Author Archives: Caitlin Counihan

Unknown's avatar

About Caitlin Counihan

Information Sciences (BS) and Data Analytics (MS) Student, Class of 2016

Mylan Intern Networking Night – February 4th

Mylan is holding an Intern Networking Night on Thursday, February 4th at the Robert J. Coury Global Center at Southpointe. Registration and refreshments will be held from 4:30-6pm and networking will be from 6-7:30pm.

Please RSVP for this event by Monday, February 1st at https://www.surveymonkey.com/r/B8GBWKS.

Registration is limited and will be on a first come, first served basis. Register early to ensure you will have the opportunity to speak with leaders from your area of interest.

More information is included in this flyer: Mylan Intern Networking Night Flyer

Department of Homeland Security Secretary’s Honors Program Cyber Student Volunteer Initiative

The U.S. Department of Homeland Security (DHS) has launched the 2016 Secretary’s Honors Program Cyber Student Volunteer Initiative. The initiative targets current undergraduate and graduate students and is a part of the Department’s efforts to build a cybersecurity talent pipeline by working with secondary and post-secondary institutions and other key partners in academia and the private sector.

Through the Secretary’s Honors Program Cyber Student Volunteer Initiative, students are able to learn about the DHS cybersecurity mission by completing hands-on cybersecurity work and building technical experience in key areas such as digital forensics, network diagnostics, and incident response.

In the 2016 Cyber Student Volunteer Initiative program cycle, over 80 student volunteer assignments are available at over 40 local DHS field offices across the country and eight participating DHS Components, to include Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), National Protection and Programs Directorate (NPPD), Office of the Chief Information Officer (OCIO), Office of Intelligence and Analysis (I&A), Office of Policy/Cyber, Infrastructure and Resilience Policy, Transportation Security Administration (TSA), and United States Coast Guard (USCG).

The Cyber Student Volunteer Initiative application period is open until January 29, 2016 through the USAJOBS portal (https://www.usajobs.gov/GetJob/ViewDetails/425296700).

For more information, contact the DHS CyberSkills Management Support Initiative (CMSI) at CMSI@hq.dhs.gov

Data Privacy Day – January 28th

The Top Secret Colonials are promoting a data privacy awareness day on January 28th. Data Privacy Day is meant to help raise the public’s awareness around data security and educate all internet users to be safer online. This day also aims to encourage greater accountability among consumers to better perceive how their information is being shared.

On January 28, the National Cyber Security Alliance (NCSA) will host events in Washington, DC and Los Angeles where privacy professionals will explain solutions to current challenges as well as best practices, such as how to recognize cyber intrusions and establishing an incident response plan. NCSA will also hold Twitter chats centered around data privacy in the days leading up to Data Privacy Day.

Data Privacy Tips (from StaySafeOnline.org):

  • Share with Care
    • What you post can last a lifetime: Before posting online think about how it might be perceived now and in the future and who might see it.
    • Own your online presence: Set the privacy and security settings on web services and devices to your comfort level for information sharing. It’s ok to limit how and with whom you share information.
    • Be aware of what’s being shared: Be aware that when you share a post, picture or video online, you may also be revealing information about others. Be thoughtful when and how you share information about others.
    • Post only about others as you have them post about you: The golden rule applies online as well.
    • Own your online presence: It’s OK to limit who can see your information and what you share. Learn about and use privacy and security settings on your favorite online games, apps and platforms.
  • Personal Information Is Like Money: Value It. Protect It.
    • Think before you act: Be wary of communications that implore you to act immediately, offer something that sounds too good to be true or ask for personal information.
    • Get two steps ahead: Switch on two-step verification or multi-factor authentication wherever offered to prevent unauthorized access.
    • Know what’s being collected, who is collecting it and how it will be used: Information about you, such as the games you like to play, what you search for online and where you shop and live, has value ‒ just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites. Only use a product or service if the company is open and clearly states how it will use your personal information. If you’re not sure what a business will do with your information, ask your parents. Think twice if an app wants permission to use personal information (like your location) it doesn’t need before you say “OK.”
    • Secure your devices: Use strong passwords or passcodes or touch ID features to lock your devices. Securing your device can help protect your information if your device is lost or stolen and keep prying eyes out.
    • Get savvy about WiFi hotspots: Public wireless networks and hotspots are not secure – this means the possibility exists that anyone can see what you are doing on your laptop or smartphone while you are connected to it. Think about what you are doing and if you would want another person to see it. If you use public WiFi a lot, think about using a virtual private network (VPN) that provides a more secure WiFi connection.
    • Now you see me, now you don’t: Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. Turn off WiFi and Bluetooth when not in use, and limit your use of free public wireless networks, which stores and locations can use to track what you do online.
    • When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way bad guys get access to your personal information. If it looks weird, even if you know the source, it’s best to delete.

Sources:

-http://associationsnow.com/2016/01/data-privacy-day-to-raise-publics-awareness-of-its-role-in-data-security/

-https://www.staysafeonline.org/data-privacy-day/privacy-tips/

The Black T-Shirt Cyber Forensics Challenge

The staff in Stevenson University’s Cyber Forensics program is working with the programs at approximately 50 other colleges and universities in launching The Black T-Shirt Cyber Forensics Challenge, which is a joint academic and industry contest designed to promote interest in digital forensics, foster relationships among academic institutions, develop relationships between academia and the corporate sector, and provide a valuable hands-on exercise for learning and training.

We are looking for teams of students between 1-3 members to enter the challenge. There is no cost and this would be a great way to raise awareness of your skills and the Top Secret Colonials. We are permitted to have multiple teams but the teams are NOT permitted to work together. The annual challenge, which has already been built for this year, will run from January 1, 2016 to April 1, 2016. Challengers can register at any time in that window; once registered, links will be provided to download the data. Submissions will be due on April 1. The results will be scored in the month of April 2016.

Tools will not be provided but you can use FTK, the Password Recovery Toolkit, Splunk, DEFT, Autopsy, etc. to analyze the images. Teams are permitted to use whatever tools and methods they choose but they must be available and able to be recreated by the judges. Each member will receive a Black Cyber Forensics Challenge t-shirt.

This year’s contest involves confirming allegations of an exfiltration of company information by analyzing two computer images and network traffic. Point structure hasn’t been released yet. In addition to the main challenge, “Mini” Challenges” will be run throughout the year. These are similar to the annual challenge but smaller. The fall challenge for next year involves an executive returning from a business trip to find that there were very strange charges on her phone bill that she did not make.

More details can be found online at http://cyberforensicschallenge.com. Please email Dr. Paullet (paullet@rmu.edu) immediately so we can start forming teams.

Department of Homeland Security Secretary’s Honors Program Cyber Student Volunteer Initiative

The U.S. Department of Homeland Security (DHS) is preparing to launch the 2016 Secretary’s Honors Program Cyber Student Volunteer Initiative. The initiative targets current undergraduate and graduate students and is a part of the Department’s efforts to build a cybersecurity talent pipeline by working with secondary and post-secondary institutions and other key partners in academia and the private sector.

Through the Secretary’s Honors Program Cyber Student Volunteer Initiative, students are able to learn about the DHS cybersecurity mission by completing hands-on cybersecurity work and building technical experience in key areas such as digital forensics, network diagnostics, and incident response.

DHS will announce the start of the 2016 Secretary’s Honors Program Cyber Student Volunteer Initiative program cycle within the upcoming weeks on http://www.USAJOBS.com. Here is a flyer with more details: DHS Flyer.

For more information, contact the DHS CyberSkills Management Support Initiative (CMSI) at CMSI@hq.dhs.gov.

Top Secret Colonials Christmas Tree

The Top Secret Colonials have decorated a Christmas tree located in the Wheatley lobby. The tree has a technology theme and is decorated with various technology related ornaments: bedazzled floppy disks and CDs, keyboard keys, and punch cards, to name a few. Below are some pictures of the process of making the tree and the final product. Remember to come check it out in Wheatley!

Collage.jpgphoto (2)-1.jpg

FBI Internship Information – How to Apply

The FBI has opened the call for applications for the 2016 Honors and Cyber Internship programs. You must apply by November 24. All educational backgrounds will be considered for the internships. To qualify for the Honors or Cyber Internship Programs, candidates must:

  • Be a second-semester freshman or above; candidates cannot have graduated before June 13, 2016;
  • Be available 40 hours per week from June 13, 2016 to August 19, 2016 (10 weeks); and
  • Have a minimum cumulative 3.0 GPA.

How to Complete a Submission:

  • Step 1 – Choose a Talent Network
  • Step 2 – Create an Account
    • Click “Register Here”.
    • Pick a user name and password, and enter an email address.
    • Click “I Agree” and then “Register”.
    • From the Careers page, click “My Profile” to add your preferred method of contact, name, address, and phone number; click “Save”.
  • Step 3 – Submit Resume, Answer Questionnaires, and Complete Your Application
    • After you clicked “Apply Now”, the “Choose Resume” screen will be displayed.
    • Click “Copy and paste resume text” and “Continue”; from there, paste your resume.
    • Next, click “Continue” and complete the “Pre-Application Questionnaire”.
    • When you are finished, click “Save & Return”.
    • When finished filling out your application, click “Submit”.
    • Click “Yes” on the confirmation message that displays.
    • Review the Terms and Agreements; if you agree, click the “I agree to these terms” checkbox.
    • Once you have submitted your application, refer to the Careers page, and click “My Career Tool” link. You will then see your Applications in Progress.

Only candidates in the network by November 24 will be considered for the 2016 program.

FBI Internship Information

The FBI has opened the call for applications for the 2015 Honors and Cyber Internship programs and launched a new application process. All intern candidates must go to www.fbijobs.gov, register and complete a profile, and then select their profile to be added to the Intern Talent Network (ID Number 1023) by November 24.

After selecting the Intern Talent Network, intern candidates must attach their resumes and answer suitability questions. Only those candidates in the network by November 24 will be considered for the 2016 program.

All educational backgrounds will be considered for the internships. To qualify for the Honors or Cyber Internship Programs, candidates must:

  • Be a second-semester freshman or above; candidates cannot have graduated before June 13, 2016;
  • Be available 40 hours per week from June 13, 2016 to August 19, 2016 (10 weeks); and
  • Have a minimum cumulative 3.0 GPA.

USS Open Co-Op Positions for January or June 2016 in IT

United States Steel Corporation is currently recruiting Co-Ops in their IT Division for 2016. These assignments would begin in Jan or June 2016.  Students local to the USS facility are able to attend class and work the Co-Op assignment. These assignments offer a competitive pay and an exceptional learning opportunity.

Below is the list of open positions and work locations. If you interested in one of these positions, please apply directly to the USS careers website at http://www.ussteel.com.

Job # Posting Title Work Location No. of Positions
6876BR Application Developer Co-Op/Intern Southside – Pittsburgh 10
6878BR IT Infrastructure Co-Op Southside – Pittsburgh 15
6879BR Plant Process Control Co-Op West Mifflin, PA 1
6880BR Plant Process Control Co-Op West Mifflin, PA 1
6881BR Plant Process Control Co-Op Gary, IN 2
6882BR Plant Process Control Co-Op Gary, IN 1
6883BR Plant Process Control Co-Op Ecorse, MI (Detroit) 2
6885BR Plant Infrastructure Co-Op West Mifflin, PA 1
6886BR Plant Application Developer Co-Op Gary, IN 2
6888BR Cyber Security Co-Op/Intern Southside – Pittsburgh 1

General Qualifications:

– Candidates must be a full-time student pursuing a Bachelor’s or Master’s Degree in Computer Science, Computer Information Systems, Management Information Systems, or other IT-related discipline.

– Candidates must have completed or be working towards completion of their sophomore year and be in good academic standing.

– Candidates must be willing to work one of two schedules: two semesters at 16-20 hours per week followed by one summer of 40 hours per week or one semester of 40 hours per week plus one summer of 40 hours per week.

If you would like to speak about these openings or have any questions, please contact Barbara Santella at 412-433-6677.

Senate Passes Cybersecurity Bill

The Senate passed a bill Tuesday aimed at improving cybersecurity by encouraging companies and the government to share information about threats. It took roughly six years to win approval for such a program.

The Cybersecurity Information Sharing Act passed by a 74-21 vote. It overcame concerns about privacy and transparency from some senators and technology companies, such as Apple and Yelp.

The bill’s co-sponsors, Sens. Dianne Feinstein, D-Calif., and Richard Burr, R-N.C., said the measure was needed to limit high-profile cyberattacks, such as the one on Sony Pictures last year.

Companies would receive legal protections from antitrust and consumer privacy liabilities for participating in the voluntary program.

Despite the lengthy road to pass the Senate bill, it’s unclear whether it would improve Internet security. Participation is voluntary and companies have long been reluctant to tell the U.S. government about their security failures.

“Passing the bill will have no effect on improving cybersecurity,” said Alan Paller, director of research for the SANS Institute. “That’s been demonstrated each time sharing legislation has been passed. The cost to companies of disclosing their failings is so great that they avoid it even if there is a major benefit to them of learning about other peoples’ failings.”

Cyberattacks have affected an increasing number of Americans who shop at Target, use Anthem medical insurance or saw doctors at medical centers at the University of California, Los Angeles.

More than 21 million Americans recently had their personal information stolen when the Office of Personnel Management was hacked in what that the U.S. believes was a Chinese espionage operation.

Sen. John McCain, R-Az., chairman of the Senate Committee on Armed Services, called the bill’s passage an important first step. He noted that in the past year the United States has been attacked in cyberspace by Iran, North Korea, China and Russia and that there had been attacks against the Joint Chiefs of Staff, the Pentagon, OPM and an email hacking of the director of the Central Intelligence Agency.

The U.S. and the technology industry already operate groups intended to improve sharing of information among the government and businesses, including the Homeland Security Department’s U.S. Computer Emergency Readiness Team.

Reference: Associated Press. (October 28, 2015). Retrieved from http://www.foxnews.com/politics/2015/10/28/senate-passes-cybersecurity-bill-pushing-sharing-info-on-hacker-threats/