Monthly Archives: April 2015

Pine-Richland School District announcing several IT job openings

The Pine-Richland School District is seeking individuals to fill the following full-time positions:

  • One Network/Enterprise Administrator
  • One Systems Administrator
  • One Help Desk Manager
  • Four or Five Technicians (1-2 senior, 2-3 entry level)

In addition to the positions listed above they will also have (unpaid) Internship opportunities for students which could advance into a paid position.

If you are interested in learning more about these opportunities, please contact Shawn Stoebener, Director of Technology, at sstoebener@pinerichland.org.

The New #1 Cyber Security Threat

Student Editorial

Starting off on a quick personal note, I will be graduating this May with my degree in Cyber Forensics and Information Security.  Robert Morris University has provided more knowledge for me than I ever thought possible.  With regard to cyber security, I have learned that the number one threat / weakness is user error.  Uneducated people can cause more damage in the blink of an eye than almost any other weakness.  That being said, I have discovered that this is almost common knowledge now, even among non IT people.  Organizations have gone to great lengths to educate employees to prevent attacks.  Perhaps, the number one threat has changed because of this.

When a user sits down at a machine, what is the first thing that they do?  They open up a web browser of their choice and check their email, and often times social media as well.  These web applications are used billions of times a day by billions of people.  If a hacker wants to gain information from a company, planting a bug on these web applications is quite possibly the best way to go.  In this case, educating people can only do so much.  If you tell employees to not check their Facebook, how long before they break that rule?   So the next logical question becomes, why are these web applications so vulnerable?

The biggest reason is that they were not created with security in mind.  The world wide web was created with the idea that it would be a place to openly share ideas and information across the globe in an instant.  Security would defeat this original purpose.  The founders never could have imagined what their creation would become.  It is because of this that web applications have become the number one threat to companies today.  Hopefully those of us who are graduating in a few weeks will someday be able to make a difference in the cyber future.

For more information, check out the link below:

http://www.forbes.com/sites/sungardas/2015/03/12/cyber-security-threats-to-information-systems-today/

New Degree Names: Data Analytics

The CIS Department is very proud to announce that it sought and received approval to change the name of three of its degree programs.  Starting in Fall 2015, the B.S. in Competitive Intelligence Systems and M.S. in Competitive Intelligence Systems will be known, respectively, as the B.S. in Data Analytics, and the M.S. in Data Analytics.  In addition, the fully-online M.S. in Competitive Intelligence Systems degree program will also be changed to the M.S. in Data Analytics.

In order to be consistent with the degree name changes, INFS3510 Competitive Intelligence will be changed to INFS3510 Intro to Data Analytics and INFS6510 Competitive Intelligence will be changed to INFS6510 Intro to Data Analytics.

The curricula of all three programs will remain exactly the same.

The CIS Department did extensive research of the Business Intelligence/Business Analytics field and feels that these updated program names are more consistent with industry and will allow our graduates to be more marketable and competitive in their career search.

To learn more about our Data Analytics programs, check out these links:

If you have further questions about this change, please contact your academic advisor.

PC Network Services Internship Opportunity

Who: Current juniors/Students who have completed their junior year

What: IT Internship

When: Summer 2015/Full time

Where: PC Network Services, Sewickley, PA

If you are a student looking for an IT Internship that provides experience in a vast amount of technical avenues and you have completed your junior year (or are about to do so), you may be interested in an internship with PC Network Services.

PC Network services is a premier managed IT services provider that serves SMBs in Western PA, Ohio, and beyond. PCNS has been recognized by MSPmentor as one of the best MSPs worldwide, and regionally as one of Western PA’s Best Places to Work.

Program Highlights:

  • Rotational Program – Gain valuable experience in Help Desk and Shop support roles.
  • Industry Experience – Through job shadowing and training, students are prepared to successfully handle actual client issues.
  • Networking – Work closely with our experienced IT staff and other interns to gain industry knowledge and insight.
  • Potential for Future Full-Time Placement –The talent pipeline for entry level opportunities includes students who have successfully completed the internship program.

To apply:

  • Visit PCNSInc.com/careers to learn more about working for PC Network Services and PCNSInc.com/apply to submit an application

OR

Careers with Cyber Forensics: Military, Law Enforcement, Corporate, and Executive – April 22

Careers with Cyber Forensics: Military, Law Enforcement, Corporate and Executive

Wednesday, April 22, 2015
Wheatley Center Critique Space

Schedule:
3:45 pm – Registration
4:00 pm – Pizza will arrive
4:15 pm – 5:30 pm –  Security Presentation
5:30 pm – 5:45 pm –  Question and Answer period

Top Secret Colonials are sponsoring this event!  If you register at the registration table, you will be able to receive SET credit for attending.

Several distinguished speakers will present, including:

  • Christopher J. Mellen 
    Director of the Information Risk Management branch within the Office of the Chief Information Officer for the Executive Office of the President (EOP) of the United States
    His directorate consists of the Records Management Branch, Cyber Integrity (eDiscovery) branch, Information Assurance and Security Operations
  • David Coughanour
    VP, Director PNC-CERT

    Teams responsible for Network Security Monitoring, Cyber Threat Intelligence, Technical Insider Threat Mitigation, and Digital Forensics
  • Edward R. Villarreal
    Incident Response, Mobile Security, and Insider Threat Team Lead for ManTech International onsite at a Large Federal Law Enforcement Agency

    His team provides computer forensic and incident response support to State-sponsored attacks against the Agency’s networks, eDiscovery collections to the Insider Threat Section, and Mobile Security technical expertise to the IT Branch deploying over 30,000 mobile devices.

My New Shoes: Tips for Software Evaluation and Selection

Student Editorial

I recently have been in the market for a new pair of running shoes. To most people, purchasing a new pair of shoes comes without a second thought; I see things a little differently. A good friend once told me that if there were two items that were worth spending money on it’s mattresses and shoes, because you spend half your lifetime in one or the other. So in search for my new pair of shoes, I found myself evaluating many different aspects of footwear. The materials, quality, fit, purpose, reputation, price, even the level of support and warranty offered by the manufacturer of the shoe all came under scrutiny in my evaluation. Once my criterion was met I was able to make a conscious decision.

At this point, you’re probably wondering what my search for new footwear has to do with anything IT related. Over the past few weeks I’ve been involved in consultation engagement to select a software solution for an ongoing project at my full time job. It was during the second proof of concept testing that it dawned on me that my evaluation of this security implementation has a lot in common with my search for my next pair of kicks. Critically evaluating the same areas of concern as my running shoes, I was able to provide greater value to the project by selecting an appropriate solution. In the following sections I’ve selected the three most important factors that I found helpful in both cases.

Purpose:

I found that this aspect of the software evaluation process was the most important of the metrics. Like shoes, purchasing a software solution is meaningless unless it fits its intended purpose. When you think about it, you wouldn’t purchase stilettos for running a marathon… then again, maybe you would, who am I to judge. The point is to select the best piece of software for the intention of its use. There are many good resources from companies like Gartner that show software solutions for many different technology paths.

Fit/Size:

Size is one of the most important aspects of shoe and software purchasing. Of course you wouldn’t purchase a size 4 shoe for a size 11 foot. The fit alone would make the product unusable. In the same respect purchasing a larger shoe for a small foot may serve a purpose if you anticipate growth to support the purchase of a larger shoe. These same concepts apply to the selection process of software solutions. Let’s say your user base is 100 people, selecting a solution that is only scalable to 20 users will likely under perform and result in system stability issues following implementation. Adversely, selecting a program that is designed for hundreds or thousands of users may result in higher costs and wasted funds. As such this translates to our next element of evaluation, cost.

Price:

Whether for shoes, software, clothes or cars, price is likely a factor by which you make your selection. In most cases price negotiation is possible when the software implementation is of a substantial price. However when the software is lower in cost, room for negotiation is sometimes nonexistent. While cost analysis is something that could be compared between both shoe buying and software, there would likely not be any negotiation process for footwear. Ultimately cost of either item is something that will come under the most scrutiny.

Support/Warranty:

Finally, I took the liberty to look into product warranty and support standards. In the case of the shoe purchases I took into account the warranty that was offered by the manufacturer. Shoe manufacturers that offer extended support for the product line often produce a premium product over their competitors. In the world of software vendors, the saving grace relies with the support of the product. When a vendor takes the time and cost to setup a superior support structure around their product, this can speak volumes of the product line and company as a whole. Having premium support and backing for a product will save lots of headaches down the road.

After assessing each point for my software evaluation, I was able to make a conscious recommendation to my customer. The end result being a product that fit appropriately to the user scope and cost less than alternate products. Additionally the support agreement was suitable for the implementation and on going support of the environment.  I also purchased my new running shoes, which after all of my assessment I ended up with great pair of shoes that were admittedly more expensive than I budgeted. I suppose that sometimes you get what you pay for.

IT Staff Auditor Position Available at Dollar Bank

Job Description:

Pittsburgh’s oldest local bank, Dollar Bank, is currently seeking an Information Technology Staff Auditor to join the Dollar Bank Audit Team. This individual will conduct audits of information systems under the direction of an in-charge auditor, review new and enhanced systems during the development life as assigned, assist external auditors with their reivew, and perform special audits.

Qualifications:

  • BS in Information Systems Management or related field required
  • 2 years Information Technology Audit experience helpful (mainframe, LAN, Windows, and Internet environments)
  • Proficiency using a personal computer and Microsoft Office software required
  • Proficiency in data processing principles and techniques required
  • Ability to communicate effectively both orally and in writing required

Qualified candidates should submit their resumes to: www.dollarbank.com/careers

Online Gaming Hack

Student Editorial

Activist groups, regardless of which ones you are examining, have a message that they want to get across to the public.  Sometimes it is with regard to religion, or a political figure.  No matter the message, the ultimate goal is to convey this message in a way that gets the public’s attention.  However, there are so many activist groups out there these days that you have to get creative in order to stand out.  A few months ago, an activist group did just that.

It has been a few months since the activist group “Lizard Squad” took down both the PlayStation Network as well as the X Box Live Network.  Why target gamers for a message?  Stereotypically speaking, they do not worry to much about these kinds of things.  However when the number of gamers affected by taking down their networks is 56 million, I think it is safe to say that you have gained the attention of a huge population of people.  It is creative, effective, and depending on your perspective, devastating.  What was the message that was so important then?

In reality, this group of hackers are what is known as ‘White Hat’ hackers.  They infiltrate various networks for good intentions.  The Lizard Squad wanted to bring down the gaming networks to show how weak their security really was.  By doing this, it can become public knowledge that Microsoft and Sony, powerhouses in the technology world, still have a lot to learn in the area of security.  Eventually, there is going to be a cyber attack that is much more devastating than that of The Lizard Squad.  One with real consequences.  Hopefully major organizations become aware that there is a problem that needs to be addressed.

For more information on the attack that took place this past Christmas, you can check out the links below:

http://www.nytimes.com/2014/12/29/technology/playstation-network-returning-after-hacking-that-also-targeted-xbox-live.html?_r=0

http://www.independent.co.uk/news/world/americas/what-is-the-lizard-squad-and-what-does-it-want-9945949.html