Cybersecurity faculty members are recognized as leaders who are inspiring change within the information security workforce
The Internet of Things (IoT) is on the rise, and so are the threats associated with the interconnectedness of our devices. Eighty-four percent of organizations that have adopted IoT report experiencing at least one IoT-related security breach—and 93 percent of executives expect IoT security breaches to occur in the future—according to a February 2017 Aruba Networks study. Malware, spyware, and human error are the most common problems the study also reported.
For someone like Zachary Ducker who grew up learning and studying about cryptographic methods, meeting and talking with pioneers in the field of digital cryptography was more than a privilege and honor, he said. It was an overpowering experience.
“To be able to meet individuals such as Ron Rivest, Adi Shamir and Whit Diffie whose ideas formed the cryptographic methods I studied … to meet and talk with them in person was very profound.”
The 61st session of the United Nations Commission on the Status of Women (CSW) wrapped up on March 24, ending an intensive two weeks of discussion on its 2017 priority theme—Women’s Economic Empowerment in the Changing World of Work.
The outcome was a 19-page paper of sweeping recommendations that the UN’s top-ranking gender official said all global stakeholders must act on to help guarantee that “work works for women.”
Currently, session attendees concluded, work does not.
Meet Dr. Yul Williams. He is a technical director at the National Security Agency, focused on strategic innovation, which translates into staying ahead of the bad guys who want to break into the nation’s computer systems.
The article “Estimating Password-Cracking Times” by the business software solutions company Better Buys asserts that a seasoned hacker could break the woefully inadequate yet commonly-used password “123456” in less than 0.29 milliseconds.
Now, it may be difficult to imagine anyone in today’s virtual world relying on “123456” to secure their data and personal information. But, In fact, for the better part of the new millennium, according to UMUC Cyber Connections Blog contributor Garrett Boyd, “123456” has remained—along with password, 12345678, qwerty and 12345—among the top five on the list of the 25 most commonly used and hackable passwords.
ADELPHI, Md. (Nov 1. 2016)―Join University of Maryland University College (UMUC) for “Interconnected and Unprotected: The Cybersecurity Dilemma,” a one-day symposium that brings together leading cybersecurity experts to provide insight into the challenges, concerns, solutions and new opportunities in this vast arena called “cyber.” Attend on-site or online.
Editor’s Note: Weekly throughout October—Cybersecurity Awareness Month—UMUC will be sharing tips, best practices and information to help you protect your data and personal information and become more aware of cybersecurity issues in our daily lives. Week 1 featured “Hack” to School, the top eight tips for students’ safety. During Week 2, we shared Five Proverbs to Live By to survive in cyberspace. This week, Balakrishnan Dasarathy, PhD, UMUC Professor & Program Chair, Cybersecurity and Information Assurance, wonders …
Editor’s Note: October is Cybersecurity Awareness Month. UMUC will be sharing tips, best practices and other information weekly throughout the month to help you protect your data and personal information and become more aware of cybersecurity issues in our daily lives. Week 1 featured “Hack” to School, the top eight tips for students’ safety when using smartphones, PCs and social media. For this Week 2 edition, Valerie King, UMUC’s Program Chair and Collegiate Associate Professor for Cybersecurity Management and Policy (CSIA) shares strategies for:
Editor’s Note: October is Cybersecurity Awareness Month. UMUC will be sharing tips, best practices and other information throughout the month to help people protect their data and personal information and become more aware of cybersecurity issues in our daily lives.