 Josh Pauli  Associate Professor of Cyber Security  Dakota State University (Madison, SD)  10 years and counting!

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

E - safety How e-safe are you?.
CSIT IA Programming Misc NA
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
Maine Cyber Security Cluster. WHO WE ARE… University of Southern Maine and the Maine System State and Local Government Business and Industry National.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Network Administration At SUNY Ulster. Why Network Administration?
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Introduction To Air Force ROTC. Overview  AFROTC Program  GMC, Field Training, POC  AS Classes  Leadership Lab  Benefits of AFROTC  Scholarships.
How to Apply for On-Campus Jobs Through MonsterTRAK Career Center.
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
1 Information Management & Systems History, current status, and future of the IM&S program at USC Upstate. Dr. Ron Fulbright Chair, IMS
Careers and Degrees in Computing Stuart Hansen Department of Computer Science UW - Parkside.
Computer Careers Dr. Kip Irvine School of Computing and Information Sciences, Florida International University.
My Occupation Research High School Librarian Monica Sheffo.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
 AAKANKSHA INTERNATIONAL SCHOOL-THE GURUKUL, NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA.
Computer Science Department Sonoma State University.
Technical Challenge Competition 2012 National Society of Black Engineers Region 1 Innovations in Engineering.
Federal Cyber Service Training and Education Initiative CICG Personnel, Training and Education Subgroup Mark Montgomery National Security Council November.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Computer Jobs 2014 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
And 11 © Copyright 2014 by Work Incentive Information Network (WIIN)/ ABIL, permission to copy pro bono will be granted to non-profit entities with appropriate.
Disaster DATA Recovery & Your System School/Network Computers Catherine Agnew CEDu Oconomowoc.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Computer Science and Engineering 1 Future of Cyber Security.
1 Chapter Nine Engineering Your Career. 2 Engineering Careers  Electrical and computer engineers find employment in: 1.Private industry. 2.Government.
Digital Diversity Sponsored by College of Computing Have you considered computing? Presented by Student Names.
LESSON 2: Internet, Computer Ethics and Security
Crossing Disciplinary Boundaries and Forging Collaborations Networking CPATH Projects and Community Resource.
Data Warehousing and Research: Managing the MillionS $ Marti Graham and Vicky Shaffer April 19, 2005.
Enterprise Data Warehousing— Planning for the Long Haul Vicky Shaffer and Marti Graham April 18, 2005.
Center for Cybersecurity Research and Education (CCRE)
Comenius: Education f rom Top to Bottom Mariusz Postol, Ph.D. Eng.
Click on your group to see your activity for today
11 th Grade Graduation Project.  Military  The nature of work depends on type of job you are doing in the military.  Must be both physically, educationally,
Confidentiality, Integrity, Awareness What Does It Mean To You.
Yahoo Help Phone Number Get Instant Help.
Cyber and Information Security Workforce Presented By: Tom Flynn, CEcD Director, Business Development Prince William County Department of Economic Development.
NATIONAL SCIENCE FOUNDATION Earnestine Easter Program Director Division of Graduate Education Directorate for Education and Human Resources.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
How eduGAIN can help education: a real life story Sabita Behari Product Manager TNC14.
Teaching Network Security - Lessons Learned Homeland Defense and Security Education Summit February 27 &28, 2007 Margaret Leary Associate Professor Northern.
City Engineering College (CEC), Bangalore
Cyber and Information Security Workforce
Department of Computer and Information Sciences
Department of the Navy’s (DoN’s) Historically Black Colleges and Universities/ Minority Institutions (HBCU/MI) Cybersecurity/Information Assurance (CS/IA)
Cyber Warfare and Importance of Cyber Awareness
Cyber Security Policy Analysts
Provided by: Anthony C. Smith, Sr. Director/Program Manager
Cyber Defence Intelligence
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Deep Dive into the Blue VCU Infosec Team.
Data Security Team 1.
Webroot Antivirus offers a hassle-free scan option and helps which prevent your important data and system from the virus and malware attack.
Social Engineering No class today! Dr. X.

Recitation 10 Intro Engineering Pro Tips.
Graduating senior in information science and technology
Graduating senior in information science and technology
Recitation 10 Intro Engineering Pro Tips.
DRAFT The Importance of Teaching Computer Science in High School
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Creating an NREN in a Commercial World
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

 Josh Pauli  Associate Professor of Cyber Security  Dakota State University (Madison, SD)  10 years and counting!

 We have 300+ students studying:  Cyber Operations (Cyber Security)  Computer Science

 Largest degree on campus (170 / 1200)  Explosive growth in the last two years (55 in ‘11; 70 in ‘12)  Want the best and brightest regardless of computing history  A great mix of:  Programming  Networking  Operating systems  “hacking”!  Ethics  Critical thinking

 Full ride scholarships + attractive stipend  $35,000-40,000 per year  including $20,000 stipend  Work for Gov’t agencies after graduation  National Security Agency (NSA)  Central Intelligence Agency (CIA)  Space and Naval Warfare Systems Command (SPAWAR)

 NSA wants the most technical cyber experts  DSU was selected as 1 of 4 in the entire nation  Now 8 schools  Only public institution in the nation  Only program with dedicated Cyber Ops program in the nation  Only undergraduate program in the nation

 Best Cyber Operations curriculum in the nation  Cyber Corps scholarships to save over $100,000  Top Secret security clearance before graduation  Work on the top security projects in the world  25 years old:  Undergrad & Graduate degrees in Cyber Operations  Top Secret government security clearance  2-3 years of experience in a Federal agency  Any job you ever want anywhere you want it

1. What’s technical social engineering (TSE)? 2. Timeline of hacking 3. AV is dead! Long live AV! 4. How to prevent TSE attack 5. TSE in penetration testing 6. Q & A

 It’s NOT:  Physical impersonation  Pretext calling  Dumpster diving  Still good stuff; just not what we’re talking about today!

 Relying on people being:  Gullible  Greedy  Dumb  Naïve  And using technology own them! 

 Remote code execution  Administrative rights  Key loggers  >

 Not clicking links  Opening files  Visiting websites  But it only takes 1 person!  This is why we can’t have nice things…

 But it’s not enough  Just one “layer”  Signature-based = always behind  How AV vendors work (simplified)  Why security researchers giggle at this

 And only you!  User Awareness Training  Currently a raging debate in InfoSec  Fear v. education  Punish v. reinforce

 “Check the box” v. “Get after it!”  Timing  Scope  Price  So this is red team?  Who can actually do this?

  Happy to help anyway that I can!