<?xml version="1.0"?>
<News hasArchived="false" page="47" pageCount="49" pageSize="10" timestamp="Tue, 28 Apr 2026 20:41:49 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?page=47&amp;tag=cybersecurity">
  <NewsItem contentIssues="false" id="10079" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/10079">
    <Title>Summer research in cybersecurity and trustworthy systems</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p>The Team for Research in Ubiquitous Secure Technology (TRUST) will sponsor 20 undergraduate students from diverse backgrounds and cultures, to participate in the Summer Undergraduate Research Experience located at TRUST partner campuses: UC Berkeley, Cornell University, Stanford University, Vanderbilt University.  These students will work with graduate student and faculty mentors throughout the summer performing research and supporting activities in the area of information technology and TRUST related topics. The program will run from June 3 to July 27, 2012 and provide room and board, a travel allowance and a $4,000 stipend.  Apply by February 17.  See the <a href="http://bit.ly/TREU12" rel="nofollow external" class="bo">flyer</a> for more information and the <a href="http://www.truststc.org/reu/" rel="nofollow external" class="bo">Trust REU</a> site for details and to apply.</p></div>
      ]]>
    </Body>
    <Summary>The Team for Research in Ubiquitous Secure Technology (TRUST) will sponsor 20 undergraduate students from diverse backgrounds and cultures, to participate in the Summer Undergraduate Research...</Summary>
    <Website>http://www.cs.umbc.edu/2011/11/summer-research-in-cybersecurity-and-trustworthy-systems/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/10079/guest@my.umbc.edu/65d0bcb583a54ecbda60b333dc0028a9/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Tag>undergraduate</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 09 Nov 2011 08:04:46 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="10253" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/10253">
  <Title>talk: Cyber Security Situation Awareness and Impact...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: talk: Cyber Security Situation Awareness and Impact Assessment, 10:30am Tue 11/8<p><img alt="" height="200" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/Cybersecurity_virus.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Cyber Security Situation Awareness and Impact Assessment:<br>
    	Issues, Models and Applications</span></p>
    <p><span>Dr. Gabriel Jakobson<br>
    	Altusys Corporation, Princeton NJ</span></p>
    <p><span>10:30-11:30am 8 November 2011, ITE 325</span></p>
    <p>Cyber attacks committed against IT networks and services have profound impact both on ongoing mission and future missions, whose operations are based on these networks and services. The attacks, by exploiting the vulnerabilities of the software assets can push their impact through Cyber Terrain – a dependency network of structural, spatial, functional and other domain-specific dependencies that exist among software assets and services, and reach the missions. In this presentation we will introduce a novel approach of assessing impact of cyber attacks on missions (business process) and describe the basic models and algorithms of the approach.</p>
    <p>Dr. <a href="http://www.altusystems.com/jakobson.html" rel="nofollow external" class="bo">Gabriel Jakobson</a> is the VP and Chief Scientist at <a href="http://www.altusystems.com/" rel="nofollow external" class="bo">Altusys Corp.</a>, a consulting firm specializing in the development of intelligent situation management technologies for defence and cyber security applications. During his more than 20 years tenure at Verizon he had increasing responsibilities of leading advanced database, expert systems, artificial intelligence, and telecommunication network management programs. He has authored (and co-authored) more than 100 technical papers and is principal author of 5 US patents in situation management and event correlation. He received PhD degree in Computer Science from the Institute of Cybernetics, Estonia. Dr. Jakobson holds the honorary degree of Doctor Honorius Causa from the Tallinn Technical University, Estonia, and is Distinguished IEEE Lecturer. Dr. Jakobson is the member of the Board of Governors of IEEE Communications Society, Director, IEEE ComSoc North America Region, co-chair of the Tactical Communications and Operations Technical Committee of IEEE ComSoc, chair of the IEEE ComSoc Sub-Committee on Situation Management.</p>
    <p>Host: Anupam Joshi</p></div>
]]>
  </Body>
  <Summary>Full Title: talk: Cyber Security Situation Awareness and Impact Assessment, 10:30am Tue 11/8    Cyber Security Situation Awareness and Impact Assessment:   Issues, Models and Applications   Dr....</Summary>
  <Website>http://www.csee.umbc.edu/2011/11/talk-cyber-security-situation-awareness-and-impact-assessment-1030am-tue-118/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/10253/guest@my.umbc.edu/be8f29ff5545611457dcb17641ebb6b9/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 08 Nov 2011 08:12:36 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="10024" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/10024">
  <Title>talk: Cyber Security Situation Awareness and Impact...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: talk: Cyber Security Situation Awareness and Impact Assessment, 10:30am Tue 11/8<p><img alt="" height="200" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/Cybersecurity_virus.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Cyber Security Situation Awareness and Impact Assessment:<br>
    	Issues, Models and Applications</span></p>
    <p><span>Dr. Gabriel Jakobson<br>
    	Altusys Corporation, Princeton NJ</span></p>
    <p><span>10:30-11:30am 8 November 2011, ITE 325</span></p>
    <p>Cyber attacks committed against IT networks and services have profound impact both on ongoing mission and future missions, whose operations are based on these networks and services. The attacks, by exploiting the vulnerabilities of the software assets can push their impact through Cyber Terrain – a dependency network of structural, spatial, functional and other domain-specific dependencies that exist among software assets and services, and reach the missions. In this presentation we will introduce a novel approach of assessing impact of cyber attacks on missions (business process) and describe the basic models and algorithms of the approach.</p>
    <p>Dr. <a href="http://www.altusystems.com/jakobson.html" rel="nofollow external" class="bo">Gabriel Jakobson</a> is the VP and Chief Scientist at <a href="http://www.altusystems.com/" rel="nofollow external" class="bo">Altusys Corp.</a>, a consulting firm specializing in the development of intelligent situation management technologies for defence and cyber security applications. During his more than 20 years tenure at Verizon he had increasing responsibilities of leading advanced database, expert systems, artificial intelligence, and telecommunication network management programs. He has authored (and co-authored) more than 100 technical papers and is principal author of 5 US patents in situation management and event correlation. He received PhD degree in Computer Science from the Institute of Cybernetics, Estonia. Dr. Jakobson holds the honorary degree of Doctor Honorius Causa from the Tallinn Technical University, Estonia, and is Distinguished IEEE Lecturer. Dr. Jakobson is the member of the Board of Governors of IEEE Communications Society, Director, IEEE ComSoc North America Region, co-chair of the Tactical Communications and Operations Technical Committee of IEEE ComSoc, chair of the IEEE ComSoc Sub-Committee on Situation Management.</p>
    <p>Host: Anupam Joshi</p></div>
]]>
  </Body>
  <Summary>Full Title: talk: Cyber Security Situation Awareness and Impact Assessment, 10:30am Tue 11/8    Cyber Security Situation Awareness and Impact Assessment:   Issues, Models and Applications   Dr....</Summary>
  <Website>http://www.cs.umbc.edu/2011/11/talk-cyber-security-situation-awareness-and-impact-assessment-1030am-tue-118/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/10024/guest@my.umbc.edu/56399cf0fa99bc9203a579cea49d55ea/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 08 Nov 2011 08:12:36 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="9990" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/9990">
  <Title>Remotegrity: First Voter-Verifiable Internet Voting...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: Remotegrity: First Voter-Verifiable Internet Voting for Public Office<p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/11/scan.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Some of this text was adapted from a press release and a post from the </span><a href="https://scantegrity.org/blog/" rel="nofollow external" class="bo"><span>Scantegrity blog</span></a></p>
    <p>UMBC Professor <a href="http://en.wikipedia.org/wiki/Alan_Sherman" rel="nofollow external" class="bo">Alan Sherman</a>, UMBC alumnus Rick Carback (Ph.D. 2010) and many former and current UMBC students helped to develop <a href="https://scantegrity.org/" rel="nofollow external" class="bo">Scantegrity</a>, an an open source election verification technology for optical scan voting systems. In 2009, their Scantegrity II voting system was used in the election of the mayor and city council members of Takoma Park, Maryland. This was an historic first time any end-to-end voter verifiable voting system with ballot privacy has been used in a binding governmental election.</p>
    <p>This week, absentee voters in Takoma Park, Maryland will have the option to cast their votes for mayor and city council using a new Internet voting system called <a href="http://scantegrity.org/wiki/index.php/Remotegrity_Frequently_Asked_Questions#What_is_Remotegrity.3F" rel="nofollow external" class="bo">Remotegrity</a> which uses the same approach of generating privacy preserving confirmation numbers that allow each voter to verify her vote is counted and anyone to verify that all the votes were counted correctly.  Dr. Carback has played a significant role in helping Takoma Park adopt and use Scantegrity and Remotegrity in the municipal elections.</p>
    <div class="embed-container"><iframe src="http://www.youtube.com/embed/2A70v_uLYxY" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div>
    <p>Internet voting has been used to elect government officials before (for example, in Switzerland, Estonia, and Norway), but what is new here is that voters mail in paper ballots and use the Internet to independently verify that their votes have been received by the city and recorded correctly. Anyone can check online that the recorded votes were tallied correctly.</p>
    <p>Dr. Filip Zagorski, computer scientist at The George Washington University, explains ÒThrough the hybrid use of paper ballots and Internet verification, Remotegrity combines the best of both worlds to provide a very high degree of security even against malware and insider attack.Ó Portions of the underlying research in cryptography and secure server design were supported by the National Science Foundation and the Polish Ministry of Science and Higher Education.</p>
    <p>Voters who have requested to vote by mail receive a ballot which they mark and mail in, but they can also verify their vote on-line in the Remotegrity system, without revealing how they voted. In future elections, the same online procedure may cast votes and physical mailing of paper ballots may be optional or omitted.</p>
    <p>The city will also use the Scantegrity voting system for voters who cast their ballot in person, as it did in 2009. The integrated Scantegrity and Remotegrity systems offer full end-to-end voter-verifiability, in which voters casting ballots from home or in person can verify that their votes were correctly cast, collected, and counted.</p>
    <p>Additionally, this year, the city will provide an audio interface for marking ballots. The interface, named Audiotegrity, developed by researchers at The George Washington University, will enable voters with difficulty marking paper ballots to mark ballots independently using an electronic interface. Mr. Noel Runyan, a usability and accessibility expert, provided pro bono design advice to the Audiotegrity team.</p>
    <p>With a grant from the federal Election Assistance Commission, and support from the non-profit Voting Systems Institute, researchers from UMBC will survey voters and election officials as well as conduct focus groups around their experiences using these new voting systems.</p>
    <p>For more information, see the recent paper by UMBC Ph.D. alumnus Rick Carback et al., <a href="http://www.usenix.org/events/sec10/tech/full_papers/Carback.pdf" rel="nofollow external" class="bo">Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy</a>, or contact Professor <a href="http://www.cs.umbc.edu/~sherman/" rel="nofollow external" class="bo">Alan Sherman</a>.</p></div>
]]>
  </Body>
  <Summary>Full Title: Remotegrity: First Voter-Verifiable Internet Voting for Public Office    Some of this text was adapted from a press release and a post from the Scantegrity blog   UMBC Professor Alan...</Summary>
  <Website>http://www.cs.umbc.edu/2011/11/remotegrity-first-voter-verifiable-internet-voting-for-public-office/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/9990/guest@my.umbc.edu/5a53db92c4f8f1680e1ae8044f9e6751/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>sherman</Tag>
  <Tag>voting</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 06 Nov 2011 08:44:45 -0500</PostedAt>
  <EditAt>Sun, 06 Nov 2011 08:44:45 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="10255" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/10255">
  <Title>Remotegrity: First Voter-Verifiable Internet Voting...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: Remotegrity: First Voter-Verifiable Internet Voting for Public Office<p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/11/scan.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Some of this text was adapted from a press release and a post from the </span><a href="https://scantegrity.org/blog/" rel="nofollow external" class="bo"><span>Scantegrity blog</span></a></p>
    <p>UMBC Professor <a href="http://en.wikipedia.org/wiki/Alan_Sherman" rel="nofollow external" class="bo">Alan Sherman</a>, UMBC alumnus Rick Carback (Ph.D. 2010) and many former and current UMBC students helped to develop <a href="https://scantegrity.org/" rel="nofollow external" class="bo">Scantegrity</a>, an an open source election verification technology for optical scan voting systems. In 2009, their Scantegrity II voting system was used in the election of the mayor and city council members of Takoma Park, Maryland. This was an historic first time any end-to-end voter verifiable voting system with ballot privacy has been used in a binding governmental election.</p>
    <p>This week, absentee voters in Takoma Park, Maryland will have the option to cast their votes for mayor and city council using a new Internet voting system called <a href="http://scantegrity.org/wiki/index.php/Remotegrity_Frequently_Asked_Questions#What_is_Remotegrity.3F" rel="nofollow external" class="bo">Remotegrity</a> which uses the same approach of generating privacy preserving confirmation numbers that allow each voter to verify her vote is counted and anyone to verify that all the votes were counted correctly.  Dr. Carback has played a significant role in helping Takoma Park adopt and use Scantegrity and Remotegrity in the municipal elections.</p>
    <div class="embed-container"><iframe src="http://www.youtube.com/embed/2A70v_uLYxY" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div>
    <p>Internet voting has been used to elect government officials before (for example, in Switzerland, Estonia, and Norway), but what is new here is that voters mail in paper ballots and use the Internet to independently verify that their votes have been received by the city and recorded correctly. Anyone can check online that the recorded votes were tallied correctly.</p>
    <p>Dr. Filip Zagorski, computer scientist at The George Washington University, explains ÒThrough the hybrid use of paper ballots and Internet verification, Remotegrity combines the best of both worlds to provide a very high degree of security even against malware and insider attack.Ó Portions of the underlying research in cryptography and secure server design were supported by the National Science Foundation and the Polish Ministry of Science and Higher Education.</p>
    <p>Voters who have requested to vote by mail receive a ballot which they mark and mail in, but they can also verify their vote on-line in the Remotegrity system, without revealing how they voted. In future elections, the same online procedure may cast votes and physical mailing of paper ballots may be optional or omitted.</p>
    <p>The city will also use the Scantegrity voting system for voters who cast their ballot in person, as it did in 2009. The integrated Scantegrity and Remotegrity systems offer full end-to-end voter-verifiability, in which voters casting ballots from home or in person can verify that their votes were correctly cast, collected, and counted.</p>
    <p>Additionally, this year, the city will provide an audio interface for marking ballots. The interface, named Audiotegrity, developed by researchers at The George Washington University, will enable voters with difficulty marking paper ballots to mark ballots independently using an electronic interface. Mr. Noel Runyan, a usability and accessibility expert, provided pro bono design advice to the Audiotegrity team.</p>
    <p>With a grant from the federal Election Assistance Commission, and support from the non-profit Voting Systems Institute, researchers from UMBC will survey voters and election officials as well as conduct focus groups around their experiences using these new voting systems.</p>
    <p>For more information, see the recent paper by UMBC Ph.D. alumnus Rick Carback et al., <a href="http://www.usenix.org/events/sec10/tech/full_papers/Carback.pdf" rel="nofollow external" class="bo">Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy</a>, or contact Professor <a href="http://www.cs.umbc.edu/~sherman/" rel="nofollow external" class="bo">Alan Sherman</a>.</p></div>
]]>
  </Body>
  <Summary>Full Title: Remotegrity: First Voter-Verifiable Internet Voting for Public Office    Some of this text was adapted from a press release and a post from the Scantegrity blog   UMBC Professor Alan...</Summary>
  <Website>http://www.csee.umbc.edu/2011/11/remotegrity-first-voter-verifiable-internet-voting-for-public-office/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/10255/guest@my.umbc.edu/c3d320cb95a04df5c027c7bab535c74a/api/pixel</TrackingUrl>
  <Tag>alumni</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>sherman</Tag>
  <Tag>voting</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 06 Nov 2011 08:44:45 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="9554" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/9554">
  <Title>October is National Cybersecurity Awareness Month</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img src="http://www.cs.umbc.edu/wp-content/uploads/2011/10/ncsam2011.jpg" style="max-width: 100%; height: auto;"></p>
    <p>This October is the the eighth annual <a href="http://www.dhs.gov/files/programs/gc_1158611596104.shtm" rel="nofollow external" class="bo">National Cyber Security Awareness Month</a> sponsored by the Department of Homeland Security in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center.</p>
    <p>According to the DHS, cyber threats present some of the most serious economic and national security challenges we face, not just in the United States, but throughout the world. Everyone who uses the Internet has a role to play in helping to secure it and thus enhance the safety for themselves and their families online.</p>
    <p>See the DHS National Cyber Security Awareness Month <a href="http://www.dhs.gov/files/programs/gc_1158611596104.shtm" rel="nofollow external" class="bo">site</a> for more information, including suggestions for what you can do.</p></div>
]]>
  </Body>
  <Summary>This October is the the eighth annual National Cyber Security Awareness Month sponsored by the Department of Homeland Security in cooperation with the National Cyber Security Alliance and the...</Summary>
  <Website>http://www.cs.umbc.edu/2011/10/october-is-national-cybersecurity-awareness-month/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/9554/guest@my.umbc.edu/db729e6b72b91dce860ee0b99ab83aa9/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>6</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 15 Oct 2011 11:15:33 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="9398" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/9398">
    <Title>Maryland Cyber Challenge and Conference</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img height="135" src="http://www.cs.umbc.edu/wp-content/uploads/2011/10/mdc3.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p>The <a href="http://www.mdc3.org/" rel="nofollow external" class="bo">Maryland Cyber Challenge &amp; Conference</a> (MDC3) will be held on Friday and Saturday, October 21-22 at the Baltimore Convention Center. See the Web site for the <a href="http://www.mdc3.org/files/MDC3_Schedule_10-7-11.pdf" rel="nofollow external" class="bo">schedule</a> and to <a href="http://www.mdc3.org/registration.html" rel="nofollow external" class="bo">register</a>.
          </p><p>The MDC3 is open to anyone who’s interested in advancing, studying or working in the field of cybersecurity, including IT and cybersecurity professionals, corporate and government leaders, college and high school students, teachers, administrators and parents and cyber enthusiasts.</p>
          <p>The MDC3 cyber challenge gives teams of high school students, college and university students, and professionals the opportunity to learn more about cybersecurity and develop practical skills for defending computers while competing for scholarships in a fun environment. The MDC3 conference features government and industry leaders, breakout sessions and cyber innovation exhibits for an audience of students, parents and professionals from academia, industry and government.</p>
          <p>MDC3 was founded by Science Applications International Corporation and the University of Maryland, Baltimore County in partnership with the Department of Business &amp; Economic Development, the Tech Council of Maryland and the National Cyber Security Alliance with the goal of encouraging Maryland students and young professionals to pursue education and careers in cybersecurity.</p></div>
      ]]>
    </Body>
    <Summary>The Maryland Cyber Challenge &amp; Conference (MDC3) will be held on Friday and Saturday, October 21-22 at the Baltimore Convention Center. See the Web site for the schedule and to register.   The...</Summary>
    <Website>http://www.cs.umbc.edu/2011/10/maryland-cyber-challenge-and-conference-2/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/9398/guest@my.umbc.edu/714133f397b0e0fb62cade561ff51557/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>events</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 11 Oct 2011 01:04:04 -0400</PostedAt>
    <EditAt>Tue, 11 Oct 2011 01:04:04 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="9291" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/9291">
  <Title>An Evening With General Michael Hayden, USAF (Ret.),...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: An Evening With General Michael Hayden, USAF (Ret.), 6pm 10/27, ITE 102<p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/10/hayden-1.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Cybersecurity Guest Lecture</span></p>
    <p><span>An Evening With General Michael Hayden, USAF (Ret.)</span></p>
    <p><span>6:00-8:00pm Thursday, 27 Oct. 2011<br>
    	Room 102, Information Technology and Engineering</span></p>
    <p>UMBC is proud to announce this opportunity for students and faculty to meet with General Hayden to hear his perspectives and discuss current issues regarding cybersecurity. The evening is sponsored by <a href="http://www.nextcentury.com/" rel="nofollow external" class="bo">Next Century Corporation</a>.</p>
    <p>Former NSA and CIA director General Michael Hayden will discuss the evolution of technology from World War II to the present and outline the challenges this evolution presents to national security organizations. He will address the timely issues of cybersecurity and cyberwarfare, stress the role of education in preparing the intelligence community workforce to deal with cyber concerns, and share anecdotal stories of his time as Director of both the CIA and NSA in meeting these challenges facing the nation. General Hayden is happy to answer questions and make this an engaging, informative, and interactive evening.</p>
    <p>Refreshments will be furnished by Next Century Corporation.</p>
    <p>RSVP REQUIRED: Space is limited, with preference given to graduate CYBR, CSEE, and IS students and faculty. Please RSVP to Allison Jones (Sorry, you need javascript to view this email address. ) by October 25th if you plan to attend.</p>
    <p><a href="http://en.wikipedia.org/wiki/Michael_Hayden_(general)" rel="nofollow external" class="bo">General Michael Hayden</a>, USAF (Ret.), served as Director of the Central Intelligence Agency and the National Security Agency and was the nation’s first Principal Deputy Director of National Intelligence. He retired from the CIA in February 2009, and is now a Principal in the Chertoff Group, a security consultancy co-founded by former Secretary of Homeland Security, Michael Chertoff. General Hayden also serves as a Distinguished Visiting Professor at George Mason University School of Public Policy and in an advisory capacity to several organizations focused on national security.</p>
    <p>General Hayden retired from a distinguished thirty-nine year career in the United States Air Force on July 1, 2008. In addition to his senior intelligence community assignments, he served as Commander of the Air Intelligence Agency, Director of the Joint Command and Control Warfare Center, and Chief of the Central Security Service.</p>
    <p>General Hayden graduated from Duquesne University with a Bachelor’s degree in history in 1967 and a Master’s degree in modern American history in 1969.</p></div>
]]>
  </Body>
  <Summary>Full Title: An Evening With General Michael Hayden, USAF (Ret.), 6pm 10/27, ITE 102    Cybersecurity Guest Lecture   An Evening With General Michael Hayden, USAF (Ret.)   6:00-8:00pm Thursday, 27...</Summary>
  <Website>http://www.cs.umbc.edu/2011/10/an-evening-with-general-michael-hayden-usaf-ret-6pm-1027-ite-102/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/9291/guest@my.umbc.edu/ce99f39cbb712cc7c69091f1eb3eba97/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>3</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 06 Oct 2011 16:26:05 -0400</PostedAt>
  <EditAt>Thu, 06 Oct 2011 16:26:05 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="9001" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/9001">
  <Title>Take the NSA Cryptochallenge, 11-5 Friday 9/30, The Commons</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/09/crytochallenge.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>NSA will be at the Commons for this year's CryptoChallenge competition. Stop by and test your skills against their cryptographic brain teasers and maybe score some great giveaways. Join them for some friendly competition from 11:00am to 5:00pm on Friday 30 September at the Commons Outside Terrace or Main Street if it rains.</p>
    <p>Bring your resume — NSA recruiters will be on hand to discuss career opportunities for the best codemakers and codebreakers in the business. You can hone your cryptographic skills before the event by downloading the free <a href="http://itunes.apple.com/mu/app/nsa-cryptochallenge/id459247045" rel="nofollow external" class="bo">NSA CryptoChallenge</a> from the Apple App Store for iPhone, iPod touch and iPad.</p>
    <p>NSA CryptoChallenge is a game that tests your pattern recognition skills through a series of cryptographs. Your mission is to decipher encrypted quotes, factoids, historical events and more. It’s you against the clock to see how fast you can crack the code. Or, you can challenge a friend with the multiplayer interface. In that instance, it's a one-on-one race to see who can correctly solve the puzzle first.</p>
    <p>NSA executes some of the nation’s most important and sensitive intelligence operations. To help us accomplish our mission, we’re looking for the best and the brightest problem solvers to join our team. If you can solve these puzzles, you just might have what it takes to help NSA keep America safe.</p></div>
]]>
  </Body>
  <Summary>NSA will be at the Commons for this year's CryptoChallenge competition. Stop by and test your skills against their cryptographic brain teasers and maybe score some great giveaways. Join them for...</Summary>
  <Website>http://www.cs.umbc.edu/2011/09/take-the-nsa-cryptochallenge-11-5-friday-930-the-commons/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/9001/guest@my.umbc.edu/582b747814969ead223cd4706a94a538/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>events</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>4</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Mon, 26 Sep 2011 18:29:42 -0400</PostedAt>
  <EditAt>Mon, 26 Sep 2011 18:29:42 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="8834" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/8834">
    <Title>Modern Threat Environment and the Impact of...</Title>
    <Body>
      <![CDATA[
          <div class="html-content">Full Title: Modern Threat Environment and the Impact of Technology Shifts<p><img src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/cyber_threats.jpg" style="max-width: 100%; height: auto;"></p>
          <p><span>Cybersecurity Lecture</span></p>
          <p><span>Modern Threat Environment and the Impact of Technology Shifts</span></p>
          <p><span>Neal Ziring<br>
          	Information Assurance Technical Director<br>
          	National Security Agency</span></p>
          <p><span>6-7pm Tuesday 20 September 2011 in ITE 102 (LH 8)</span></p>
          <p>Neal Ziring will give a special guest lecture in CYBR620 (Introduction to Cybersecurity) on the modern threat environment and the impact of shifts in technology, such as the move from IPv4 to IPv6 and the security of systems and networks topics.</p>
          <p>Mr. Neal Ziring is currently a technical director in the Information Assurance Directorate (IAD), at NSA. The IAD provides cryptographic, network, and operational security products and services to protect and defend national security systems. Prior to his role at the IAD level, Neal with a technical director for the Vulnerability Analysis and Operations Group, which provides technology evaluations, defensive operations, and secure configuration guidance for the DoD and the IC. During that time, Neal also served as security architect for two major NSA mission systems programs, collaborated with NIST on the Security Content Automation Protocol (S-CAP) specifications, and lead analysis efforts for Cloud Computing technology and IPv6. Neal has degrees in Computer Science and Electrical Engineering from Washington University. Before coming to NSA in 1989, he worked at AT&amp;T Bell Labs.</p></div>
      ]]>
    </Body>
    <Summary>Full Title: Modern Threat Environment and the Impact of Technology Shifts    Cybersecurity Lecture   Modern Threat Environment and the Impact of Technology Shifts   Neal Ziring   Information...</Summary>
    <Website>http://www.cs.umbc.edu/2011/09/modern-threat-environment-and-the-impact-of-technology-shifts/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/8834/guest@my.umbc.edu/98b24307cdbff1ffcda7953dd0b9a496/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Mon, 19 Sep 2011 23:27:57 -0400</PostedAt>
  </NewsItem>
</News>
