Monthly Archives: December 2014

Deadline extended for DHS Cyber Student Volunteer Initiative – Apply by January 9th!

The U.S. Department of Homeland Security (DHS) has announced the launch of the 2015 Secretary’s Honors Program Cyber Student Volunteer Initiative. This program is part of the department’s ongoing effort to develop the next generation of cyber talent, and in the coming months, DHS expects to place approximately 75 undergraduate volunteers in cybersecurity-focused assignments at more than 50 locations across the country.

Volunteers who are selected will have a unique opportunity to learn about the DHS cybersecurity mission and to engage in hands-on cybersecurity work related to digital forensics, network diagnostics, incident response, and a variety of other specialties.

Applications will be accepted until December 12, 2014 via USAJOBS.gov. The deadline for applications has been extended to January 9, 2015!

FedEx Offering Paid 2015 Summer Internships in Business and IT

FedEx is offering a 10-week internship assignment for students pursuing a college degree in business or IT fields. Assignments will be directly related to the intern’s academic degree.

To be considered for this position for Summer 2015, you must submit your application through FedEx Careers site (careers.fedex.com).

Students are encouraged to apply as soon as possible!  FedEx will begin filling positions around late December, and positions tend to be filled quickly.

For more information:
https://www.myinterfase.com/rmu/Job/Detail/WW9jSU43WnNEczBNVkg4RU1wcGM1djlaUjZGc2lHYWY3NVB4Y21OQWdQST01

Systems Analyst (Intermediate) Position at UPMC Presbyterian

UPMC Corporate Services is hiring a full-time Systems Analyst – Intermediate to help support the Enterprise Radiology Imaging Department for its UPMC Baum location.  The Systems Analyst – Intermediate provides experienced analytical and/or programming capabilities, defines requirements, develops and/or maintains computer applications/systems, and provides services to meet client IT and business needs.

Responsibilities:

  • Develops and maintains project work plans for small to medium projects.
  • Maintains and supports production systems.
  • Interviews personnel from client area to learn system requirements and identify methods of resolving problems and/or meeting client needs. Handles multiple/concurrent project assignments.
  • Prepares and maintains documentation for new and existing systems, ensuring compliance with departmental procedures.
  • Maintains and increases knowledge of health care industry and information system technology.
  • Utilizes project tailoring tools, codes, and tests ad hoc reports.
  • Develops and/or assists project leader in developing detailed specifications including record layouts, functional specifications, screen designs, and report layouts.
  • Designs and executes test data; works closely with user during testing; trains users on applications as appropriate.

Requirements:

  • Associate Degree or equivalent education / job experience required; BA/BS Degree in Computer Science or equivalent degree preferred.
  • Periodic review of work in progress and at project completion. Supervisor contact is biweekly. Regular contact with users, vendors, and other outside contact. Regular exercise of judgment and initiative required to review/analyze issues. Flexibility to use problem solving alternatives that may not be governed by established procedures.
  • Minimum 1 year experience in systems analysis and programming required. Requires analytical, problem-solving, and communication skills.

Preferred Experience:

  • Ideally seeking candidates with Epic experience that would include implementation and support of EpicCare Ambulatory and Inpatient applications, Beacon, Radiant, Cupid, Beaker. MyChart, Haiku, Canto, Phoenix.
  • Candidates that have other clinical system experience (Cerner, Siemens, Allscripts, etc.) are preferred.

Apply here.

DHS Secretary’s Honors Program Cyber Student Volunteer Initiative

The U.S. Department of Homeland Security (DHS) has announced the launch of the 2015 Secretary’s Honors Program Cyber Student Volunteer Initiative. This program is part of the department’s ongoing effort to develop the next generation of cyber talent, and in the coming months, DHS expects to place approximately 75 undergraduate volunteers in cybersecurity-focused assignments at more than 50 locations across the country.

Volunteers who are selected will have a unique opportunity to learn about the DHS cybersecurity mission and to engage in hands-on cybersecurity work related to digital forensics, network diagnostics, incident response, and a variety of other specialties.

Applications will be accepted until December 12, 2014 via USAJOBS.gov. The deadline for applications has been extended to January 9, 2015!

Assignments will begin in May 2015 and continue throughout the summer. For more information, see the attached flyer or direct a question to CMSI@hq.dhs.gov.

2015 Cyber Student Volunteer Initiative

Top Secret Colonials social media online!

As some of you may know, we have a student organization on campus called the Top Secret Colonials. We are a group of information security and cyber forensics students who share an interest in attending a two week academic seminar in Washington, DC. The TSC now have an operating Twitter and Facebook page and it would be appreciated if everyone could go check them out! These pages will be used to announce meeting times and places for our group, technology news, and anything else that may be of interest to our students. Below is some information that may be helpful.

The Washington Center – where the two week academic seminar is held in DC

TSC Twitter

TSC Facebook

The president of TSC is Meghan Riggle. If you have any questions about joining or what TSC is feel free to contact her at riggle.meghan.94@gmail.com.

In addition, our faculty leader is Dr. Karen Paullet. You can contact her with any questions as well at paullet@rmu.edu.

KeyMe App Coming to Pittsburgh Next Year

A new app has recently been developed and it will be coming to the Pittsburgh area early next year. The KeyMe app is a new way for people to create copies of their keys. The process starts by downloading the app and then taking a picture of your key. The app then processes a digital model for printing. The user can then go to a kiosk at stores like Rite Aid, 7-Eleven and Bed Bath & Beyond, enter in their password, and print the new key. The process to print is estimated to take around 30 seconds so it is a very convenient process.

This app is a great idea to some but a disaster waiting to happen to others. The reasoning behind why some people find this app dangerous is because of the apparent security issue. Theoretically, someone would need just a picture of your key and then be able to print as many as they needed. The company has stated that a user’s information is not stored by the app so the address, credit card, or other identifying information will be nonexistent to a malicious cyber-attack.

I am indifferent to this app. I think it will be a much faster way to go about creating keys but on the downside this will hurt a lot of locksmiths. Also, if someone really wanted to break into somewhere they could simply buy a $15 lock picking set off of the Internet and pick the lock. So I do not believe there will be any increase in break-ins with this app. Keep an eye out early next year for kiosks near you and check out the app!

Read more here.

Antivirus Discussion Webcast

On Friday December 5th at 2pm two security experts will be broadcasting a webcast with the topic of “Gaining Defense-In-Depth on the Endpoint -Is Antivirus Enough?

Description:

Brian Hazzard– Vice President of Product Management at Bit9 + Carbon Black

Dr. Engin Kirda of Lastline

Discussion Points:

  • How real is the threat of advanced attacks on your endpoints?
  • How can a layered defense-in-depth strategy help address the problem?
  • What kinds of technologies should be used? When?
  • Where does antivirus fit in the endpoint security landscape?

You will also be able to question the security experts throughout the webcast.

If you are interested in participating in this free online event, register by clicking on the following link below.

http://redmondmag.com/webcasts/2014/11/bit9-dec5.aspx?partnerref=bit9

Women’s Leadership and Mentorship Program (WLMP) Invites New Members for Fall 2015

The Women’s Leadership and Mentorship Program (WLMP) is ready to invite applications for new cohort members for fall 2015. This program is newly developed and provides leadership opportunities to selected incoming freshmen women.  If you are a freshman women (entering Fall 2015) or know of someone who is and might be interested, please see the following for more information about the program:
http://www.rmu.edu/Undergraduate/womenlead

Each woman selected for the program will receive a tuition stipend and study abroad stipend during her senior year.  The program involves partnering each woman with an upper-class peer mentor and a faculty mentor to support her during her four years at RMU.  WLMP hosts a variety of workshops, training sessions, networking events, and research opportunities for members throughout the year as well.

Take a look at the following video explaining more about the program.  The video features faculty mentor Dr. Sushma Mishra from the CIS department, as well as Meghan Riggle, a Cyber Forensics and Information Security major serving as a peer mentor in the program.  You will also hear from Cassidy Turner, an Information Systems student currently in the program.

Tech Connect Job Fair

The Pittsburgh Technology Council is hosting a free recruiting event for students, as well as for entry-level positions. This is “a non-traditional job fair, where you’ll have the opportunity to network with over 40 companies in a casual setting, perfect for impromptu discussions with hiring companies from around the Pittsburgh region.” Pre-registration for this event is not required, but appreciated! This event will be held in conjunction with Carnegie Mellon University and the University of Pittsburgh.

REGISTER HERE.

Specifications:

Tech Connect Recruiting Event

Thursday, January 29, 2015 | 1:00-5:00 p.m.

Location: Pittsburgh Athletic Association, 4215 Fifth Avenue, Pittsburgh, PA 15213

Any questions about this event should be directed to careers@pghtech.org

Passwords ARE Important

I know it really is a pain to have so many passwords.  “No one can figure out my password; it’s no big deal.”

Have you ever bought a router, XBox, or Play Station and thought, “I don’t need to change the default password.” Well, after reading this you may think otherwise. How private is private anymore?

How about a few scenarios…..

1. You just bought a baby monitor camera for your sister who just had a baby.

2. Your mom is a widow and has had someone break into her shed lately so you get her a surveillance camera for her property.

In both scenarios the cameras were installed and are up and functioning properly. Wait, did they remember to change the default password? You might want to check! It is very important to change default passwords!

Video surveillance and webcam cameras are reportedly being streamed online without the knowledge of the camera owners. This type of exploitation is not only scary, but an invasion. These security feeds are being accessed because the owners did not change the default passwords.

There are reports of videos that show babies sleeping in cribs, children playing inside day cares, people in malls, live views into couple’s bedrooms, inside looks of small businesses, school buses from Pittsburgh and even looks within industrial plants. These compromised video feeds are from around the world, but that doesn’t mean it can’t happen right here. Some feeds are reported to be from private homes right in Beaver County.  Check out this article for more information:
https://beavercountian.com/content/daily/webcams-in-beavercounty-among-thousands-being-streamed-online-without-their-owners-knowledge

Please pass the word – default passwords must be changed for security! If you don’t, you may become an Internet star without even knowing.