Nanci Hellmich https://cybersecurity.sitemasonry.gmu.edu/ en Mason Engineering cybersecurity expert receives prestigious award for his research https://cybersecurity.sitemasonry.gmu.edu/news/2020-12/mason-engineering-cybersecurity-expert-receives-prestigious-award-his-research <span>Mason Engineering cybersecurity expert receives prestigious award for his research </span> <span><span>Nanci Hellmich</span></span> <span>Wed, 12/02/2020 - 10:28</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="b125ec94-01d6-4cc2-b388-dd1bae591b1d" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/sushil-jajodia.jpg" alt="" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Cybersecurity researcher Sushil Jajodia received the 2020 W. Wallace McDowell Award from the IEEE Computer Science Society.</p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="ff25e6e4-aefb-4ee6-92ba-aeaeef559b27" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Mason Engineering cybersecurity researcher <a href="https://volgenau.gmu.edu/profile/view/8017" target="_blank">Sushil Jajodia</a> received the <a href="https://www.computer.org/volunteering/awards/mcdowell" target="_blank">2020 W. Wallace McDowell Award</a> from the IEEE Computer Science Society for his contributions to the scientific and engineering principles that enable effective adaptive cyber defense.</p> <p>The McDowell Award is given to individuals for outstanding recent theoretical, design, educational, practical, or other similar innovative contribution that falls within the scope of IEEE CS interest.</p> <p>Jajodia, a university professor with the <a href="https://volgenau.gmu.edu/">Volgenau School of Engineering</a> and the founding director of <a href="https://csis.gmu.edu/" target="_blank">Center for Secure Information Systems</a>, researches information secrecy, privacy, integrity, and availability problems in military, civil, and commercial sectors.</p> <p>Today’s cyber defenses are largely static, Jajodia says. As a result, adversaries can systematically probe our networks, pre-plan their attacks, and ultimately persist for long times inside compromised networks and hosts. </p> <p>“In response to this situation, we developed methods that make them less homogeneous and less predictable. Our research combined machine learning, behavioral science, operations research, control theory, and game theory for deciding where, when, and how to employ available options in dynamic, adversarial environments,” he says.</p> <p>“We are all very proud of Dr. Jajodia for his many contributions to the cybersecurity field. It is wonderful to see his efforts so aptly recognized by the IEEE,” says <a href="https://volgenau.gmu.edu/profile/view/262846" target="_blank">Art Pyster</a>, associate dean for research at the Volgenau School of Engineering.</p> <p>In the <a href="https://www.youtube.com/watch?v=OLC9qypyHZU&amp;feature=share" target="_blank">video</a> announcement of the award, the IEEE Computer Society, says, Jajodia “is widely recognized as an international leader and researcher and has a highly distinguished record of technical contributions to security and privacy.”</p> <p>Jajodia will be honored at a ceremony in 2021. A video about the award is available <a href="https://www.youtube.com/watch?v=OLC9qypyHZU&amp;feature=share" target="_blank">here</a>.</p> </div> </div> </div> </div> Wed, 02 Dec 2020 15:28:22 +0000 Nanci Hellmich 301 at https://cybersecurity.sitemasonry.gmu.edu Cybersecurity researchers developing a toolkit to protect open-source software from cyberattacks https://cybersecurity.sitemasonry.gmu.edu/news/2020-11/cybersecurity-researchers-developing-toolkit-protect-open-source-software-cyberattacks <span>Cybersecurity researchers developing a toolkit to protect open-source software from cyberattacks</span> <span><span>Nanci Hellmich</span></span> <span>Mon, 11/16/2020 - 15:00</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="7d530419-7328-4da4-bad2-f8e35e089f86" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/kun-sun unedited.jpg" alt="" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Cybersecurity researcher Kun Sun and his team are creating a toolkit that would identify security patches in updates for open-source software. </p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="e1c087e1-bee8-4303-acc4-635afcd3a36b" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Software frequently needs updates to keep it safe from cyberattacks.</p> <p>But when vendors release patches for open-source software, they may not explicitly notify users if those updates contain important security patches, says <a href="https://ist.gmu.edu/people/detail/kun-sun/" target="_blank">Kun Sun</a>, an associate professor in the <a href="https://ist.gmu.edu/" target="_blank">Department of Information Sciences and Technology</a> (IST) and associate director of the <a href="https://csis.gmu.edu/" target="_blank">Center for Secure Information Systems</a>.</p> <p>They don’t share that information, because they may not want the users to know their software has security problems, which may damage their reputation, he says.</p> <p>But if users delay the software update, it could lead to a cyberattack on the system. “Attackers can use the code changes from the patch or the difference between two versions and launch attacks on unpatched software or old software versions,” he says.</p> <p>Sun and other Mason Engineering cybersecurity researchers are creating a tool that would identify security patches in updates for open-source software. This is especially important for the armed services.</p> <p>“The military uses a lot of open-source software, and they want to know if there are certain security problems that they need to patch immediately,” he says.</p> <p>“We are developing a machine-learning-based defense system and implementing a toolkit to automatically identify secret security patches on open source software,” he says. “We want to tell users which updates contain security patches that they need to fix immediately,” he says.</p> <p>Sun and his colleagues are working on the research with a $699,844 award from the U.S. Army Research Lab.</p> <p>The Mason research team is finishing the first year of the three-year project. Several major defense contractors are interested in the tool, Sun says.</p> <p><a href="https://volgenau.gmu.edu/profile/view/444476" target="_blank">Özlem Uzuner</a>, IST chair, says, “the Mason cybersecurity team is at the forefront of their field, contributing both methods and practical applications that have wide applicability, for the military and beyond.”</p> </div> </div> </div> </div> Mon, 16 Nov 2020 20:00:23 +0000 Nanci Hellmich 306 at https://cybersecurity.sitemasonry.gmu.edu Cybersecurity expert creates app to help voters locate ballot drop boxes https://cybersecurity.sitemasonry.gmu.edu/news/2020-10/cybersecurity-expert-creates-app-help-voters-locate-ballot-drop-boxes <span>Cybersecurity expert creates app to help voters locate ballot drop boxes</span> <span><span>Nanci Hellmich</span></span> <span>Thu, 10/22/2020 - 14:15</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="01acad3e-3cdd-4100-841d-d11f37223df9" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>“I worked on this project in my spare time. It was the perfect opportunity to combine my passion for programming with my desire to use information technology for social good.”</p> <p>— Max Albanese, associate professor in the Department of Information Sciences and Technology</p> </blockquote> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="5d69c6bd-6aa4-461f-be5b-5260e8bcbfd4" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/Max Albanese app photo edited .jpg" alt="" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Max Albanese, an associate professor in the Department of Information Sciences and Technology, drops off his mail-in ballot. He created an app, MyBallotBox to help voters locate mail-in drop-box locations. It's available from Apple in its app store. </p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="a63aa7b1-2707-4a80-afe1-d4df7849deed" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Mason Engineering cybersecurity researcher <a href="https://volgenau.gmu.edu/profile/view/3894" target="_blank">Massimiliano (Max) Albanese</a> studies the minds and methods of cybercriminals to develop better ways to defend computer systems.</p> <p>But during his free time this summer, he turned his attention to a different problem­­­­—the need for people to know where to locate drop-off boxes for mail-in ballots.</p> <p>“In August, I came up with the idea of creating a free app to help people locate drop-off boxes in their area,” says Albanese, an associate professor in the <a href="https://ist.gmu.edu/" target="_blank">Department of Information Sciences and Technology</a>.</p> <p>“I collected drop-box location data from official sources and developed the app, called <a href="https://apps.apple.com/us/app/myballotbox/id1535522873" target="_blank">myBallotBox</a>, which is available from Apple in its app store,” Albanese says.</p> <p>So far, he has gathered information from 32 states and the District of Columbia, and more data is being added every day. “We are in the middle of a pandemic, and people don’t want to go into a polling place to vote,” he says.</p> <p>Plus, some people don’t trust the post office to deliver the ballots in time to be counted, so they would like to drop them off at a secure location instead, he says. “It was this set of unprecedented circumstances that prompted me to take this initiative.</p> <p>The data is also available through a web interface that voters can access through this <a href="https://myballotbox.app/" target="_blank">link</a>. Users can find detailed information about ballot drop-off locations by simply selecting their state from a drop-down menu and then clicking on markers on the map.</p> <p>“I worked on this project in my spare time,” he says. “It was the perfect opportunity to combine my passion for programming with my desire to use information technology for social good.”</p> </div> </div> </div> </div> Thu, 22 Oct 2020 18:15:57 +0000 Nanci Hellmich 341 at https://cybersecurity.sitemasonry.gmu.edu Graduate students will solve theoretical cyber crisis at competition https://cybersecurity.sitemasonry.gmu.edu/news/2020-02/graduate-students-will-solve-theoretical-cyber-crisis-competition <span>Graduate students will solve theoretical cyber crisis at competition </span> <span><span>Nanci Hellmich</span></span> <span>Wed, 02/19/2020 - 06:06</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="4c4829cb-8ab2-4246-9d57-50a0947b4657" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/Max Albanese edited.jpg" alt="Max Albanese " /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Massimiliano Albanese, an associate professor in the Department of Information Sciences and Technology, says the Cyber 9/12 Strategy Challenge provides students with an incredible learning experience in cybersecurity. </p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="76432e80-53f3-4ce6-802a-f81315ccd953" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Mason Engineering graduate students Munira Alqahtani and Abdulai Gad Swaray have been selected to compete in the Atlantic Council’s <a href="https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/cyber-statecraft-initiative/cyber-912/" target="_blank">2020 Cyber 9/12 Strategy Challenge</a> on March 20-21 in Washington, D.C. </p> <p>Both students, who are pursuing <a href="https://catalog.gmu.edu/colleges-schools/engineering/information-sciences-technology/applied-information-technology-ms/" target="_blank">master’s degrees in applied information technology</a> with cyber security concentrations, are part of the team fielded by the Institute for Information Infrastructure Protection (I3P), a national consortium of leading academic institutions, national laboratories, and non-profit research organizations.</p> <p>The competition challenges students to respond to an international cyber-crisis scenario, analyze the threat it poses, and provide recommendations on the best course of action to mitigate the crisis. Students interact with expert mentors and high-level cyber professionals while developing valuable skills in policy analysis and presentation. </p> <p>“Participating in the Cyber 9/12 Strategy Challenge provides students with an incredible learning experience,” says <a href="https://volgenau.gmu.edu/profile/view/3894" target="_blank">Massimiliano Albanese</a>, an associate professor in the <a href="https://ist.gmu.edu/" target="_blank">Department of Information Sciences and Technology</a> and Mason’s representative in the I3P.</p> <p>“The competition challenges students to be critical thinkers and work collaboratively to solve a complex cyber problem under strict time and resource constraints. Over the last several years, the I3P team has consistently included Mason Engineering students, and in 2018 the I3P team was a semi-finalist," he says. "In today’s increasingly complex cyber world, it is critical for students to participate in similar extracurricular activities and gain hands-on experience that will help them tackle real-world problems."</p> <p>Albanese says he’s grateful to David Balenson from SRI International, who has volunteered to coach the I3P team.</p> </div> </div> </div> </div> Wed, 19 Feb 2020 11:06:37 +0000 Nanci Hellmich 336 at https://cybersecurity.sitemasonry.gmu.edu Hackathon participants solve real-world problems for real money https://cybersecurity.sitemasonry.gmu.edu/news/2019-10/hackathon-participants-solve-real-world-problems-real-money <span>Hackathon participants solve real-world problems for real money</span> <span><span>Nanci Hellmich</span></span> <span>Thu, 10/24/2019 - 17:04</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="0c307491-2c6e-49af-af29-37d154d111be" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/PatrioHacks Photo 2 edited_0.jpg" alt="" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>At Mason's PatriotHacks, about 300 students tackled problems in cybersecurity, machine learning, artificial intelligence, data science, sustainability, and automation. </p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="3d8e7c0c-5e28-4eb0-95f1-6d01a7a23b70" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>It’s not often that college students have a chance to solve cybersecurity challenges, delve into data mining, and take a salsa dancing lesson over the same weekend.</p> <p>But those who attended PatriotHacks, Mason’s second annual collegiate hackathon, did just that at the MIX@Fenwick, October 18 to 20.</p> <p>About 300 students from Mason and several other universities tackled problems in machine learning, artificial intelligence, data science, sustainability, automation, and cybersecurity during the 36-hour event.</p> <p>“I am impressed with all the innovative projects the students came up with,” says <a href="http://delve into data mining," target="_blank">computer engineering</a> senior and <a href="https://honorscollege.gmu.edu/">Honors College</a> student Afnan Ali, co-organizer of PatriotHacks.</p> <p>“The hackathon was about taking a challenge or problem, creating a solution, and hacking it together,” adds the event’s co-organizer Vijay Iyer, a senior majoring in neuroscience. “The hackers are the people who are putting projects together. It’s not about hacking into anything.”</p> <p>The competition culminated with 45 projects for judges to evaluate.</p> <p>Three Mason students who created a plan to improve the university’s Hydroponic Greenhouse won first place. Each member of the team received $350.</p> <p>The students who did the greenhouse project “knocked it out of the park,” Iyer says. “They had solutions to every single thing that Mason’s <a href="https://green.gmu.edu/" target="_blank">Office of Sustainability</a> asked for in the Hydroponic Greenhouse. They had blueprints for it. They made budgets for it. They knew what parts they needed, and they showed how it was completely implementable.”</p> <p> “The hackathon gave students the opportunity to think outside the box, interact with industry experts, and work on real-world problems,” says faculty sponsor <a href="https://volgenau.gmu.edu/profile/view/11764" target="_blank">Kamaljeet Sanghera</a>, associate professor and executive director for STEM Outreach for<a href="https://volgenau.gmu.edu/" target="_blank"> Mason Engineering</a>.</p> <p><a href="https://www.caci.com/" target="_blank">CACI</a> proposed a challenge on cybersecurity pen testing; <a href="https://www.gdit.com/" target="_blank">GDIT</a> on machine learning; the <a href="https://www.costar.com/?gclid=Cj0KCQjwl8XtBRDAARIsAKfwtxAZJeGz09MJrUvg2-MwxHogVB3AZI3viHxex0cqRAU1j0rcKmwJVVAaAvIbEALw_wcB" target="_blank">CoStar Group</a> on data science.</p> <p>Several other organizations offered challenges, including <a href="https://informedxp.com/about/" target="_blank">Informed XP</a>, <a href="https://www.metrostarsystems.com/" target="_blank">MetroStar Systems</a>, <a href="https://www.whiteops.com/" target="_blank">White Ops</a>, and Mason’s <a href="https://green.gmu.edu/" target="_blank">Office of Sustainability</a>.</p> <p>Besides doing projects, students participated in games, salsa dancing, and morning yoga.</p> </div> </div> </div> </div> Thu, 24 Oct 2019 21:04:43 +0000 Nanci Hellmich 346 at https://cybersecurity.sitemasonry.gmu.edu Mason Competitive Cyber club places second in state competition https://cybersecurity.sitemasonry.gmu.edu/news/2019-02/mason-competitive-cyber-club-places-second-state-competition <span>Mason Competitive Cyber club places second in state competition</span> <span><span>Nanci Hellmich</span></span> <span>Tue, 02/26/2019 - 12:43</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="d59b2353-6c43-4a2a-9f3a-f62bee5e60ac" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/CyberAwards edited png file.png" alt="Mason Competitive Cyber club won second place in the Commonwealth Cyber Fusion Competition 2019 last weekend at the Virginia Military Institute in Lexington, Virginia." /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Mason Competitive Cyber club won second place in the Commonwealth Cyber Fusion Competition 2019 last weekend at the Virginia Military Institute in Lexington, Virginia.</p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="b7b92d33-aa1c-4b03-b33d-b4e1361aeaa0" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>“We did a great job in an extremely tight competition. A lot of the challenges we did this year are similar to things we would do in the real world in our respective fields.”</p> <p>— Michael Bailey, Mason Competitive Cyber president </p> </blockquote> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="3b65d48b-a064-41e2-b8d2-1062e1ea8b7d" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The Mason Competitive Cyber club captured second place in the <a href="https://conferences.vmi.edu/cyberfusion/" target="_blank">Commonwealth Cyber Fusion Competition 2019</a> over the weekend. The University of Virginia came in first.</p> <p>George Mason University was one of 17 schools that competed in the invitation-only competition for Virginia community colleges and universities that are National Centers of Academic Excellence in Cyber Security. The event was held at the Virginia Military Institute in Lexington, Virginia.</p> <p>“We did a great job in an extremely tight competition,” says Mason <a href="https://getconnected.gmu.edu/organization/masoncc/" target="_blank">Competitive Cyber</a> president Michael Bailey, a senior majoring in IT.  “A lot of the challenges we did this year are similar to things we would do in the real world in our respective fields.”</p> <p>The intense four-hour competition involved solving a variety of complex cyber challenges designed to model real-world computer security challenges, including hacking into websites, performing reverse engineering on programs, wireless hacking, analyzing network traffic, and deciphering encrypted messages.</p> <p>Other members of Mason’s team included Chris Issing, Zaine Wilson, Ammar Al-Kahfa, Paul Benoit, and Niki Carroll.</p> <p>Mason’s observing student team members Andrew Oliveau and Connor Perkins placed first in their bracket in a parallel challenge.</p> <p>“I am very proud of our Mason competitors,” says head coach <a href="https://volgenau.gmu.edu/profile/view/4783" target="_blank">Peggy Brouse</a>, director of Mason’s bachelor of science in <a href="https://catalog.gmu.edu/colleges-schools/engineering/cyber-security-engineering-bs/" target="_blank">cyber security</a><a href="https://catalog.gmu.edu/colleges-schools/engineering/cyber-security-engineering-bs/" target="_blank"> engineering program</a>.</p> <p>“It is especially rewarding that we had students from several programs within the Volgenau School of Engineering, including computer science, cybersecurity,  and information technology. Thanks to the Mason Competitive Cyber club for being instrumental in preparing students for various cyber competitions. I look forward to next year.”</p> <p>Assistant coach <a href="https://volgenau.gmu.edu/profile/view/8167" target="_blank">Jim Jones</a>, an associate professor in the digital forensics and cyber analysis program in the Electrical and Computer Engineering Department, says of Mason's team: "These students combine deep technical knowledge, tool expertise, creative thinking, and teamwork to solve problems, precisely the skills employers are looking for."</p> <p>The goal of the event, sponsored by the Virginia Cyber Range and Senator Mark R. Warner, is to develop the next generation of cybersecurity professionals in Virginia. Students participated in cyber challenges, learned from industry professionals, networked, and attended a cyber job fair.</p> <p><a href="https://www2.gmu.edu/data-security" target="_blank">Mason Engineering</a> has 17 cyber-degree <a href="http://https://catalog.gmu.edu/search/?scontext=programs&amp;search=cyber" target="_blank">programs</a>, including a first-of-its-kind bachelor of science in cyber security engineering, multiple master’s degrees in cybersecurity-related fields, graduate certificates in cybersecurity, and an interdisciplinary PhD in information technology with concentrations in information security and assurance as well as digital forensics.</p> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="b1d84770-ba25-4534-ba39-1a6ea71c13f8" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>“I am very proud of our Mason competitors. It is especially rewarding that we had students from several programs within the Volgenau School of Engineering, including computer science, cybersecurity, and information technology. </p> <p>— Coach Peggy Brouse, director of Mason’s bachelor of science in cyber security engineering program.</p> </blockquote> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="5cc32283-14c4-4cde-8c27-71bd8c3156bf" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>"These students combine deep technical knowledge, tool expertise, creative thinking, and teamwork to solve problems, precisely the skills employers are looking for."</p> <p>— Jim Jones, assistant coach and faculty advisor for Mason Competitive Cyber</p> </blockquote> </div> </div> </div> </div> Tue, 26 Feb 2019 17:43:21 +0000 Nanci Hellmich 311 at https://cybersecurity.sitemasonry.gmu.edu Mason Engineering experts will highlight cybersecurity research for their partners https://cybersecurity.sitemasonry.gmu.edu/news/2018-05/mason-engineering-experts-will-highlight-cybersecurity-research-their-partners <span>Mason Engineering experts will highlight cybersecurity research for their partners</span> <span><span>Nanci Hellmich</span></span> <span>Wed, 05/09/2018 - 16:06</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:media_slideshow" data-inline-block-uuid="656b842d-eedf-4848-b7a9-743f060a4ae7" class="block block-layout-builder block-inline-blockmedia-slideshow"> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="d42b0884-cf93-4f8e-a3eb-a704c82a190d" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>Mason Engineering has a robust cybersecurity program that crosses disciplinary engineering boundaries and includes robots, drones, autonomous vehicles, health care, smart cities, and the electrical grid.</p> <p>J. P. Auffret</p> </blockquote> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="13fcf9aa-7008-48eb-a8d0-ec42385b6472" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/Cybersecurity edited.png" alt="Duminda Wijesekera is speaking on cybersecurity at a briefing" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Computer Science professor Duminda Wijesekera is one of the featured speakers at a Mason Engineering cybersecurity briefing Tuesday. (Photo by Creative Services).</p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="654f55e7-da28-411d-ba74-4986e4ae7602" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Mason Engineering cybersecurity experts will give an overview of the school’s recent advances in cyber research at a breakfast Tuesday, May 15.</p> <p>Dean Ken Ball is hosting the briefing for industry and government partners at the Center for the Arts Building on the Fairfax Campus. About 100 leaders in cybersecurity are expected to attend.</p> <p>“Mason Engineering has a robust <a href="https://www2.gmu.edu/data-security">cybersecurity program</a> that crosses disciplinary engineering boundaries and includes robots, drones, autonomous vehicles, health care, smart cities, and the electrical grid,” says J. P. Auffret, associate director of the Center for Assurance Research and Engineering (CARE). “Our research is practice-oriented. The idea is to bring the innovations to industry and government." </p> <p>Liza Wilson Durant, Mason Engineering's associate dean of strategic initiatives and community engagement, says, “Forums, such as the dean's breakfast briefing, provide the opportunity for researchers to bring the latest results of their work directly to innovators in industry and government and engage in direct dialogue with the constituents of our research enterprise.” </p> <p>Speakers include:</p> <ul><li><strong>Angelos Stavrou</strong>, director of CARE, who will discuss distributed defenses/distributed denial of service.</li> <li><strong>Gheorghe Tecuci</strong>, professor of computer science, on evidence-based detection of advanced persistent threats.</li> <li><strong>Duminda Wijesekera</strong>, co-director of CARE and professor of computer science, on the safety of connected vehicular systems.</li> <li><strong>Mark Pullen</strong>, director of the Center of Excellence in Command, Control, Communications, Computing, Intelligence, and Cyber, on coalition military training for cyber-active environments based on C2-simulation interoperation.</li> <li><strong>Jim Jones</strong>, an associate professor in the digital forensics and cyber analysis program in the Electrical and Computer Engineering Department, on the decay and analysis of residual digital artifacts.</li> <li><strong>Bruce Maas</strong>, emeritus CIO, University of Wisconsin-Madison, on research and university CIO/CISO collaborations.</li> <li><strong>J. P. Auffret</strong>, associate director of CARE, on furthering local government cybersecurity capability and governance through cross jurisdiction partnering.</li> </ul><p>The event is by invitation only and aims to give industry and government partners and other guests a chance to meet Mason cyber faculty and hear about some of the school’s research activities.</p> <p> </p> </div> </div> </div> </div> Wed, 09 May 2018 20:06:57 +0000 Nanci Hellmich 416 at https://cybersecurity.sitemasonry.gmu.edu The Mason Competitive Cyber club captures Commonwealth Cyber Cup at state competition https://cybersecurity.sitemasonry.gmu.edu/news/2018-02/mason-competitive-cyber-club-captures-commonwealth-cyber-cup-state-competition <span>The Mason Competitive Cyber club captures Commonwealth Cyber Cup at state competition</span> <span><span>Nanci Hellmich</span></span> <span>Mon, 02/26/2018 - 16:22</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="fe5fb286-1082-4b97-a22a-f6e0de91ace2" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>Some of the challenges seem like the kind of stuff you’d see in movies, but they have real-world applications. </p> <p>Mason Competitive Cyber president Michael Bailey</p> </blockquote> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="9258cd10-7152-492d-a625-95874b3d126d" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/Cyber club png file.png" alt="Mason's Competitive Cyber wins state competition" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Mason was one of 13 schools that competed in the invitation-only Cyber Fusion Competition. </p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="0f930b44-ee05-44c0-a66d-9c27bfee8558" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The Mason Competitive Cyber club won the 2018 Commonwealth Cyber Cup at a prestigious state competition last weekend.</p> <p>Mason was one of 13 schools that competed in the invitation-only Cyber Fusion Competition for Virginia community colleges and universities that are National Centers of Academic Excellence in Cyber Security. The event was held at the Virginia Military Institute in Lexington, Virginia.</p> <p>The intense four-hour competition involved solving a variety of complex cyber challenges including hacking into websites, performing reverse engineering on programs, analyzing network traffic, and deciphering encrypted messages.</p> <p>“Some of the challenges seem like the kind of stuff you’d see in movies, but they have real-world applications,” says Mason Competitive Cyber president Michael Bailey, a junior majoring in IT. Other members on the competition team were Ammar Al-Kahfah, Paul Benoit, Chuck Tran, Chris Issing, and Christopher Roberts.</p> <p>It’s very rewarding when your group solves a complex problem, and you get points on the scoreboard, Bailey says. Mason Competitive Cyber was the only club that solved some of the problems.</p> <p>The team went into the competition optimistic because Mason placed fourth last year. “This year we were much more deliberate about everything,” Bailey says.</p> <p>Mason’s observing student group placed second in a parallel challenge. Those competing members were Doreen Joseph, Natalie Parke, Kang Xu, and Steve Zamory.</p> <p>“We went into this to have fun, meet new people, and work as a team,” says head coach Peggy Brouse, director of the bachelor of science in cyber security engineering program at Mason. “I admit, though, that it was gratifying to win the competition.  I am incredibly proud of all the Mason participants.”</p> <p>She was impressed by the comradery and composure of all the teams. “It was a pleasure to meet people from all across the Commonwealth.”</p> <p>Assistant coach Jim Jones, an associate professor in the digital forensics and cyber analysis program in the Electrical and Computer Engineering Department, says of Mason's team: "The students are self-driven. They teach themselves. They teach each other. They compete frequently. They use their wits, skills, and knowledge to solve problems they’ve never seen before.”</p> <p>The goal of the event, co-hosted by Senator Mark R. Warner and Governor Ralph Northam, is to develop the next generation of cybersecurity professionals in Virginia. Students participated in cyber challenges, learned from industry professionals, networked, and attended a cyber job fair.</p> <p>Mason Engineering has 17 cyber-degree programs, including a first-of its-kind bachelor of science in cyber security engineering, multiple master’s degrees and graduate certificates in cyber security, and an interdisciplinary PhD in information technology with concentrations in information security and assurance as well as digital forensics.</p> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="d5e9212f-9ab2-4048-b6c1-b49a9a1ba0cc" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>We went into this to have fun, meet new people, and work as a team. I admit, though, that it was gratifying to win the competition. I am incredibly proud of all the Mason participants.</p> <p>Head coach Peggy Brouse</p> </blockquote> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="a1d968fe-7320-4f53-a6ec-625faef5de24" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/Mason Engineering students working togther at Cyber Fusion edited (1).png" alt="" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Mason Competitive Cyber club members participated in the intense four-hour competition, solving a variety of complex cyber challenges. Pictured here from left: Chris Issing, Chuck Tran, Christopher Roberts, Michael Bailey (center), Ammar Al-Kahfah, Paul Benoit.</p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="742b2695-8779-4cee-8220-09662af83f02" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote><p>The students are self-driven. They teach themselves. They teach each other. They compete frequently. They use their wits, skills, and knowledge to solve problems they’ve never seen before.</p> <p>Assistant coach Jim Jones </p> </blockquote> </div> </div> </div> </div> Mon, 26 Feb 2018 21:22:08 +0000 Nanci Hellmich 316 at https://cybersecurity.sitemasonry.gmu.edu