Ransomware Incident Preparations with Ethical Considerations and Command System Framework Proposal

Submitted by CAE Community on

Concerns with cyber-attacks in the form of ransomware are on the mind of many executives and leadership staff in all industries. Inaction is not an option, and approaching the topic with real, honest, and hard discussions will be valuable ahead of such a possible devastating experience. This research note aims to bring thoughtfulness to the topics of ethics in the role of cybersecurity when dealing with ransomware events.

How Build Large Student Cyber Clubs

Submitted by CAE Community on

Western Governors University (WGU) never had a club until 2020. Our Club went from 0 to 3,500 students in the first year. Currently We have 5,500 in our student club and 2,500 in our Alumni Club. In ten minutes I can provide an overview of how to build a robust club that helps students learn, network and prosper in today’s educational landscape.

A Slice of Raspberry Pi Dessert for GenCyber Teachers

Submitted by CAE Community on

This submission will be a 15 minute overview of a post-GenCyber Teacher Camp activity that provided guidance to teachers for a focused Raspberry PI project for their high school students. The project included post-camp follow-on meetings for teachers to develop their skills and proficiency in using the Raspberry Pi to teach Linux concepts and cybersecurity tools.UMGC trained eight dedicated H.S. teachers who were committed to implementing the project in their schools. All teachers had varying successes and challenges.

Computer Forensics Teaching Resources

Submitted by CAE Community on

The Computer Forensics Teaching Resources Workshop is designed to share our experience teaching CECS 7235 Computer Forensics and CECS 7237 Advanced Computer Forensics to Computer Science graduate students at Politechnic University of Puerto Rico over the last decade. We will begin with a brief overview discussing the relationship between Computer Forensics and Cyber Defense and our Computer Forensics Graduate Certificate Program. We will then describe the teaching resources that we are using in our courses with an emphasis on hands-on laboratory experience.

Mininet as a Networking Tool for Simulating 4 Different Cyber Attacks: Experimental Results

Submitted by CAE Community on

Software Defined Network (SDN) is a programmable network that separates the network data plane from the control plane. However, lots of security threats and issues are concerned in software defined network. In this work, in order to reasonably complete the cyber attack situation evaluation in the SDNs, we proposed a cyber attack situation evaluating method based on multi-dimensional features analysis in SDNs. Cyber attack detection features were considered and improved their computation methods about four typical cyber attacks in SDN.

Colorado’s Cybersecurity Educational Diversity Initiative (CEDI): Urban/Rural HSIs & the Wild West

Submitted by CAE Community on

Funded by the NCAE-C Cybersecurity Education Diversity Initiative (CEDI), our presentation describes a two-year collaboration between a large urban Colorado HSI and a small rural Colorado HSI. The cybersecurity program at Colorado’s newest CAE designated university, MSU Denver, is growing rapidly with a new Cyber Range. In addition, MSU Denver also offers BS and MS degrees in CYB and is quickly becoming an established cybersecurity program with the Mountain West region.

Program of Study Validation: Cybersecurity Concentration at FDU

Submitted by CAE Community on

Fairleigh Dickinson University once again got designated as a National Center of Academic Excellence in Cyber Defense through the academic year 2026. During the process, NSA and a committee of academic peers has validated FDU’s BSCS with Cybersecurity Concentration offered at FDU’s Florham Campus through academic year 2026. At FDU, we have managed to achieve our goals after two years of extensive work on several Program of Study validation project activities involving planning, implementation and coordinating efforts that started in the year of 2019.

Towards a Rigorous Approach for Zero Trust in the 5G Core

Submitted by CAE Community on

By combining technologies such as Network Function Virtualization and Service-Based Architecture with decentralized and cloud deployments, the fifth generation of cellular networks (5G) aims for unprecedented Quality of Service, and use-cases in smart industry, emergency operations, remote medicine, and more. The increased attack surface introduced by this transition as well as the critical nature of the 5G communications require, more than ever before, a rigorous analysis of 5G security.

Subscribe to Presentations