Author Archives: Ronni Edwards

Unknown's avatar

About Ronni Edwards

Cyber Forensics and Information Security Student, Class of 2018

Pictures Causing Your Identity To Be Stolen

A recent thing in news, is how taking pictures with either your hands up or having the peace sign up and your finger prints facing the camera can be a dangerous thing if you post them. Most people are out having fun with their friends and are taking a fun, simple photos but with the way the world is now you have to think twice before taking the picture or posting it.

If the lighting and focus is just right then the they hackers can easily recreate your finger prints as long as it 10 feet from the person. It is hard to believe that we have reached the point where we have to be worried about our finger prints being taken from a photo that is being posted. But as time keeps going on, we need to be aware of these things and we need to be aware that these problems do exist and we all need to second guess before taking and posting pictures.

 

Tips to Get Through Finals Week

As we get through the last day of classes; there is only two things that are on our minds. Finals and summer, but before we can think of summer there’s the finals to tackle. While finals cause some major stress and overwhelm us, here are some tips to do while we enter into this week:

  1. Study, study study!
  2. Create a study schedule.
  3. Priority your study time.
  4. Color code your notes.
  5. Take study breaks, go for a walk, play volleyball, etc,.
  6. Make sure you get plenty of water and food in your body.
  7. Get plenty of sleep; lack of sleep can cause you to not do well.
  8. RELAX!Remember that no one is perfect but if you truly give it all you’ve got and study hard, finals week seems a little less stressful whenever you follow these tips. Good luck everyone and have a great summer! Congratulations to all the seniors who are graduating this year!

Risk Assessment for TEKsystems

Top Three Skills:
1) Conduct Information Risk Assessments as assigned to the team. Request and analyze documentation necessary to perform appropriate assessment and conduct necessary interviews in order to collect and review relevant materials necessary to produce results of the assessment.
2) Clearly and concisely document and communicate risk assessment results with requestor, security architects and management, as appropriate. (Be able to be that liason between the business and technical people).
3) Conduct and formulate appropriate risk scoring, as it relates to threat, vulnerability, likelihood, impact, security controls/counter-measures, etc. (Rank risk/inherent risk score).

Looking for an individual to come in with an information security background to look at documentation, review findings, and write risk assessments. This person will act as the liason between technical people and the business as they analyze data and rank risk based on their findings. Preferred knowledge of the HITRUST framework is encouraged, not required.

Qualifications:
1) Ability to communicate with technical and non-technical people.
Apply to Brian Jendesky at bjendesk@TEKsystems.com

Summer IT Intern for Consol Energy Inc.

Position Summary:
Interns at CONSOL Energy take ownership of meaningful projects that deliver significant results for both the employee and the company. They have the opportunity to gain vast amounts of experience and directly impact the company by designing and implementing projects. During the summer term, interns will be assigned a mentor, be part of our interdisciplinary teams, and have access to state-of-the-art
technology through top end hardware and software.

Examples of Summer Projects may include:
– Exposure to environmental data (quality control & management).
– Organize and coordinate the improvement of the pre/post drill data system.

The project that the candidate will be working on is combining databases for the Environmental department utilizing a vendor provided software package. The database is used for tracking safety incidents, maintaining audit reports, user queries and other functions.

Qualifications:
– Education Level: working toward a BS or MS degree
– Major: All STEM related majors (Ex. Chemical, Environmental, Safety, etc.)
– Students must maintain at least a 3.0 overall GPA.
– Have authorization to work for any employer in the U.S. on a full-time, indefinite basis without need for sponsorship now or in the future.
This is a paid internship for those that are interested in applying, please forward your resume to Jamie Pierce at jamiepierce@consolenergy.com

Cats Being Used in the IT Field

In this year’s Def Con convention this year showcase had a different twist on IT work. One that merged animals and IT working together. It sounds like a crazy combination and a highly unlikely one that would work well but it did. Gene Bransfield used his friend’s cat, he put on the cat’s color a kit that had Spark Core Wi-Fi development board and had Internet connectivity where ever the cat ended up going.

Now this may sound stupid because cats are going to wander around and do whatever they want to do. But the purpose of the experiment was to see how many people had unsecured, or weak Wi-Fi in their homes. In simple terms who could easily access their Internet just from being on their street.

When the cat was sent out, there was 23 Wi-Fi hotspots found and what they found was more interesting. Four of the networks had been completely open with no security what so ever and four using WEP rather than the WPA-2 standard. The purpose of this was to show that people need to be more aware of the fact that when it comes to Internet you have to have the right safety and protective measures when using the Internet. You never know when a cat or dog with a pack on them will be lurking around to see if you have secure Internet.

Microsoft Dynamics AX Internship with SYCOR America

SYCOR AMERICAS Inc. is a part of the Sycor Group, a leading full-range IT service provider with 23 locations worldwide. Our core business is the implementation and operation of industry-oriented Microsoft Dynamics solutions. As one of the world’s largest Microsoft Dynamics service providers and a Microsoft Gold Certified Partner, we offer development opportunities in a growing work environment. As we continue to expand our business in North America, we are looking for highly motivated interns who are interested in working in a fast growing IT sector.

Position open to currently enrolled Juniors, Seniors or recent graduates. Opportunity to turn into a full time position upon completion of internship. Duration and timeline of internship to be determined on an individual basis. We look forward to hearing from you!

Your responsibilities:
• Learn the ins and outs of an ERP System
• Learn basics about how a Microsoft Dynamics AX Solution is developed and implemented
• Learn about our standard processes for sales and project administration
• The Microsoft Sure Step project methodology will be emphasized
• Goal of the internship – ability to post standard processes within a Microsoft Dynamics AX & CRM solution
Qualifications:
• Understanding of business processes
• High interest in IT
• Proficient in Microsoft Office
• Strong communication and interpersonal skills
• Strong analytical and process design skills
• Highly motivated self-starters
• Able to work independently as well as in a team
• German language skills a plus
Please email cover letter and resume to darla.rosnack@sycoramericas.com (in Microsoft Word or PDF format) or by mail to SYCOR AMERICAS Inc., One Penn Center West, Suite 406, Pittsburgh PA 15276.For more information click the link:

IT Intern for Automated Health Systems

Automated Health Systems currently has an Information Sciences internship opportunity (i.e., 10-12 weeks) for Summer 2017.

In this position, individuals will be involved in all steps in a software development lifecycle, including requirements analysis, design, development, testing, and deployment.

Individuals will be implementing business solutions using the latest Microsoft technology, including SQL Server, Visual Studio, C#, and ASP.NET.

Qualifications:
  • Individuals must possess the ability to contribute to software solutions in a team environment.
  • Excellent oral and written communication skills are required, plus the ability to apply a structured approach to software development.
  • Individuals must have the ability to work in a demanding environment, and be capable of quickly learning and applying new skills.

Interested candidates must be studying Information Sciences or related major. This position is located in Pittsburgh, PA. Compensation provided.

Application Instructions:
If interested in this opportunity, please submit resume and transcript with position title in the subject line to hr@automated-health.com or fax to (412) 367-1131.

IT Programmer/Analyst at Hussey Copper

Hussey Copper is looking for an IT Programmer/Analyst this summer to work closely with a senior level developer supporting our ERP business system (ROSS – GEMBASE/DML coding language, SQL Database, and Crystal Reporting). Become familiar with their standard methodologies, processes, policies, and assist with development.

• Confirm project requirements by reviewing the program objective, inputs, and output requirements with mentor.
• Define specifications that meet the desired requirements.
• Develop and implement functionality per the specifications.
• 25-30 hours per week schedule between 8am – 5pm.
• Internship Supervisor – IT Operations Manager (Brian McNamara)

Qualifications:
SKILLS AND QUALIFICATIONS:
• General programming skills
• Ability to analyze information for problem solving
• Software development and testing fundamentals
• Strong oral and written communication skills
• Personal commitment to working within a team environment

Apply through ColonialTRAK or to Jim Bish at jbish@husseycopper.com

 

Internship Opportunity – Spanish fluency National Cyber-Forensics & Training Alliance (NCFTA)

The National Cyber-Forensics & Training Alliance (NCFTA) are looking for a candidate who is fluent in the Spanish language. As an intern, you will work with a senior analyst on specific research and data collection using various tools and applications as well as proactive research in open sources. You will also engage in collaboration with NCFTA partners and peers and be expected to participate in program meetings.

Required Qualifications 
• Must be legally authorized to work in the United States and be eligible for a U.S. Government security clearance
• Major studies in areas of consideration: International Affairs/Politics/Relations; Intelligence/Security Studies; Computer Science; Information Security; Business Intelligence or related fields. Other majors are considered on a case by case basis.
• SPANISH FLUENCY REQUIRED – Excellent Verbal and Writing Communication Skills in the Spanish Language
• Minimum GPA of 3.0

To apply for this internship, please click on the link below.

https://www.myinterfase.com/rmu/Job/Detail/b2wvYUd1dDNiaGRZbjlZcG1TWGt5ZjlaUjZGc2lHYWY3NVB4Y21OQWdQST01

New Products Inviting Hackers to Get More of Your Information

In the beginning of February, the Top Secret Colonial officers hacked into a Furby Connect. Furby Connect is a children’s toy that is now on sale. These new Furbies have a new feature that has Bluetooth connection. While it seems like a cool new product it is product along with many other children’s toys and new appliances that are putting your personal life into danger.

Most people do not realize that having that having all these products hooked up to Wi-Fi and Bluetooth connection is giving anyone access basically into your home. While these new children’s toys may be convenient and easy to keep your child entertained. They keep all this information stored every time it is being used. Hackers can end up getting your mailing address, e-mail, internet history, your birthday and even the child’s birth date, video recordings and pictures of the child or anything else. It is kind of like giving your child a camera that is on record the whole time and tracks everything you do. It is just like your cell phones, they recommend wiping your whole phone once you are done with it. It is definitely something to think about while you are connecting any devices up to unsecured networks.