<?xml version="1.0"?>
<News hasArchived="false" page="49" pageCount="49" pageSize="10" timestamp="Tue, 28 Apr 2026 07:16:10 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?page=49&amp;tag=cybersecurity">
  <NewsItem contentIssues="true" id="7249" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/7249">
  <Title>PhD defense: Wenjia Li on Securing Mobile Ad Hoc Networks</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/06/3238083892_4b1211a2d2_o.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Ph.D. Dissertation Defense</span></p>
    <p><span>A Security Framework to Cope With<br>
    	Node Misbehaviors in Mobile Ad Hoc Networks</span></p>
    <p><span>Wenjia Li</span></p>
    <p><span>11:00am Tuesday, 14 June 2011, ITE 325b</span></p>
    <p>A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally composed of a dynamic set of cooperative peers. These peers share their wireless transmission power with other peers so that indirect communication can be possible between nodes that are not in the radio range of each other . The nature of MANETs, such as node mobility, unreliable transmission medium and restricted battery power, makes them extremely vulnerable to a variety of node misbehaviors. Wireless links, for instance, are generally prone to both passive eavesdropping and active intrusion. Another security concern in ad hoc networks is caused by the cooperative nature of the nodes. Attacks from external adversaries may disturb communications, but the external intruder generally cannot directly participate in the cooperative activities among the nodes because they do not possess the proper secure credentials, such as shared keys. However, compromised nodes, which are taken over by an adversary, are capable of presenting the proper secure credentials, and consequently can interfere with almost all of the network operations, including route discovery, key management and distribution, and packet forwarding. Hence, it is essential to cope with node misbehaviors so as to secure mobile ad hoc networks.</p>
    <p>In this dissertation, we address the question of how to ensure that a MANET will properly operate despite the presence of various node misbehaviors by building a holistic framework that can cope with various node misbehaviors in an intelligent and adaptive manner. The main purpose of this framework is to provide a platform so that the components that identify and respond to misbehaviors can better cooperate with each other and quickly adapt to the changes of network context. Therefore, policies are utilized in our framework in order to make those components correctly function in different network contexts. Besides the policy component, there are three other components, which fulfill the tasks of misbehavior detection, trust management, and context awareness, respectively. To validate and evaluate our proposed framework, we implement our framework based on a simulator.</p>
    <p>The specific contributions of this dissertation are: (i) Develop a framework to combine the functionalities of surveillance and detection of misbehavior, trust management, context awareness, and policy management to provide a high-level solution to cope with various misbehaviors in MANETs in an intelligent and adaptive manner; (ii) Utilize the outlier detection technique as well as the Support Vector Machine (SVM) algorithm to detect node misbehaviors, and both techniques do not require a pre-defined fix threshold for misbehavior detection; (iii) Trust is modeled in a vector instead of a single scalar so that it can reflect the trustworthiness of a node in a more accurate manner; (iv) Sense and record various contextual information, such as network status (channel busy/idle, etc.), node status (transmission buffer full/empty, battery full/low, etc.) and environmental factors (altitude, velocity, temperature, weather condition, etc.), so that we can distinguish truly malicious behaviors from faulty behaviors and also more accurately evaluate nodes' trust; (v) Specify and enforce policies in the proposed framework, which makes the framework promptly adapt to the rapidly changing network context.</p>
    <p>Committee:</p>
    <ul>
    <li>Dr. Anupam Joshi (Chair)</li>
    <li>Dr. Tim Finin</li>
    <li>Dr. Yelena Yesha</li>
    <li>Dr. Yun Peng</li>
    <li>Dr. Lalana Kagal (MIT CSAIL)</li>
    </ul></div>
]]>
  </Body>
  <Summary>Ph.D. Dissertation Defense   A Security Framework to Cope With   Node Misbehaviors in Mobile Ad Hoc Networks   Wenjia Li   11:00am Tuesday, 14 June 2011, ITE 325b   A Mobile Ad-hoc NETwork (MANET)...</Summary>
  <Website>http://www.cs.umbc.edu/2011/06/phd-defense-wenjia-li-on-securing-mobile-ad-hoc-networks/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/7249/guest@my.umbc.edu/2eb6d4a8d82ccd20c18cdab28aabbc72/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>graduate</Tag>
  <Tag>manet</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>security</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>10</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Sun, 12 Jun 2011 11:22:00 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="6956" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/6956">
    <Title>Cybersecurity Webinar, 1pm Thur June 9</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img src="http://www.cs.umbc.edu/wp-content/uploads/2011/05/umbccybersecurity.jpg" alt="" width="700" height="111" style="max-width: 100%; height: auto;"></p>
          <p>Dr. Rick Forno will discuss UMBC’s Cybersecurity programs and give updated details about the upcoming Maryland Cyber Challenge at a <a href="http://gotomeeting.com/register/411450913" rel="nofollow external" class="bo">UMBC Cybersecurity Webinar</a> at 1:00pm on Thursday June 9.</p>
          <p>The webinar will describe the <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">UMBC Cybersecurity programs</a>, covering:</p>
          <ul>
          <li> Master of Professional Studies and graduate certificate program details</li>
          <li> Innovative curriculum highlights</li>
          <li> Convenient and flexible class schedules</li>
          <li> Opportunities for career development and professional advancement</li>
          </ul>
          <p>Dr. Forno will also discuss the <a href="http://www.saic.com/cyber-challenge/maryland.html" rel="nofollow external" class="bo">Maryland Cyber Challenge and Conference</a>:</p>
          <ul>
          <li>Participate in a competition to find Maryland’s best minds in Cybersecurity</li>
          <li>Details will be given about the October 2011 Baltimore Conference</li>
          <li>How to get involved as a sponsor or partner and promote cybersecurity in Maryland!</li>
          </ul>
          <p>The webinar is free but requires <a href="http://gotomeeting.com/register/411450913" rel="nofollow external" class="bo">registration</a>.</p></div>
      ]]>
    </Body>
    <Summary>Dr. Rick Forno will discuss UMBC’s Cybersecurity programs and give updated details about the upcoming Maryland Cyber Challenge at a UMBC Cybersecurity Webinar at 1:00pm on Thursday June 9.   The...</Summary>
    <Website>http://www.cs.umbc.edu/2011/05/cybersecurity-webinar-1pm-thur-june-9/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6956/guest@my.umbc.edu/a08ea8abaead73dff3116814ccee9958/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Mon, 16 May 2011 12:02:35 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="6506" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/6506">
    <Title>Maryland Cyber Conference and Challenge (MDC3)</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img alt="" height="200" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/Cybersecurity_virus.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p>The <a href="http://www.mdc3.org/" rel="nofollow external" class="bo">Maryland Cyber Challenge and Conference</a> site is up and student teams can now <a href="http://www.mdc3.org/registration.html" rel="nofollow external" class="bo">register</a> for the competition, with the first qualifying round early in September. It is a chance to demonstrate your ability to work in a team and your cybersecurity and problem solving skills.</p>
          <p>MDC3 is a joint effort between SAIC, UMBC, DBED, TCM and NCSA to bring people together to promote Maryland's commitment to cybersecurity and STEM education. The competition includes three levels: high school, collegiate and professionals from industry/government, providing opportunities to network with cybersecurity professionals, researchers, and scholars.</p>
          <p>There will be orientation sessions at the UMBC Technology Center (1450 South Rolling Rd., 21224) on May 2, May 18 and June 21 at 4:30pm for professionals and 6:00pm for students.</p></div>
      ]]>
    </Body>
    <Summary>The Maryland Cyber Challenge and Conference site is up and student teams can now register for the competition, with the first qualifying round early in September. It is a chance to demonstrate...</Summary>
    <Website>http://www.cs.umbc.edu/2011/04/maryland-cyber-conference-and-challenge-mdc3/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6506/guest@my.umbc.edu/3c7f48729256822f715e2fbe0c1bdbaa/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>computer-science</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>electrical-engineering</Tag>
    <Tag>events</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>undergraduate</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Wed, 20 Apr 2011 14:55:34 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="6445" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/6445">
  <Title>talk: Cybersecurity Threat is Real (new time: 10am)</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/cyber_threats.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><strong>The Threat is Real</strong></p>
    <p>Sherri Ramsay<br>
    	Director, NSA/CSS Threat Operations Center</p>
    <p>10:00am Friday 22 April 2011, 229 ITE</p>
    <p>Sherri Ramsay, the Director of the National Security Agency's National Threat Operations Center, will present an overview of contemporary issues in cybersecurity entitled "The Threat is Real". The NSA Threat Operations Center monitors the operations of the global network to identify network-based threats and protect U.S. and allied networks.</p>
    <p>Sherri Ramsay serves as the Director of the National Security Agency/Central Security Service Threat Operations Center, an organization operating under Signals Intelligence and Information Assurance authorities simultaneously to establish real-time global network awareness and threat characterization. Ms. Ramsay most recently served in the Information Assurance Directorate as Deputy Chief of the Vulnerability Analysis and Operations Group. She began her career at NSA as a computer programmer and served as a Software Acquisition Manager, System Acquisition Manager, and Program Manager for several large-scale programs. She spend a year of extensive leadership training, research and developmental assignments while participating in OPM’s Executive Potential Program.</p>
    <p>Ms. Ramsay graduated Magna Cum Laude with General Honors from the University of Georgia in 1977 with a Bachelor of Science degree majoring in Mathematics and Education. She graduated with Honors from the Johns Hopkins University in 1984 with a Masters Degree in Computer Science. In 1992, she graduated from OPM’s Executive Potential Program. She graduated in 1998 form the Industrial College of the Armed Forces, National Defense University, Ft. McNair, with a Mater’s Degree in National Resource Strategy. Prior to joining NSA, Ms. Ramsay taught high school mathematics. She received the NSA Meritorious Civilian Service Award in 1998 and 2000, the National Intelligence Meritorious Unit Citation in 1998, the Louis Tordella Award in 2003, and the Presidential Meritorious Executive Award in 2009.</p>
    <p>· <a href="http://www.cs.umbc.edu/about/visiting/" rel="nofollow external" class="bo">directions</a> · <a href="http://www.cs.umbc.edu/category/talks" rel="nofollow external" class="bo"> talks</a> · <a href="http://www.cs.umbc.edu/category/events" rel="nofollow external" class="bo"> events </a> ·</p></div>
]]>
  </Body>
  <Summary>The Threat is Real   Sherri Ramsay   Director, NSA/CSS Threat Operations Center   10:00am Friday 22 April 2011, 229 ITE   Sherri Ramsay, the Director of the National Security Agency's National...</Summary>
  <Website>http://www.cs.umbc.edu/2011/04/talk-the-cybersecurity-threat-is-real/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6445/guest@my.umbc.edu/c748d47a3a8f11b94e9e53c13821bd8f/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>6</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Sat, 16 Apr 2011 15:02:27 -0400</PostedAt>
  <EditAt>Sat, 16 Apr 2011 15:02:27 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="6142" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/6142">
    <Title>Cyber Defense Team meeting, Noon 4/4 ITE 325b</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img alt="cyberdawgs" height="180" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/keyboard-1.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p>The UMBC <a href="http://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyber Defense Team</a>, aka the Cyberdawgs, will host a technical briefing on Monday April 4 featuring two guest speakers from the DoD. The topic will be the cyber competitions between the service academies, and other cyber-related topics may come up as well. The meeting will be held in the CSEE conference room, ITE 325b, from Noon to 2:00pm.</p>
          <p>The Cyber Defense Team is a SGA recognized student organization whose members share a common interest in computer and network security and participating in cybersecurity competitions and events. It is open to everyone regardless of your major or current knowledge level. If you are interested in joining come to this meeting or any of the weekly meetings held on Monday's from Noon to 2:00pm. You can also subscribe to its mailing list by sending a message to Sorry, you need javascript to view this email address. </p></div>
      ]]>
    </Body>
    <Summary>The UMBC Cyber Defense Team, aka the Cyberdawgs, will host a technical briefing on Monday April 4 featuring two guest speakers from the DoD. The topic will be the cyber competitions between the...</Summary>
    <Website>http://www.cs.umbc.edu/2011/04/cyber-defense-team-meeting-noon-44-ite-325b/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6142/guest@my.umbc.edu/add62ad45e57764dcc8ba71853fee35c/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Tag>undergraduate</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>4</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Sat, 02 Apr 2011 10:45:33 -0400</PostedAt>
    <EditAt>Sat, 02 Apr 2011 10:45:33 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="6027" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/6027">
  <Title>Security-Enhanced Linux (SELinux) Tutorial, 4pm Fri 4/1 UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p>
    </p>
    <p><img alt="Security-Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies that help secure a computer running it against many kinds of attacks." src="http://www.cs.umbc.edu/wp-content/uploads/2011/03/network_cable2.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>UMBC Linux Users Group</h3>
    <h2>SELinux Talk and Tutorial</h2>
    <h2>David Quigley<br>
    	Advanced Engineering &amp; Development, Keyw Corporation</h2>
    <h3>4:00pm Friday, 1 April 2011<br>
    	Room 229 ITE, UMBC</h3>
    <p>Over a decade ago researchers at the National Information Assurance Research Lab at the NSA identified a need for flexible mandatory access controls to help provide a solid foundation for secure systems. This resulted in the development of the FLASK architecture, which has seen implementation in a number of operating systems. The most prominent implementation of FLASK is in the form of <a href="http://en.wikipedia.org/wiki/Security-Enhanced_Linux" rel="nofollow external" class="bo">SELinux</a>. Since the early days of SELinux adoption much work as been done to improve the utility and usability of SELinux. These enhancement have turned SELinux from a prototype research implementation into a robust access control mechanism that is used by a variety of customers world wide.</p>
    <p>This talk is a from the ground up journey through SELinux. It starts with why do we need this technology and then moves through where to obtain it, how it works, and how to identify and solve problems associated with SELinux. In addition to these basics the talk also covers slightly more advanced topics such as hot to construct policy for new applications and hot to address customizations particular to your deployments.</p>
    <p>David Quigley started his career as a Computer Systems Researcher for the National Information Assurance Research Lab at the NSA where he worked as a member of the SELinux team but has since left that position. David leads the design and implementation efforts to provide Labeled-NFS support for SELinux. David has previously contributed to the open source community through maintaining the Unionfs 1.0 code base and through code contributions to various other projects. David has presented at conferences such as the Ottawa Linux Symposium, the StorageSS workshop, LinuxCon and several local Linux User Group meetings where presentation topics have included storage, file systems, and security. David currently works as a Computer Science Professional for the Advanced Engineering and Development division at <a href="http://www.keywcorp.com/" rel="nofollow external" class="bo">Keyw Corporation</a>.</p>
    <p>This talk is sponsored by the <a href="http://lug.umbc.edu/" rel="nofollow external" class="bo">UMBC Linux Users' Group</a>.</p>
    <p>· <a href="http://www.cs.umbc.edu/about/visiting/" rel="nofollow external" class="bo">directions</a> · <a href="http://www.cs.umbc.edu/category/talks" rel="nofollow external" class="bo"> talks</a> · <a href="http://www.cs.umbc.edu/category/events" rel="nofollow external" class="bo"> events </a> ·</p></div>
]]>
  </Body>
  <Summary>UMBC Linux Users Group   SELinux Talk and Tutorial   David Quigley   Advanced Engineering &amp; Development, Keyw Corporation   4:00pm Friday, 1 April 2011   Room 229 ITE, UMBC   Over a decade ago...</Summary>
  <Website>http://www.cs.umbc.edu/2011/03/security-enhanced-linux-selinux-tutoal-4pm-fri-41-umbc/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6027/guest@my.umbc.edu/f21ffd2714336f8909e97622a852e77a/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>14</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Sat, 26 Mar 2011 22:18:51 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="5786" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/5786">
  <Title>Cybersecurity graduate program information session</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="UMBC Cybersecurity graduate MPS program" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/03/Smart-Meter-Security.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>The <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">UMBC cybersecurity graduate MPS program</a> will host an informal information session from Noon to 1:00pm on Wednesday, April 6 in ITE Lecture Hall 7. Attend to hear the benefits and practical applications of the program and meet staff members who will be available to answer questions.</p>
    <p>The program allows students to:</p>
    <ul>
    <li>Learn from both research faculty and industry practitioners</li>
    <li>Acquire the latest knowledge and skills and get the preparation you need to make meaningful contributions to the fieldDevelop a network of fellow students and faculty that will benefit you throughout your career</li>
    <li>Choose either a post graduate certificate or master's degree</li>
    </ul>
    <p>UMBC is designated as a <a href="http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml" rel="nofollow external" class="bo">Center for Academic Excellence in Information Assurance Education</a> (CAE) as well as a <a href="http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml" rel="nofollow external" class="bo">Center of Academic Excellence in Research</a> (CAE-R) by the National Security Agency and Department of Homeland Security.</p>
    <p>The program is now accepting applications for Fall 2011. See the <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">Cybersecurity program Web site</a> more information.</p></div>
]]>
  </Body>
  <Summary>The UMBC cybersecurity graduate MPS program will host an informal information session from Noon to 1:00pm on Wednesday, April 6 in ITE Lecture Hall 7. Attend to hear the benefits and practical...</Summary>
  <Website>http://www.cs.umbc.edu/2011/03/cybersecurity-graduate-program-information-session/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/5786/guest@my.umbc.edu/aec8a9278f34426ba1402fd89f5f4a15/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>events</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>6</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Mon, 14 Mar 2011 11:35:16 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="5565" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/5565">
  <Title>Two cybersecurity companies join UMBC&#8217;s BWTECH Research Park</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="BWTECH@UMBC Research and Technology Park" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/03/foo.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>Telcordia and Ross Technologies will open offices in the <a href="http://www.bwtechumbc.com/" rel="nofollow external" class="bo">bwtech@UMBC Research and Technology Park</a> this spring with a focus on cybersecurity. Both companies will share space in the research park's newest building with Northrop Grumman’s <a href="http://www.advantageincubator.com/cync.html" rel="nofollow external" class="bo">Cync</a> program, a new incubator that will nurture high-potential, early-stage companies as they develop tools to secure and protect the computer hardware, software and networks vital to national defense. The companies will join a growing cluster of businesses drawing on UMBC's resources and information technology expertise and the region’s strengths in security technology.</p>
    <p><a href="http://www.telcordia.com/" rel="nofollow external" class="bo">Telcordia</a>, a global leader in communications software, will open an office to develop tools to support and protect vital communications networks. According to a <a href="http://bit.ly/dVIKdm" rel="nofollow external" class="bo">UMBC News release</a>:</p>
    <blockquote><p>“Telcordia has been heavily engaged with the cybersecurity community by ensuring and advancing the protection of critical infrastructure elements,” said Brent Greene, President, Advanced Technology Solutions, Telcordia. “bwtech with its cybersecurity focused programs and its local talent pool of highly qualified engineers, scientists and professors made our decision easy.”</p></blockquote>
    <p><a href="http://www.rtgx.com/" rel="nofollow external" class="bo">Ross Technologies</a> (RTGX) is a growing Maryland company that helps businesses and government agencies take a system-wide approach to securing computer systems. C-Volve, an cyber intelligence company focused cyber network defense and data breach security and risk mitigation that is being mentored by RTGX will also be based at bwtech. <a href="http://bit.ly/f6I6C4" rel="nofollow external" class="bo">UMBC news release</a> notes that</p>
    <blockquote><p>Armando Seay, who founded RTGX with Kathy Adams in 1997, said he is excited that the new location will put the company adjacent to the campus of the University of Maryland, Baltimore County (UMBC), and within a short drive of national intelligence and cybersecurity resources at Fort Meade. “We are thrilled to be moving our headquarters to bwtech,” Seay said. “This location will help us find fresh talent coming out of UMBC and further our goal of innovating in the field of cybersecurity.”</p></blockquote></div>
]]>
  </Body>
  <Summary>Telcordia and Ross Technologies will open offices in the bwtech@UMBC Research and Technology Park this spring with a focus on cybersecurity. Both companies will share space in the research park's...</Summary>
  <Website>http://www.cs.umbc.edu/2011/03/two-cybersecurity-companies-join-umbcs-bwtech-research-park/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/5565/guest@my.umbc.edu/fff78d71a53363d8fc300e5788558314/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>6</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Thu, 03 Mar 2011 01:16:35 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="4956" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/4956">
  <Title>Maryland Cyber Challenge and Conference</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p>UMBC, <a href="http://www.saic.com/" rel="nofollow external" class="bo">SAIC</a>, the <a href="http://www.staysafeonline.org/about-us/about-national-cyber-security-alliance" rel="nofollow external" class="bo">National Cyber Security Alliance</a>, the <a href="http://www.techcouncilmd.com/" rel="nofollow external" class="bo">Tech Council of Maryland</a>, and the <a href="http://www.choosemaryland.org/Pages/default.aspx" rel="nofollow external" class="bo">Maryland Department of Business and Economic Development</a> have joined to hold the Maryland Cyber Challenge and Conference on October 21-22, 2001. The event is designed to increase cyber awareness as a career choice in Maryland, improve the appreciation for cyber oriented curriculum in college and high schools, and convey cyber defense as a sport to increase interest in careers involving cyber security.</p>
    <p>The competition will be divided into high school, collegiate and professional divisions. Qualifying rounds take place over the Internet between April and August 2011 using SAIC's Cyber Network Exercise System (<a href="http://www.saic.com/cybernexs/" rel="nofollow external" class="bo">CyberNEXS</a>), a scalable training, exercise and certification system.  The top eight teams in each division will meet at the MDC3 event in October for the final round followed by an award ceremony at UMBC. MDC3 participants will also be able to learn from and network with other cybersecurity professionals, researchers, and scholars at the conference, which will include presentations, a career fair and a vendor exhibition.</p>
    <p>For more information see this <a href="http://www.prnewswire.com/news-releases/saic-and-umbc-launch-inaugural-cyber-challenge-and-conference-115473354.html" rel="nofollow external" class="bo">press release</a> and the <a href="http://www.saic.com/cyber-challenge/maryland.html" rel="nofollow external" class="bo">SAIC MDC3 site</a>.</p></div>
]]>
  </Body>
  <Summary>UMBC, SAIC, the National Cyber Security Alliance, the Tech Council of Maryland, and the Maryland Department of Business and Economic Development have joined to hold the Maryland Cyber Challenge...</Summary>
  <Website>http://www.cs.umbc.edu/2011/02/maryland-cyber-challenge-and-conference/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/4956/guest@my.umbc.edu/453edd1a0fb604ec376d86dbb36a6533/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Mon, 07 Feb 2011 21:51:57 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="4677" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/4677">
  <Title>Guidelines for smart grid cybersecurity, 2/15/2011</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><a href="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2011/01/smart_grid_us1.jpeg" rel="nofollow external" class="bo"><img alt="" height='135"' src="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2011/01/smart_grid_us1.jpeg" width="180" style="max-width: 100%; height: auto;"></a> The North American electric power system has been called the world's largest interconnected machine and is a key part of our national infrastructure. The power grid is evolving to better exploit modern information technology and become more integrated with our cyber infrastructure. This presents unprecedented opportunities for enhanced management and efficiency but also introduces vulnerabilities for intrusions, cascading disruptions, malicious attacks, inappropriate manipulations and other threats. Similar issues are foreseen for other cyber-physical infrastructure systems including industrial control systems, transportation, water, natural gas and waste disposal.</p>
    <p>A one-day <a href="http://www.bwtechumbc.com//ceti/" rel="nofollow external" class="bo">Smart Grid Cyber Security Conference</a> will be held at UMBC on February 15, hosted by the UMBC Computer Science and Electrical Engineering Department and Maryland Clean Energy Technology Incubator. The conference will be a comprehensive presentation by the National Institute of Standards and Technology regarding an Inter-agency Report 7628 (NISTIR 7628) named <a href="http://csrc.nist.gov/publications/nistir/ir7628/introduction-to-nistir-7628.pdf" rel="nofollow external" class="bo">Guidelines for Smart Grid Cyber Security</a> which is a critically important document for guiding government, regulatory organizations, industry and academia on Smart Grid cybersecurity. This regional outreach conference is valuable to any organization that is planning, integrating, executing or developing cyber technology for the Smart Grid.</p>
    <p>The conference is free, but participants are asked to <a href="http://www.bwtechumbc.com//ceti/register.htm" rel="nofollow external" class="bo">register</a> in advance to help us organize for the correct number of participants.</p>
    <p>A full copy of the 600 page report is available <a href="http://umbc.edu/~finin/nistir-7628.zip" rel="nofollow external" class="bo">here</a>.</p></div>
]]>
  </Body>
  <Summary>The North American electric power system has been called the world's largest interconnected machine and is a key part of our national infrastructure. The power grid is evolving to better exploit...</Summary>
  <Website>http://www.cs.umbc.edu/2011/01/guidelines-for-smart-grid-cybersecurity-2152011/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/4677/guest@my.umbc.edu/f43491aef1965f0338bbc19c974430ea/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Tag>security</Tag>
  <Tag>smart-grid</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Tue, 25 Jan 2011 10:16:51 -0500</PostedAt>
</NewsItem>
</News>
