says Barry. She says she is also interested in possibly participating again in the Cyber Camp.   </p> <p><a href="https://cyberinitiative.org/" target="_blank">The Commonwealth Cyber Initiative</a> works to establish Virginia as a global leader in autonomous systems, security, and data. ӽ紫ý is the leader of the Northern Virginia Node of CCI.  </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> </div> </div> </div> </div> </div> Tue, 05 Oct 2021 12:35:37 +0000 Anonymous 83721 at