BMMS CYBER PATRIOTS 2016-17 5/4/2016. CyberPatriot National Cyber Defense Competition What do following have in common? TargetConnected CarsAdobe Sony.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Cyber Security and the Global Business Environment Jeremy Schaar:)
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
U.S. Department of Labor Assistant Secretary William E. Spriggs Office of Policy July 25, NAACP Convention: Labor Workshop Labor Market Outlook.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Welcome to EECS 354 Network Penetration and Security.
“FY 2016 County Administrator’s Budget Recommendation March 23, 2015”
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
By: Chris Kerlin July 6, 2012 MAA 587.  Three parts  Sports Hall Improvement  Lower Gym Expansion  Swimming Pool Development.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
7 TH GRADE SPRING CONFERENCES 2015 How is it going? Registration Assessment Scores Scantron Readiness Rubric Supporting your Child Targeted Services and.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
Investment Challenge The Stock Market Game™ Program.
Payment Methods There are many ways to pay for goods and services.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
14-1 CHAPTER 14 McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. Cost Analysis for Planning.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Role of Montana State Fund. Montana State Fund is committed to the health and economic prosperity of Montana through superior service, leadership and.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
MATHEWS-DICKEY BOYS’ & GIRLS’ CLUB PRESENTED BY GROUP D.
CyberPatriot Workshop New Coach Training. Intros - name, school, job title + why interested in CP. Also, any other contests? CyberPatriot Overview - who,
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Security Mindset Lesson Introduction Why is cyber security important?
Protecting Yourself from Fraud including Identity Theft Advanced Level.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Citrix Academic Network
Protecting Your Assets By Preventing Identity Theft
Author of Plan Teacher Date
Cybersecurity as a Business Differentiator
CyberPatriots 2016 Student Handbook.
Author of Plan Teacher Date
Team 1 – Incident Response
2016 AFA CyberCamp Sign up now!
Spring Kickoff GB Meeting
Introduction to a Security Intelligence Maturity Model
Data Compromises: A Tax Practitioners “Nightmare”
Andy Hall – Cyber & Tech INSURANCE Specialist
SMB practice development: Security play
SMB practice development: Security play
Protecting Yourself from Fraud including Identity Theft
Card Data Fraud.
Bethesda Cybersecurity Club
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM
Protecting Yourself from Fraud including Identity Theft
Data Breach of United States Office of Personnel Management
Cybersecurity Simplified: Phishing
Data Breach of United States Office of Personnel Management
Presentation transcript:

BMMS CYBER PATRIOTS /4/2016

CyberPatriot National Cyber Defense Competition What do following have in common? TargetConnected CarsAdobe Sony EntertainmentRSAApple Sony PicturesIRSJ. P. Morgan TSA Baggage ScannersWireless routersAnthem Lockheed MartinNasaUS Office of personnel Management Iranian Nuclear CentrifugesTSA Baggage scannersBoeing aircraft

Headlines Target to pay $10 million to victims of data breach Intuit halts all State tax e-filings on fraud concerns Hack of second-largest health insurer affects 80 million customers – compromised information includes names, date of births, addresses, member IDs, phone numbers, addresses, employment information and social security numbers

Headlines Co-chair of Sony Picture Entertainment and chair of Sony’s motion pictures group will step down US declares cybercrime a “National Emergency” Government Accountability Office warns that FAA may be failing to address cyber security vulnerabilities

Government Responses $19 billion for cybersecurity as part of the President’s FY 2017 budget Establish the “Commission of Enhancing National Cybersecurity” New position – Federal Chief Information Security Officer

Current Trends 80% companies fail Payment Card Industry standards Attackers lurk for average of 229 days before being detected Number of successful attacks increased by 15% in 2014 Organizations experienced multiple successful attacks US loses $500 billion each year to theft of trade secrets The breaches of Target, Sony and JP Morgan wasn’t an anomaly

Cybercrime is main stream (and to stay) “Crimeware” kits sold on black market come with tech support “Carding” forums come with customer service “Cybersecurity is one of the most serious economic and national security challenges we face” – Under Secretary of Defense Members of Congress believe we might experience 9/11 magnitude cyber security disaster

Evolution of threats Credit: SourceFire

Sources of threats

Attacks DNS poisoning Denial of service Exfiltration Network threat activity Zero day vectors based (not just phishing)

What is at stake? National security Utilities Financial systems Broad range (almost everyone)

Expand cyber education Comprehensive National Cybersecurity Initiative #8 There are not enough cybersecurity experts We must develop technologically-skilled and cyber-savvy workforce and an effective pipeline of future employees Average annual salaries Information Technology Specialist (without Cybersecurity) : $43,000 Cyber Security Professional (with Cybersecurity): $116,000

BMMS CyberPatriot Team

Training starts in May Weekly meetings – 2 hours (Time TBD) 2-3 hours homework each week Independent research Meet at BMMS during school days June through October: Training and Practice round November/December: Qualification rounds January: Advancement to semifinals February: Semifinals April: National Finals in Baltimore, MD  Seven hours on Friday night or Saturday during competitions BMMS CYBERPATRIOT TEAM

WHAT ARE WE GOING TO LEARN? Cyber Ethics Online Safety Computer Basics and Virtual Machines Principles of Cybersecurity ​ Microsoft Windows Security (From Windows XP – Windows 10) Linux and Ubuntu Security Network Security

WHAT DOES THE TRAINING SESSION LOOK LIKE? Everyone is a contributor. Not only coach teaching, everyone is a teacher too. Show and tell (You learn at home, and show what you learned and tell others) Hands on practice and test.

REQUIREMENTS For anyone going into 6 th, 7 th or 8 th grade $80 requested donation for BMMS Administrator Access to Laptop running Windows (OS X is not free to run virtual machines) Google Account Used for permission to access Google docs. 2 hours of class a week, 2-3 hours of at home studying a week Seven hours on Friday night or Saturday during competitions Need to sign team agreement

HARDWARE REQUIREMENTS: Minimum Laptop Specifications: Intel Core i3 or similar CPU 4 GB or more of RAM 30+ GB of disk space XGA (1024x768) or higher display Windows XP or later Recommended Laptop Specifications: Quad Core Intel Core i5 or i7 8 GB or more of RAM 128+GB of SSD + HDD or 256+GB SSD XGA (1024x768) or higher display Windows 7 or later Final Laptop Recommendations will be provided once you make it on team.

VOLUNTEERS Coach Team Treasurer Team photographer Volunteers Signup at tonight! Coach meeting on Thursday (5/5) 6:30pm – 7:30pm or Saturday (5/7 ) afternoon.  Meeting location for Summer and competition round? (Good WIFI connection, and safe for students to study. )

CYBERPATRIOT TEAM SIGN UP Registration details will be posted on By Monday 5/9. By Monday 5/9 Team Signup (time sensitive, first come first serve) Monday, May 16th 6pm Questions can be ed to

QUESTIONS???