UNIT ONE. Introduction to CyberPatriot and Cybersecurity. AIR FORCE ASSOCIATION S CYBERPATRIOT

Similar documents
CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM

CyberPatriot X Round 1 Checklist and Instructions

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

CP-XI Practice Round Checklist and Instructions

A United States Cyber Academy Program

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Strengthening Capacity in Cyber Talent sans.org/cybertalent

US fights cybercrime from suburban office parks 11 November 2014, by Martha Mendoza

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

NATIONAL CYBER DEFENSE COMPETITION. Competition Rules

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

You ve Been Hacked Now What? Incident Response Tabletop Exercise

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

2016 National Leadership Conference Registration Instructions

Presented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland

Understanding the Changing Cybersecurity Problem

Secure Systems Administration and Engineering

House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing:

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

The fast track to top skills and top jobs in cyber. Guaranteed.

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Why the Security Workforce Needs More Women and Men

Blending Information Systems Security and Forensics Curricula

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy

Cybersecurity and Hospitals: A Board Perspective

Your security on click Jobs

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

COMMUNITY COLLEGE CYBER DEFENSE COMPETITION. Competition Scenario

CYBER SECURITY: ALTITUDE DOES NOT MAKE YOU SAFE

Governance Ideas Exchange

Preventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence

Hacking: Ultimate Guide To Ethical Hacking For Beginners PDF

Certified Cyber Security Analyst VS-1160

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

Tina Ladabouche. GenCyber Program Manager

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Immersion Academy Annual Report 2017

DIABLO VALLEY COLLEGE CATALOG

Personal Cybersecurity

CYBER SOLUTIONS & THREAT INTELLIGENCE

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

The Value of Automated Penetration Testing White Paper

716 West Ave Austin, TX USA

CYBERSECURITY SAVE YOUR BOTTOM LINE IBC Annual Convention Anne Benigsen, Bankers Bank of the West

Cyber Security School

ISDP 2018 Industry Skill Development Program In association with

COMPUTER FORENSICS (CFRS)

Topics. Ensuring Security on Mobile Devices

HOW SAFE IS YOUR DATA? Micho Schumann, KPMG, Cayman Islands

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Your Challenge. Our Priority.

Beyond the F.U.D. How to start securing your DCS network today.

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Data Breach Preparedness & Response

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017

Bachelor of Information Technology

What It Takes to be a CISO in 2017

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

RISK MANAGEMENT Education and Certification

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

Opening Doors to Cyber and Homeland Security Careers

Securing the User: Winning Hearts & Minds to Drive Secure Behavior

Department of Management Services REQUEST FOR INFORMATION

Introduction to Information Security Dr. Rick Jerz

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Career Paths In Cybersecurity

Personnel Certification

IE156: ICS410: ICS/SCADA Security Essentials

Retail Security in a World of Digital Touchpoint Complexity

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

CYBERSECURITY: Scholarship and Job Opportunities

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

State of the. Union. (or: How not to use Krebs as an IDS ) (Information Security) Jeff McJunkin Senior Technical Analyst Counter Hack Challenges

Homeland Security Graduate Programs

Cyber Crime Update. Mark Brett Programme Director February 2016

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Heavy Vehicle Cyber Security Bulletin

Cyber Security Stress Test SUMMARY REPORT

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Protecting your next investment: The importance of cybersecurity due diligence

Legal Aspects of Cybersecurity

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

Cybersecurity and Nonprofit

CALENDAR FOR THE YEAR 2018

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

PRESENTED BY. Abertay Ethical Hacking Secretary Harley

Transcription:

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT ONE Introduction to CyberPatriot and Cybersecurity www.uscyberpatriot.org

Learning Objectives Participants will gain an understanding of the CyberPatriot competition Overview National Finals Competition Team Structure Scoring Timeline Participants will gain a broad understanding of what cybersecurity is and why it is an important Cybersecurity in Everyday Life Cybersecurity in the World Cybersecurity Careers 1

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM SECTION ONE CyberPatriot: National Youth Cyber Defense Competition www.uscyberpatriot.org 2

What Is CyberPatriot? The National Youth Cyber Education Program AFA CyberCamps Elementary School Initiative National Youth Cyber Defense Competition Not hacker training Offensive behavior is not allowed Fun way to learn skills that will be useful in the future Technical skills Teamwork Critical thinking 3

The National Youth Cyber Defense Competition Teams consist of 2 to 6 Competitors, a Coach, an optional Technical Mentor, and an optional Team Assistant Teams compete in online qualifying rounds Points are earned by identifying and correcting weaknesses in a simulated computer system 4

The National Finals Competition Top teams earn all-expenses-paid trips to Washington D.C. More than just competing in front of a computer Last season s National Finals also had a Digital Crime Scene Challenge, Cisco Networking Challenge, and other additional components Opportunity to win scholarships, network with industry leaders, and enjoy media recognition 5

What is CyberPatriot? Click here to play the CyberPatriot recruitment video: https://www.youtube.com/watch?v=xpqwfpnkdss 6

How CyberPatriot Works: Team Structure Coaches are the administrative lead of the team Supervise students Are the main point of contact for CyberPatriot Program Office Ensure integrity of the competition Train teams for competition (if technically savvy) Technical Mentors volunteer to help Coaches train teams Use industry expertise to teach students about cybersecurity Guest lecture or work with team(s) on a regular basis Team Assistants volunteer to provide non-technical support and encouragement to the team Competitors work together to find and fix vulnerabilities in a simulated computer system Click here for more information: http://www.uscyberpatriot.org/competition/how-it-works/team-organization 7

How CyberPatriot Works: Scoring Earn points by fixing vulnerabilities in a virtual machine (VM)* Virtual machines (aka images ) are software programs that simulate computer systems Lose points for making the system less secure Harden your system and defend against outside attacks by starting with hints and the scenario in the ReadMe file on the desktop Not all vulnerabilities are scored or hinted at in the ReadMe The goal of the competition is to harden the system as completely as possible in the provided time You might do something that improves the system, but does not earn your team points *More information on VMs is available in Unit Five of these training materials 8

How CyberPatriot Works: CCS The CyberPatriot Competition System (CCS) automatically transmits your team s progress in the competition image (VM) to the CyberPatriot scoring server Use the CyberPatriot Scoring Report to check your score and your connection status and score A chime will play when you gain points and a buzzer will sound when you lose points Do not open, modify, or delete anything in the CyberPatriot folder of any image Doing so could cause you to lose your progress in the image 9

How CyberPatriot Works: Competition Deployment SAMPLE SCHEDULE: Sunday Monday Tuesday Wednesday Thursday Friday Saturday 1 2 3 4 5 6 7 8 9 10 11 12 StartEx Email sent 13 14 15 16 17 18 19 Image Download and Instructions Email sent COMPETITION 20 21 22 23 24 25 26 Round Results ROUND Email sent 27 28 29 30 1 2 3 Competition emails are only sent to registered Coaches Image Download and Instructions email includes download links and thorough instructions for the round. StartEx contains password to unzip images and log into user account. Teams choose a six-consecutive-hour window during the competition weekend to compete. Six-hours must fall between support times posted by CPOC. Later rounds have a Preliminary Results email sent to Coaches for review prior to general score release 10

CyberPatriot VIII Timeline Click here for more information: http://www.uscyberpatriot.org/competition/competition-timeline 11

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM SECTION TWO Introduction to Cybersecurity www.uscyberpatriot.org 12

What is Cybersecurity? All the tools we use and actions we take to keep computers, networks, and information safe and available for those who need it, and unavailable for those who should not have it. That means protecting hardware and data from everything from hacktivists to earthquakes. Source: www.umuc.edu 13

Why is Cybersecurity Important? Things that rely on computers: Banks Social Media Schools Airlines and Railroads Stores Police and fire departments Military and government systems Doctors offices Source: US Department of Homeland Security 7,200+ critical American industrial control systems are linked to the Internet, and therefore vulnerable to attack Answer: Cybersecurity isn t just about protecting computers. Almost everything relies on or could be affected by a computer. 14

Why is Cybersecurity Important? 2006: 26.5 million veterans personal information is compromised after the theft of a Veteran Affairs employee s laptop. The employee thought it was safe to bring home VA records on an unsecure drive. 2009: Coca-Cola executive clicks link in spoof email allowing attackers to steal confidential files on $2.4 billion business deal with Chinese juice company. 2011: DHS plants USB drives and CDs outside of government and government contractor buildings. The majority are picked up by employees and inserted directly into their organization s computers. Answer: People make mistakes. Cybersecurity is often about protecting organizations and individuals from themselves. Sources: CSO magazine, www.csoonline.com, Bloomberg News, www.bloomberg.com, GCN Magazine, www.gcn.com 15

Why is Cybersecurity Important? Case: Backoff Malware Attacks (2013-present) Targeted cash registers and payment systems sold by seven different companies Impacted major retail companies like Target, Dairy Queen, and UPS Hackers use brute force password cracking to remotely access and infect the networks of major cash register system providers Hackers are able to download credit card information when shoppers swipe their cards at cash registers purchased from the infected companies Department of Homeland Security announces that the payment systems of more the 1,000 American stores may be infected Answer: We re all connected A weakness in one system can be exploited by attackers to target another system. Source: New York Times, http://bits.blogs.nytimes.com/2014/08/22/secret-service-warns-1000-businesses-on-hack-that-affected-target/ 16

Who s Hiring? Nearly every organization needs cybersecurity professionals 300,000+ new information technology jobs were created in 2013 Average salary for computer jobs in 2013 was ~$89,000, while cybersecurity-specific jobs brought an average salary of $100,000+ Source: Computer World, http://www.computerworld.com/s/article/9237394/demand_for_it_security_experts_outstrips_supply?pagenumber=2 17

Cyber Career Opportunities Cyber workers Employees that maintain day-to-day security and strengthen their organization s protection Cyber defenders Government or contractor employees that protect American networks and information from attacks Cyber sleuths Professionals that watch for espionage and insider threats and perform digital forensics for law enforcement Cyber leaders Industry veterans that decide company security policies, train new employees, and conduct R&D 18

Important Resources These training materials are only intended to provide basic training for the competition. Coaches and Mentors can be great resources, but the below links may help as well: The CyberPatriot Rules Book (CP-VIII version coming soon) Click here: http://www.uscyberpatriot.org/competition/rules-book Additional Windows resources Click here: http://www.uscyberpatriot.org/competition/training-materials/windows Additional Linux resources Click here: http://www.uscyberpatriot.org/competition/training-materials/linux Ubuntu practice images and Windows scoring engine provided by Texas A&M Corpus Christi Click here: http://www.uscyberpatriot.org/competition/training-materials/practice-images 19