Cyber and Information Security / en International Women’s Day Celebration Today /blog/international-womens-day-celebration-today International Women’s Day Celebration Today <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2022-03-08T15:24:38-05:00" title="Tuesday, March 8, 2022 - 15:24">March 8, 2022</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Capitol%20Tech%20Women%20in%20STEM.jpg" width="640" alt="Capitol Tech Women in STEM" typeof="foaf:Image"> <p><span><span><span>Today, March 8<sup>th</sup>, is the annual observance of International Women’s Day, a day celebrating the significant impact of women to all aspects of our society. In addition to this single day observance, the entire month of March is also dedicated to honoring the influential women who have contributed to the important societal, economic, political, and cultural changes seen throughout history. This year’s themes are: Gender equality today for a sustainable tomorrow and #BreaktheBias. On social media, many are posting photos of themselves with arms crossed, symbolizing an “X”, as in X-chromosome and also “stop” the bias.</span></span></span></p> <p><span><span><span>Taking time to celebrate these contributions is important to the empowerment and encouragement of women to seize opportunities in historically male-dominated fields. Diversity in these fields notably increases creativity and cultural insight, ensuring representation and engagement of all genders, as well as drives the advancement of STEM areas.</span></span></span></p> <p><span><span><span>Over the month of March, Capitol Tech invites you to partake in our retrospective honoring the many amazing women who have contributed to innovations in STEM. The following biographies outline the lives of women who redefined their fields. From programmers, engineers, hackers, and celebrities, click through the links below to learn more about these pioneering women:</span></span></span></p> <p><br> <span><span><span><a href="/blog/amanda-finnerty-director-of-internal-operations-commodore-builders" target="_blank">Amanda Finnerty: Director of Internal Operations for Commodore Builders</a><br> <a href="/blog/danielle-dy-buncio-co-founder-and-ceo-of-viatechnik-construction-technology-firm" target="_blank">Danielle Dy Buncio: Co-founder and CEO of VIATechnik, a Construction Technology Firm</a><br> <a href="/blog/rebecca-clark-operations-executive-skanska-global-construction-firm" target="_blank">Rebecca Clark: Operations Executive for Skanska, a Global Construction Firm</a><br> <a href="/blog/dr-nina-tandon-co-founder-of-first-company-grow-human-bones-reconstruction" target="_blank">Dr. Nina Tandon: Co-Founder of the First Company to Grow Human Bones for Reconstruction</a><br> <a href="/blog/ada-lovelace-mother-of-computer-programming" target="_blank">Ada Lovelace: The Mother of Computer Programming</a><br> <a href="/blog/hedy-lamarr-star-of-silver-screen-and-inventor-of-wwii-changing-communications-device" target="_blank">Hedy Lamarr: Star of the Silver Screen and Inventor of a WWII Changing Communications Device</a><br> <a href="/blog/edith-clarke-trailblazing-leader-women-and-pioneer-computing-and-engineering" target="_blank">Edith Clarke: A Trailblazing Leader for Women and a Pioneer in Computing and Engineering</a><br> <a href="/blog/katherine-johnson-commemoration-of-mathematician-and-computer-scientist-responsible-first-us" target="_blank">Katherine Johnson: In Commemoration of the Mathematician and Computer Scientist Responsible for the first U.S. Moon Landing</a><br> <a href="/blog/ana-sol-gutierrez-i-wouldnt-follow-role-they-attributed-me" target="_blank">Ana Sol Gutierrez: "I wouldn’t follow the role they attributed to me"</a><br> <a href="/blog/kimberly-bryant-accomplished-electrical-engineer-and-founder-of-black-girls-code" target="_blank">Kimberly Bryant: Accomplished Electrical Engineer and Founder of Black Girls Code</a><br> <a href="/blog/sabrina-gonzalez-pasterski-young-woman-dubbed-next-albert-einstein" target="_blank">Sabrina Gonzalez Pasterski: The Young Woman Dubbed the “Next Albert Einstein”</a><br> <a href="/blog/velma-p-scantlebury-md-first-black-female-transplant-surgeon-us" target="_blank">Velma P. Scantlebury, M.D.: the first black female transplant surgeon in the U.S.</a><br> <a href="/blog/mae-jemison-doctor-teacher-founder-of-two-technology-companies-and-first-african-american" target="_blank">Mae Jemison: Doctor, Teacher, Founder of Two Technology Companies, and the First African-American woman in Space</a></span></span></span></p> <p><a href="/blog/girls-need-modems-battle-cry-of-hacktivist-jude-milhon">Judith Milhon: Programmer, Civil Rights Activist, Hacker</a></p> <p><a href="/blog/science-behind-jack-black">Judith Love Cohen: Aerospace Engineer, Feminist, Actor Jack Black’s Mother</a></p> <p>&nbsp;</p> <p><a href="/blog/celebrating-women-stem-during-womens-history-month-2021">To read about past Capitol Tech Women’s Day celebrations, click here</a>.</p> Categories: <a href="/taxonomy/term/39" hreflang="en">Cyber and Information Security</a>, <a href="/blog/category/data-analytics" hreflang="en">Data Analytics</a>, <a href="/taxonomy/term/42" hreflang="en">Engineering Technologies</a>, <a href="/taxonomy/term/38" hreflang="en">Computer Science, Artificial Intelligence and Data Science</a>, <a href="/blog/category/women-in-stem" hreflang="en">Women in STEM</a> <section id="section-34796" class="section background-white"> <div class="super-contained"> </div> </section> Tue, 08 Mar 2022 20:24:38 +0000 emdecker 8451 at High-Performance Computing (HPC): Applications and Trends in Computer Science /blog/high-performance-computing-hpc-applications-and-trends-computer-science High-Performance Computing (HPC): Applications and Trends in Computer Science <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2022-03-07T14:06:44-05:00" title="Monday, March 7, 2022 - 14:06">March 7, 2022</time><br><br> </span> <img loading="lazy" src="/sites/default/files/pexels-panumas-nikhomkhai-1148820-server-HPC-computer.jpg" width="640" alt="Computer Server" typeof="foaf:Image"> <p><span><span><span>High-performance computing (HPC) is a relatively new application being used across many STEM fields of study. From bioinformatics and genetic research, to running artificial intelligence programs and space flight simulations, any instance where huge amounts of data and complex calculations need to be processed at high speeds is where HPC becomes not only useful, but necessary. </span></span></span></p> <p><span><span><span>Typical computers cannot handle the amount of “big data” generated by, say, sequencing the human genome, which can produce several terabytes of complex data. This and other types of research often require the more heavy-duty computing seen with HPC. HPC setups are comprised of a system of servers using supercomputers equipped with powerful processors, graphics cards, and memory. According to IBM, these setups can be one million times more powerful than the fastest personal laptop. With HPC, the ability to correctly process large amounts of data is as important as the ability to do so quickly. But this comes at a price, as some trade-off between speed and processing is believed to be unavoidable. However, a team of computer science research students and professors at Massachusetts Institute of Technology (MIT) are now revisiting this issue and have developed a promising solution to this problem.&nbsp;</span></span></span><span><span><span>Through their joint effort, they have developed a new programming language written specifically for HPC. And it all comes back to zeros and ones.</span></span></span></p> <p><span><span><span>“Everything in our language is aimed at producing either a single number or a tensor,” explains MIT PhD student Amanda Liu. This is by using what they call “a tensor language” or “ATL”. Tensors are <em>n</em>-dimensional arrays, which replace the need to use one-dimensional vector objects and two-dimensional matrices, and allow for more complex dimensions to be computed. And while this language optimization already exists in some form as “TensorFlow” in the well-known R and Python software, MIT Assistant Professor of Electrical Engineering &amp; Computer Science Jonathan Raglan-Kelly states that this language has been seen to cause slowdowns and complicate downstream optimizations, “violating the Cheap Gradients Principle”. According to Cornell University, this principle states that “the computational cost of computing the gradient of a scalar-valued function is nearly the same (often within a factor of 5) as that of simply computing the function itself…[and] is of central importance in optimization.” This is due to the way that programs like TensorFlow compute certain original functions against their gradient solutions. Thus, the need for a more specialized HPC language arose.</span></span></span></p> <p><span><span><span>Liu explains “given that high-performance computing is so resource-intensive, you want to be able to modify, or rewrite, programs into an optimal form in order to speed things up.” This can be accomplished by the added framework toolkit that comes with their ATL language, which shows the ways in which simplified program conversion can be attained. A “proof assistant” is included as well, which expands upon the existing Coq language and helps guarantee that the optimization is correct by performing mathematical proofs.</span></span></span></p> <p><span><span><span>While this language is still a prototype, there are indications that ATL could be the next avenue in HPC optimization, especially when approaching the more complex issue of cybersecurity in the HPC environment. Some emerging studies show promise in using tensor language decompositions in securing data in the cloud or on Amazon Web Services (AWS), but further research needs to be done in this area.</span></span></span></p> <p><span><span><span><span>Want to learn more about our </span><a href="/fields-of-study/computer-science-artificial-intelligence-and-data-science"><span>computer science, artificial intelligence</span></a><span>, and </span><a href="/fields-of-study/cyber-and-information-security"><span>cybersecurity</span></a><span> program offerings? Visit our </span><a href="/degrees-and-programs"><span>website</span></a><span> to learn more about Capitol Tech’s diverse degree programs, or contact&nbsp;</span><a href="https:///C:/Users/emdecker/AppData/Roaming/Microsoft/Word/admissions@captechu.edu"><span>admissions@captechu.edu</span></a><span>.</span></span></span></span></p> <p>&nbsp;</p> <p>&nbsp;</p> <p><span><span><span>References:</span></span></span></p> <p><span><span><span>Bernstein, G., Maria, M., Li, T., MacLaurin, D., and Ragan-Kelly, J. (2020). Di€erentiating A Tensor Language. Arxiv. <a href="https://arxiv.org/pdf/2008.11256.pdf">https://arxiv.org/pdf/2008.11256.pdf</a></span></span></span></p> <p><span><span><span>Cornell University. (2018). Mathematics &gt; Optimization and Control &gt; Provably Correct Automatic Subdifferentiation for Qualified Programs. Arxiv. <a href="https://arxiv.org/abs/1809.08530#:~:text=The%20Cheap%20Gradient%20Principle%20(Griewank,to%20quickly%20obtain%20(high%20dimensional">https://arxiv.org/abs/1809.08530#:~:text=The%20Cheap%20Gradient%20Principle%20(Griewank,to%20quickly%20obtain%20(high%20dimensional</a>)</span></span></span></p> <p><span><span><span>IBM. (2022). What is supercomputing technology? <a href="https://www.ibm.com/topics/supercomputing">https://www.ibm.com/topics/supercomputing</a></span></span></span></p> <p><span><span><span>Nadis, S. (7 Feb, 2022). A new programming language for high-performance computers. MIT News. <a href="https://news.mit.edu/2022/new-programming-language-high-performance-computers-0207">https://news.mit.edu/2022/new-programming-language-high-performance-computers-0207</a></span></span></span></p> <p><span><span><span>Ong, J., et. al. (2021). Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation [Experiments, Analyses &amp; Benchmarks]. Arxiv. <a href="https://arxiv.org/pdf/2101.04194.pdf">https://arxiv.org/pdf/2101.04194.pdf</a></span></span></span></p> Categories: <a href="/taxonomy/term/38" hreflang="en">Computer Science, Artificial Intelligence and Data Science</a>, <a href="/taxonomy/term/39" hreflang="en">Cyber and Information Security</a>, <a href="/blog/category/astronautical-engineering" hreflang="en">Astronautical Engineering</a> <section id="section-34791" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 07 Mar 2022 19:06:44 +0000 emdecker 8446 at A President's Day Celebration of Our STEM Leaders /blog/presidents-day-celebration-of-our-stem-leaders A President's Day Celebration of Our STEM Leaders <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2022-02-21T10:27:09-05:00" title="Monday, February 21, 2022 - 10:27">February 21, 2022</time><br><br> </span> <img loading="lazy" src="/sites/default/files/pexels-matthew-johnson-5851949%20-%20Mt%20Rushmore.jpg" width="640" alt="Mt. Rushmore" typeof="foaf:Image"> <p> It’s President’s Day here in the United States, a time to celebrate the past leaders of this country and all they have done to further develop it. This year, the Capitol Technology blog would like to celebrate by highlighting a few Presidents’ contributions to the fields of science, technology, engineering, and math (STEM).</p> <p> According to reporter Christina P. Hooton of <a href="https://www.fishersci.com/us/en/scientific-products/publications/lab-reporter/2021/issue-1/us-presidents-and-science-a-retrospective.html">Fisher Scientific</a>, there are plenty of presidents who contributed to what is commonly known today as STEM. John Adams, for example, made great medical strides during his presidency. “Perhaps one of his most lasting contributions is signing into law the Act for the Relief of Sick and Disabled Seamen. This… led the way for the present-day Department of Health and Human Services (DHHS), National Institutes of Health (NIH), and other federal health programs.” Franklin Roosevelt spearheaded government-funded research for cancer treatment. “The National Cancer Act of 1937, signed into law by President Roosevelt, led to the creation of the National Cancer Institute (NCI) and was the first time Congress provided funding for a non-communicable disease.” It is because of this act that chemotherapy exists, and that thousands of cancer treatment facilities across America get their funding. </p> <p> One of the biggest leaps in the aerospace and astronomical fields is the moon landing of 1969, made possible by John F. Kennedy. He “set the goal of landing a man on the Moon and returning him safely to Earth by the end of the 1960s. Although his dream wasn’t realized until after his death, President Kennedy’s leadership inspired an array of people — from aerospace engineers to production workers — and set the stage for a number of successful space expeditions.” Just after Kennedy’s time, the push for environmentalism grew, and Richard Nixon signed several laws into place to help with this movement. These laws “include[d] the Clean Water Act, Clean Air Act, National Environmental Policy Act, Endangered Species Act, and the Marine Mammal Protection Act. He also proposed the establishment of the Environmental Protection Agency.” The various Acts and the EPA helped to curb the drastic pollution encroaching the nation, and continue to serve as regulators today.</p> <p>The pursuit for a better environment and the development of medical technology was further expanded by Barack Obama, who created the Brain Research through Advancing Innovative Neurotechnologies (BRAIN). “The Precision Medicine Initiative aims to improve disease treatments by tailoring them to the unique characteristics of each individual’s genes, environment, and lifestyle. To further this work, the All of Us research program seeks to build a diverse health database with the help of one million U.S. citizens.”</p> <p>The modern age of STEM would not be what it is without the effort of past American presidents. This President’s Day, take some time to learn about the countless other contributions our leaders have made, and reflect on what can be done to improve upon their actions.</p> <p>Capitol Tech offers many opportunities in all STEM fields, where you can pursue careers to help pave the way to further science and technological development. To learn more about these programs, visit <a href="/">our website</a> and peruse the various courses and degrees offered. Many courses are available both on campus and online. For more information, contact <a href="mailto:admissions@captechu.edu"> the Capitol Tech Admissions team</a>.</p> Categories: <a href="/taxonomy/term/42" hreflang="en">Engineering Technologies</a>, <a href="/blog/category/astronautical-engineering" hreflang="en">Astronautical Engineering</a>, <a href="/taxonomy/term/39" hreflang="en">Cyber and Information Security</a> <section id="section-34696" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 21 Feb 2022 15:27:09 +0000 emdecker 8381 at Google and Microsoft Investing Billions in Cybersecurity  /blog/google-and-microsoft-investing-billions-cybersecurity Google and Microsoft Investing Billions in Cybersecurity&nbsp; <span><span lang about="/user/67246" typeof="schema:Person" property="schema:name" datatype>amschubert</span></span> <span><time datetime="2021-10-11T08:21:05-04:00" title="Monday, October 11, 2021 - 08:21">October 11, 2021</time><br><br> </span> <img loading="lazy" src="/sites/default/files/invest%20in%20cybersecurity.jpg" width="480" alt="google and microsoft invest in cybersecurity" typeof="foaf:Image"> <p>A quick search on the internet of ransomware trends will return thousands of articles on the increasing number of ransomware attacks and cyberthreats, estimated by <a href="https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/" target="_blank">Cybersecurity Ventures</a> to reach&nbsp;$20 billion in cost of damages this year. It’s no surprise then to hear that two of the largest tech companies are making substantial investments in improving cybersecurity efforts.&nbsp;&nbsp;</p> <p>In a meeting with the Biden Administration in August both Google and Microsoft pledged billions of dollars to further cybersecurity efforts.</p> <p>“Google promised to invest $10 billion over the next five years on bolstering the security of software supply chains and open-source software, while Microsoft announced a $20 billion investment over the same time period (which represents a quadrupling of its prior planned spend),” writes Martin Giles in an&nbsp;<a href="https://www.forbes.com/sites/martingiles/2021/08/26/google-microsoft-to-spend-billions-more-on-cybersecurity/?sh=134b6e1e13e0" target="_blank">article for Forbes</a>.</p> <p>One area of particular interest are supply chain attacks, which target the companies, hardware, and software that are used by tech giants to conduct their day-to-day business. These types of attacks can be especially difficult to detect and prevent.&nbsp;</p> <p>To that effect, “Apple pledged to launch a new program to bolster security at its suppliers—including more than 9,000 businesses in the U.S.—that will include a greater emphasis on security training,” says Giles.</p> <p>The cybersecurity skills gap is a major concern. In their annual report,&nbsp;“<a href="https://www.issa.org/cybersecurity-skills-crisis-continues-for-fifth-year-perpetuated-by-lack-of-business-investment/" target="_blank">The Life and Times of Cybersecurity Professionals 2021</a>,” the Information Systems Security Association (ISSA) and analyst Enterprise Strategy Group&nbsp;(ESG) stated that the cybersecurity skills gap is in its 5th year with little to no improvements shown.&nbsp;</p> <p>“The top ramifications of the skills shortage include an increasing workload for the cybersecurity team (62%), unfilled open job requisitions (38%), and high burnout among staff (38%),” reports ISSA.&nbsp;“Further, 95% of respondents state the cybersecurity skills shortage and its associated impacts have not improved over the past few years and 44% say it has only gotten worse.</p> <p>A number of tech companies are increasing efforts to fill the estimated nearly 500,000 vacant cybersecurity positions. IBM, Microsoft, and Amazon have all made pledges to address these gaps, shares Giles, including:</p> <ul role="list"> <li> <p>“IBM will train 150,000 people in cybersecurity skills over the next three years and will partner with more than 20 historically black colleges and universities to establish leadership centers that will help build a more diverse cybersecurity workforce.&nbsp;</p> </li> <li> <p>Microsoft pledged to expand its partnerships with community colleges and nonprofits for cybersecurity training.&nbsp;</p> </li> <li> <p>Amazon said it will offer to the public for free the same security awareness training that it offers its employees.”&nbsp;</p> </li> </ul> <p>Giles note that it’s important that these efforts extend beyond America. He noted that the Biden Administration is working with the G7 countries to hold nations accountable if they harbor ransomware criminals. The Administration is also working toward updating NATO’s cyberpolicy.</p> <p>Want‌ ‌to‌ ‌learn‌ ‌about‌ ‌cybersecurity?‌ ‌View‌ ‌the‌ ‌full‌ ‌list‌ ‌of‌ ‌bachelor’s,‌ ‌master’s‌ ‌and‌ ‌doctorate‌ ‌degrees‌ ‌in‌ ‌<a href="/fields-of-study/cyber-and-information-security" target="_blank">cyber‌ ‌and‌ ‌information‌ ‌security</a>‌.‌ ‌Many‌ ‌courses‌ ‌are‌ ‌available‌ ‌both‌ ‌on‌ ‌campus‌ ‌and‌ ‌online.‌ ‌To‌ ‌learn‌ ‌more‌ ‌about‌ ‌Capitol‌ ‌Tech’s‌ ‌degree‌ ‌programs,‌ ‌contact‌ ‌‌<a href="mailto:admissions@captechu.edu" target="_blank">admissions@captechu.edu</a>‌. ‌&nbsp; ‌ ‌&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/taxonomy/term/39" hreflang="en">Cyber and Information Security</a> <section id="section-32091" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 11 Oct 2021 12:21:05 +0000 amschubert 7896 at Email Spoofing: What is it, how does it work, and how do we prevent it?  /blog/email-spoofing-what-it-how-does-it-work-and-how-do-we-prevent-it Email Spoofing: What is it, how does it work, and how do we prevent it?&nbsp; <span><span lang about="/user/67246" typeof="schema:Person" property="schema:name" datatype>amschubert</span></span> <span><time datetime="2021-09-27T13:23:20-04:00" title="Monday, September 27, 2021 - 13:23">September 27, 2021</time><br><br> </span> <img loading="lazy" src="/sites/default/files/email%20spoofing.jpg" width="480" alt="email spoofing definition and prevention" typeof="foaf:Image"> <p>Email phishing is not a new concept. Since email became&nbsp;a&nbsp;widely-used&nbsp;method of communication, unscrupulous individuals have been sending emails for fake lotteries, invented inheritances, and fake charitable schemes. Many of these types of scams were easy to identify by looking at the sender. However, as technology has advanced, so have phishing schemes—especially in the form of email spoofing.&nbsp;</p> <p><strong>What is it?&nbsp;</strong></p> <p>Email spoofing occurs when a sender “masks” the sender on an email so that it looks to the recipient like the message has come from someone they know and trust.&nbsp;&nbsp;</p> <p>“When an email is sent, the From address doesn't show which server the email was actually sent from,” reports Hacker News in an&nbsp;<a href="https://thehackernews.com/2021/03/how-to-effectively-prevent-email.html" target="_blank">article on email spoofing</a>.&nbsp;“Instead, it shows the domain that was entered when the address was created so as not to arouse suspicion among recipients.”&nbsp;</p> <p>That results in the recipient receiving an email from AuntJane@domain.com—matching the one that exists in your contacts—that isn’t&nbsp;actually your&nbsp;aunt at all.&nbsp;&nbsp;</p> <p><strong>How does it work?&nbsp;</strong></p> <p>Email spoofing&nbsp;is able to&nbsp;occur because of&nbsp;how emails are handled by client applications and email servers, says Hacker News.&nbsp;</p> <p>“Outbound email servers have no way of knowing if the sender address is legitimate or spoofed,” says the article. “Therefore, email spoofing is possible because the email system used to represent email addresses provides no way for outbound servers to verify the legitimacy of the sender's address.”&nbsp;</p> <p>This means that malicious&nbsp;users can write scripts to reconfigure some email applications to display the address of one user when it is sent by another. Hacker News reports that this level of script use is not an advanced skill, meaning that it can be used by more people even if they don’t have an expansive knowledge of coding.&nbsp;</p> <p><strong>How do we prevent it?&nbsp;</strong></p> <p>The threat of email spoofing, and other forms of phishing attacks, cost individuals and businesses vast amounts of money. And the number of email fraud attacks only continues to increase. Hacker News reported that in 2020, phishing attacks increased 220% during the peak of the global pandemic when compared to the prior year.&nbsp;</p> <p>So&nbsp;what can be done to prevent this form of attack? Hacker News suggests implementing&nbsp;Domain-Based Message Authentication, Reporting, and Conformance&nbsp;(DMARC), an email authentication protocol.&nbsp;</p> <p>“DMARC works with two standard authentication practices - SPF and DKIM - to authenticate outbound messages and provides a way to tell receiving servers how to respond to emails that fail authentication checks,” says Hacker News.&nbsp;</p> <p>This strategy effectively blocks the unauthorized email from reaching the recipient, greatly reducing the number of spoofed messages from being sent successfully.&nbsp;</p> <p>Cybersecurity experts need to stay on top of the latest trends in the industry&nbsp;in order to&nbsp;know how best to prevent them.&nbsp;Capitol Tech offers bachelor’s, master’s and doctorate degrees in&nbsp;<a href="/fields-of-study/cyber-and-information-security" target="_blank">cyber and information security</a>&nbsp;with&nbsp;coursework focused on the latest techniques in fighting&nbsp;cyber attacks.&nbsp;&nbsp;</p> <p>Many courses are available both on campus and online.&nbsp;To learn more about Capitol&nbsp;Tech’s degree programs,&nbsp;contact&nbsp;<a href="mailto:admissions@captechu.edu" target="_blank">admissions@captechu.edu</a>.&nbsp;</p> Categories: <a href="/taxonomy/term/39" hreflang="en">Cyber and Information Security</a>, <a href="/taxonomy/term/38" hreflang="en">Computer Science, Artificial Intelligence and Data Science</a> <section id="section-31971" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 27 Sep 2021 17:23:20 +0000 amschubert 7856 at Malware at the Olympics: cybersecurity pros weigh in /blog/malware-olympics-cybersecurity-pros-weigh Malware at the Olympics: cybersecurity pros weigh in <span><span lang about="/user/33" typeof="schema:Person" property="schema:name" datatype>raherschbach2</span></span> <span><time datetime="2018-02-15T15:58:27-05:00" title="Thursday, February 15, 2018 - 15:58">February 15, 2018</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Malware%20Olympics.jpg" width="640" alt="Malware Olympics" typeof="foaf:Image"> <p>If it wasn’t clear already, the weekend news out of Pyeongchang demonstrates it once more: nothing is immune from cyber attacks.</p> <p><img alt="An image of the Olympic rings" src="/files/Malware.jpg">As the opening ceremony got under way, the official website for the Winter Olympics went offline. WiFi networks in the Olympic stadium and the press center crashed. Attendees found themselves unable to print out tickets or locate event venues. Reporters had difficulty filing their stories.</p> <p>The likely culprit? Sophisticated “wiper” malware that was dropped into the network using stolen credentials. Once in, the malware harvested other logins and passwords, hijacked Windows tools used to scan the system, ran scripts and commands, and hid its tracks by cleaning out system and security logs,</p> <p>“The timing and the nature of the attack suggest that the intent was primarily to embarrass the organizers of the Games,” says Dr. Mary Margaret Chantré, cybersecurity professor at Capitol Technology University. “Unlike many other cyber attacks, this one was not about theft of money or data. Rather, it appears intended to cause disruption and make problems for people during a high-visibility moment at the Olympics.”</p> <p>On Monday (February 12), <a href="http://blog.talosintelligence.com/2018/02/olympic-destroyer.html">researchers from Cisco Talos Intelligence</a> reported that the incident was likely carried out by someone with in-depth knowledge of the Pyeongchang network.</p> <p>Those responsible “knew a lot of technical details of the Olympic Game infrastructure such as username, domain name, server name, and obviously password," wrote the researchers, Warren Mercer and Paul Rascagneres.</p> <p>In addition to creating headaches and a potential public relations fiasco, the attackers may have had another motive, Chantre says. “The attack may also have been a way of demonstrating capabilities – of telling the world 'look what we are able to do. We can get into your networks and take them offline.'"<br> <br> <em>Want to help unmask cyber adversaries and fight attacks such as the Pyeongchang network breach? Consider enrolling in a cybersecurity degree program at Capitol Technology University. Capitol is an DHS and NSA-certified Center of Excellence in cybersecurity education, offering programs at the </em><a href="/degrees-and-programs/bachelors-degrees/cyber-and-information-security-bs"><em>undergraduate</em></a><em>, </em><a href="/degrees-and-programs/masters-degrees/cyber-and-information-security-ms"><em>master’s</em></a><em> and </em><a href="/degrees-and-programs/doctoral-degrees/doctorate-in-cybersecurity"><em>doctoral</em></a><em> levels. For more information, contact the cybersecurity program at </em><a href="cybersat@captechu.edu"><em>cybersat@captechu.edu</em></a></p> Categories: <a href="/taxonomy/term/39" hreflang="en">Cyber and Information Security</a> Thu, 15 Feb 2018 20:58:27 +0000 raherschbach2 254 at Capitol's cybersecurity programs to be showcased at NSA-sponsored event /blog/capitols-cybersecurity-programs-be-showcased-nsa-sponsored-event Capitol's cybersecurity programs to be showcased at NSA-sponsored event <span><span lang about="/user/33" typeof="schema:Person" property="schema:name" datatype>raherschbach2</span></span> <span><time datetime="2017-06-14T14:46:00-04:00" title="Wednesday, June 14, 2017 - 14:46">June 14, 2017</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Cybersecurity.jpg" width="640" alt="Cyber Security Programs" typeof="foaf:Image"> <p>Cybersecurity professionals will gather at the Information Assurance Symposium (IAS) in Baltimore from June 19-21 to exchange knowledge and strategize ways of addressing today's emerging cyber threats. Capitol representatives will be on hand to inform participants about the university's pioneering programs in the field, including master's and doctoral programs that are offered online and tailored to working professionals.</p> <p>"This is a very exciting event for us to be attending," said Xavier A. Richards, director of graduate recruitment. "It's hosted by the NSA and will have cybersecurity leaders, decision-makers and practictioners in attendance. The NSA has also invited international cybersecurity experts to this event, so participants will be engaging a global perspective."</p> <p><img alt src="/files/nsa_logo_0.jpg">During the symposium, Richards and her colleagues will help get the word out about the university's undergraduate and graduate programs in cybersecurity and the career-boosting opportunities that come with a Capitol degree. Capitol offers <a href="/degrees-and-programs/bachelors-degrees/cyber-and-information-security-bs/">bachelor's</a> and <a href="/degrees-and-programs/masters-degrees/cyber-and-information-security-ms/">master's</a> <a href="/degrees-and-programs/masters-degrees/cyber-and-information-security-ms/">degrees</a> in Cyber and Information Security as well as a <a href="/degrees-and-programs/doctoral-degrees/doctorate-in-cybersecurity/">doctorate</a> in cybersecurity. Numerous post-baccaulaureate certificate programs are also available, including in<a href="/degrees-and-programs/certificates/post-baccalaureate-digital-forensics-and-incident-handling/"> Digital Forensics and Incident Handling</a>, <a href="/degrees-and-programs/certificates/post-baccalaureate-certificate-secure-cloud-computing/">Secure Cloud Computing</a>, <a href="/degrees-and-programs/certificates/post-baccalaureate-certificate-secure-mobile-technology">Secure Mobile Technology</a>,<a href="/degrees-and-programs/certificates/post-baccalaureate-certificate-secure-software-development/"> Secure Software Development</a> and <a href="/degrees-and-programs/certificates/post-baccalaureate-certificate-security-management/">Security Management</a>.</p> <p>“One of the really outstanding things about our programs is the quality of our curriculum," Richards said. "It's practical and industry-oriented, with students gaining exposure both to theory and labs. We enable professionals to advance their skill sets and become thought leaders in their fields, addressing some of the most pressing concerns in the cybersecurity arena."</p> <p>The master's and doctoral level programs are designed to accommodate the busy schedules of working professionals. Like all of Capitol's graduate degrees, these programs are offered online, utilizing a real-time, synchronous learning platform that replicates classroom conditions -- without requiring a commute.</p> <p>"Our programs are very flexible," Richards said. "Professionals at all career stages can take our classes from anywhere in the world, as long as they have a computer connected to the internet. It's a very unique way to balance school and work and be able to do both at the same time."</p> <p>Capitol was one of the first institutions of higher education in the country to offer graduate-level degrees in cybersecurity, as well as one of the first to offer cybersecurity degrees online. The National Security Agency and the Department of Homeland Security have designated the university as a Center for Academic Excellence (CAE).</p> <p><img alt src="/files/Cybersecurity%20image.jpg">“Having that CAE designation is very significant. It’s the gold standard for academic programs in the field,” Richards said.</p> <p>"Students look for the CAE designation when they are considering their choice of schools, because they know it will unlock greater opportunities for them. They know the level of education they receive will be more reflective of emerging trends and the current standards, and that they will be taught by the very best,” Richards said.</p> <p>Over 2,500 practitioners and leaders in the field are expected to attend the IAS, held annually by the National Security Agency's Information Assurance Directorate. Through a series of presentations, panel discussions, and training sessions, attendees will gain a thorough overview of emerging developments in this critical field.</p> <p>The IAS will be held June 19-21 at the Washington Convention Center. More information <a href="http://www.fbcconferences.com/e/IAS/default.aspx" target="_blank">here</a>.</p> Categories: <a href="/taxonomy/term/39" hreflang="en">Cyber and Information Security</a>, <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> Wed, 14 Jun 2017 18:46:00 +0000 raherschbach2 329 at