Information Sciences and Technology Department / en Information technology students stepped up to secure Virginia’s elections  /news/2024-08/information-technology-students-stepped-secure-virginias-elections <span>Information technology students stepped up to secure Virginia’s elections </span> <span><span lang="" about="/user/1441" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Teresa Donnellan</span></span> <span>Wed, 08/28/2024 - 10:19</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Secure elections are the cornerstone of democracy, and the <a href="https://csis.gmu.edu/VA-CNIP/" target="_blank">Virginia Cyber Navigator Internship Program (VA-CNIP)</a> has equipped students with the skills to strengthen the cybersecurity posture of election infrastructures. As an intern last summer, information technology (IT) major Duong Thuy Nguyen helped secure a rural county's technology for the upcoming presidential election alongside two other George Mason students, Maha Khan and Sophie Bates.  </span></p> <p>Sponsored by the National Security Agency (NSA) and run by the University of Virginia (UVA) and other five Virginia universities including George Mason, VA-CNIP was developed to address the need for improved election security in localities that may not have the resources to implement necessary cybersecurity measures.</p> <p>Nguyen, who is pursuing a dual concentration in database technology and programming and cyber security, traveled to Campbell County for a few days each week over the summer to support the county’s dedicated and hard-working IT staff in complying with the Locality Election Security Standards (LESS) required by the Commonwealth of Virginia. The LESS requirements are designed to ensure that all localities, regardless of size, have baseline cybersecurity measures in place, with further goals to achieve "preferred" or "premium" levels of security. The program thus not only prepared students for future careers but also left a lasting impact on the local governments they serve. </p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/untitled-2_3.png?itok=FGRYqmk3" width="350" height="350" alt="From left to right, Albanese, Hicks, and Nguyen with two other VA-CNIP interns." loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>From left to right, Albanese, Hicks, and Nguyen with two other VA-CNIP interns. Photo provided.</figcaption></figure><p>George Mason Associate Professor <a href="https://ist.gmu.edu/profiles/malbanes" target="_blank">Max Albanese</a> helped lead VA-CNIP, designing a course in election security that was a prerequisite for all interns. In addition to the course, a two-day boot camp at UVA provided interns with training, including hands-on activities and talks from high profile industry experts and election officials. This year United States Election Assistance Commissioner <a href="https://www.eac.gov/about/commissioner-thomas-hicks" target="_blank">Thomas Hicks</a> spoke at the boot camp.  </p> <p>“Especially this year, the focus was on trying to send interns to localities that were in most need of upgrading their security posture,” said Albanese, “and that means the more rural or less technologically advanced counties.” </p> <p>Each week, students worked remotely for part of their assignments but also traveled to their assigned localities for on-site work. Due to the often-rural nature of the counties involved, VA-CNIP provided a $3,000 travel allowance to each intern in addition to their $9,000 stipend. This allowed students to travel long distances and, when necessary, stay overnight in nearby towns to avoid lengthy commutes. The George Mason interns this year traveled about four hours one way to reach Campbell County.</p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/untitled-1.png?itok=OQCyhNux" width="350" height="350" alt="Duong Thuy Nguyen" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Nguyen in Campbell County. Photo provided. </figcaption></figure><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Nguyen noted how rewarding it was to work in-person with the local IT department. Her tasks included developing security policies, conducting research on cybersecurity tools, and even designing tabletop exercises to prepare local officials for possible cyber incidents on election day. Nguyen raved about her internship, which was her first. Even though she had to travel a lot, she said, she would not change her experience.  </p> <p>“They were all very welcoming, and they gave us all the support that we needed,” she said. </p> <p>VA-CNIP exemplifies the power of academia, government, and students working together to tackle one of the most pressing challenges of our time—ensuring the security and integrity of democratic processes. While funding for VA-CNIP ends this year, there are ongoing discussions about sustaining the program going forward. </p> <p> </p> <p> </p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="3df8860a-6498-4223-88d1-386b0e2e9e72" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/malbanes" hreflang="und">Massimiliano Albanese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="e4d0e643-b2ab-481a-a23f-e92a9de56b2b" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="b8646372-316e-4ee0-9df4-a32355a38510" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="6c5500e8-38fb-4db8-b451-e1a408d00e4a" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="210da48f-6e9f-4aad-afe4-d779990806bf"> <div class="cta"> <a class="cta__link" href="https://careers.gmu.edu/"> <h4 class="cta__title">Explore career options at University Career Services <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="1f69ae4e-2d53-4eb5-aba0-6afcc3c8723c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="30b02d2b-11e9-4339-a964-804f8fa22d87" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="a7d8fa7e-ca73-4633-8a98-b8b0715fe7d3" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="5f3af51a-1528-4759-bdfe-7f8ff7c799db" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-bd91e4548bb34d0f8d487db36657b7d9045756ddd114c6cc9a0077ce20410949"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-09/bioengineering-alumna-completes-fungal-summer-internship-nih" hreflang="en">Bioengineering alumna completes a fun(gal) summer internship with NIH </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 16, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-09/groundswell-partners-mason-life-providing-scholarships-internships-and-career-services" hreflang="en">Groundswell partners with Mason LIFE providing scholarships, internships, and career services</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 12, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-09/bioengineering-student-went-patriot-pilgrim-summer-internship" hreflang="en">Bioengineering student went from Patriot to Pilgrim for summer internship  </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 6, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/information-technology-students-stepped-secure-virginias-elections" hreflang="en">Information technology students stepped up to secure Virginia’s elections </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 28, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/carter-school-student-knocks-socks-year-long-internship" hreflang="en">Carter School student knocks the socks off year-long internship </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 26, 2024</div></div></li> </ul></div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4c6b27b6-a672-498e-8bf0-5580252d233c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="ef35a6ca-7194-4900-a001-515fc9db772e" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="a53faa93-425a-4277-b02c-6c50c35d77d2" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/1961" hreflang="en">information technology</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/19266" hreflang="en">Elections</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div> </div> </div> Wed, 28 Aug 2024 14:19:47 +0000 Teresa Donnellan 113761 at Myeong Lee’s information network research will guide  the Virginia Board of People with Disabilities /news/2024-04/myeong-lees-information-network-research-will-guide-virginia-board-people-disabilities <span>Myeong Lee’s information network research will guide  the Virginia Board of People with Disabilities</span> <span><span lang="" about="/user/1441" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Teresa Donnellan</span></span> <span>Thu, 04/04/2024 - 10:57</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text"><a href="/profiles/mlee89" target="_blank">Myeong Lee</a>, an assistant professor of information science and the director of the <a href="https://cil.cec.gmu.edu/" target="_blank">Community Informatics Lab</a> at AV, has been working with the <a href="https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvbpd.virginia.gov%2F&data=05%7C02%7Cmlee89%40gmu.edu%7C5f40b9559a014d085cc608dc53386b40%7C9e857255df574c47a0c00546460380cb%7C0%7C0%7C638476748979262227%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=0Ss8MMS6r9FyniHAR8lcdRhvNXUYTmT30S1k43fVBPU%3D&reserved=0" target="_blank">Virginia Board of People with Disabilities</a> (VPBD) since presenting at their Information Access Summit in November 2022.  </span></p> <p>"It was an event of government staff members, officials, non-profits, and community advocates, discussing the information access challenges faced by individuals with disabilities and their family members," Lee recalled. At the summit, he emphasized the need to address not only tech literacy issues but also structural barriers to information access. His ideas resonated with VBPD members and state government officials, leading to the inception of the Mapping Information Ecology project, for which Lee received a grant of about $150,000 from the VBPD. </p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-04/myeong-lee-500x500_0.jpg?itok=NMI02muo" width="350" height="350" alt="Myeong Lee" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Myeong Lee</figcaption></figure><p>Lee, whose past research has focused on information access issues in local communities, explained, “At the community level, if information is fragmented across different sources and in different forms, then those structural factors make people's access difficult." Lee’s research approach involved finding a way to measure these structural challenges and mitigate their negative impact.  </p> <p>The project aims to understand information provision and management practices from both information provider and user perspectives. Lee's team employed a mixed-method approach, conducting interviews with providers and surveying their information sharing patterns to uncover both managerial and structural challenges.   </p> <p>Based on network analysis of information-sharing patterns, key findings from the project will extend our understanding of obstacles faced by individuals with disabilities and their family members, such as the lack of customized information for diverse populations, outdated information, and reliance on informal sources, such as social media, leading to exposure to misinformation.  </p> <p>“We are currently designing the survey questionnaire to [further] understand both information providers’ and users’ practices,” said Lee. Using information from the survey, he explained, “We want to visualize those networks—how information is circulated and shared.” The data visualization will help Lee and his team identify “hot spots” and “cold spots” where improvements can be made. Finally, the team will provide recommendations to the VBPD.  </p> <p>“We want to provide information systems strategies, structural recommendations, and related policy recommendations to the state. That's our goal," said Lee.   </p> <p>Despite the project's official ending in May, Lee envisions continued collaboration between his team and the VBPD. Looking ahead, he sees potential applications of their approach beyond disability-related issues. Ultimately, Lee hopes to create metrics and tools for assessing information availability and fragmentation at the state level so to assist policymakers in understanding the complicated issue of information access.  </p> <p><span class="intro-text">Lee's work exemplifies a holistic approach to information access, bridging the gap between research and policy to empower marginalized communities. He concluded, "It's not just about making recommendations—it's about building systems and developing assessment metrics that empower users and inform policymakers for years to come."  </span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="d616cbfc-8f0e-4777-8dc4-67ae351ed6c0" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="9648a672-0e33-454f-bf93-7547254acd71" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/mlee89" hreflang="und">Myeong Lee</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="b457a0ad-d579-4312-9e58-103de65097ac" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><hr /></div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="66b1d519-b0a2-4979-b210-0cf69f1ef99a" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-f03ee6f15d8f021c339198d7a3451d731f53972f040300da945536c9110942ad"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/information-technology-students-stepped-secure-virginias-elections" hreflang="en">Information technology students stepped up to secure Virginia’s elections </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 28, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-04/myeong-lees-information-network-research-will-guide-virginia-board-people-disabilities" hreflang="en">Myeong Lee’s information network research will guide  the Virginia Board of People with Disabilities</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">April 4, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2022-11/masonamazon-hackathon-win-mason-students" hreflang="en">Mason/Amazon hackathon is a win for Mason students</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 7, 2022</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2022-10/new-scoring-framework-addresses-software-vulnerabilities" hreflang="en">New scoring framework addresses software vulnerabilities</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 25, 2022</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2022-10/commonwealth-cyber-initiative-catapult-fund-launches-translational-research-projects" hreflang="en">Commonwealth Cyber Initiative CATAPULT fund launches translational research projects</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 6, 2022</div></div></li> </ul></div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/9601" hreflang="en">Disability policy</a></div> <div class="field__item"><a href="/taxonomy/term/16791" hreflang="en">Community-Based Research</a></div> </div> </div> </div> </div> </div> Thu, 04 Apr 2024 14:57:58 +0000 Teresa Donnellan 112671 at Mason/Amazon hackathon is a win for Mason students /news/2022-11/masonamazon-hackathon-win-mason-students <span>Mason/Amazon hackathon is a win for Mason students</span> <span><span lang="" about="/user/231" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Colleen Rich</span></span> <span>Mon, 11/07/2022 - 12:44</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Nervousness, shock, disbelief, exhaustion. Those were among the emotions AV freshmen Pranay Yella and Pranav Reddippali said they experienced at the 2022 Bring Down Counterfeiting Public Policy Hackathon.</span></p> <p><span class="intro-text">In the end, though, it was worth it—$15,000 to be exact.</span></p> <figure role="group"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2022-11/Mason%20hackathon%20photo%202.JPG" width="750" height="500" alt="three men hold up a cardboard check" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Team Nimbus—Pranav Reddippali, Srivatsa Krishnamurthy, Pranay Yella—took second place at the Mason/Amazon Bring Down Counterfeiting Public Policy Hackathon. Photo by Blue Clarity</figcaption></figure><p><span><span><span><span>That is how much Team Nimbus—which included Yella, an </span></span><a href="https://cec.gmu.edu/program/information-technology-bs"><span><span>information technology</span></span></a><span><span> major; Reddippali, a </span></span><a href="/program/computer-science-bs"><span><span>computer science</span></span></a><span><span> major; and their friend from the University of Virginia, Srivatsa Krishnamurthy—were awarded as the event’s second-place finisher.</span></span></span></span></p> <p><span><span><a href="https://devpost.com/software/a-solution-to-use-and-consumption-of-counterfeit-medicine"><span><span>Their proposal</span></span></a><span><span>: Develop a Google Chrome extension that can prevent the consumption of counterfeit medicine by focusing on exposing counterfeit pharmacies.</span></span></span></span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-11/JWB%20110522%20GMU-Amazon-Hackathon-031-final.jpg?itok=10OdepoA" width="350" height="233" alt="Louise Shelley at the podium" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Louise Shelley, founder and director of Mason's TraCCC. Photo by John Boal Photography</figcaption></figure><p><span><span><a href="https://devpost.com/software/legally-litt"><span><span><span>Team Hypercube</span></span></span></a><span><span><span> earned the $20,000 first prize for its concept of a national counterfeiting index through an artificial intelligence (AI)-powered blockchain that would allow federal, state and local law enforcement to share information, and consumers to verify the authenticity of a product through their phones.</span></span></span></span></span></p> <p><span><span><span><span><span>“Opportunities like this are definitely something to be taken seriously,” Yella said. “An idea is a free thing, but once you implement it, it can revolutionize the world.”</span></span></span></span></span></p> <p><strong><em>[Mason and the Bring Down Counterfeiting Public Policy Hackathon are featured in Amazon's 2023 Brand Protection Report, which was part of this <a href="https://www.youtube.com/watch?v=T3LvwMZKqg8">Good Morning America report</a>.]</em></strong></p> <p><span><span><span><span><span>The hackathon, co-hosted by Mason’s </span></span></span><a href="https://traccc.gmu.edu/"><span><span>Terrorism, Transnational Crime and Corruption Center</span></span></a><span><span><span> (TraCCC) and Amazon, was held Nov. 5 at the Homeland Security Investigations Lab in Arlington, Virginia.</span></span></span></span></span></p> <p>TraaCCC is located at Mason Square (formerly Arlington Campus), where the 345,000-square -oot Fuse building is under construction, scheduled to open in 2025. Fuse will serve as a technological hub in the Rosslyn-Ballston corridor, connecting students, faculty, industry, and government. </p> <p><span><span><span><span><span>Saturday's hackathon, administered by Blue Clarity, challenged teams from U.S. and international academic institutions, companies, and other affiliations to develop innovative ideas to improve public–private collaborations against the industry-wide global challenge of counterfeiting. </span></span></span></span></span>More than 280 individuals registered for the hackathon. More than 30 teams submitted proposals by the deadline, 11 of which made the finals.</p> <p><span><span><span><span><span>An panel of judges scored the submissions based on potential impact, scalability, creativity and design.</span></span></span></span></span></p> <p><span><span><span><span><span>In developing the submissions, participants had access to experts and mentors from Amazon, law enforcement, tech and retail industries, academia, and government.</span></span></span></span></span></p> <p><span><span><span><span><span>From Mason, those included the </span></span></span><a href="https://cina.gmu.edu/"><span><span>Criminal Investigations and Network Analysis Center</span></span></a><span><span><span> (CINA), the </span></span></span><a href="https://science.gmu.edu/"><span><span>College of Science</span></span></a><span><span><span>, the </span><a href="https://computing.gmu.edu/">School of Computing</a></span></span><span><span><span>, and the </span></span></span><a href="https://www.law.gmu.edu/"><span><span>Antonin Scalia Law School</span></span></a><span><span><span>.</span></span></span></span></span></p> <figure class="quote"><span><span><span><span>“Only effective public–private collaboration and a relentless pursuit of solutions can solve this problem,” Mason President Gregory Washington said. “This important event is a step in that direction because this hackathon involves policy. We’re not just pursuing greater understanding of counterfeiting, we’re trying to improve the response to the problem. We appreciate Amazon’s commitment to work with Mason to find innovative solutions and to provide opportunities for Mason students to take part in these challenging hands-on experiences.”</span></span></span></span></figure><p><span><span><span><span>Added Kebharu Smith, director of Amazon’s Counterfeit Crimes Unit: “<span><span>We’re</span></span></span></span><span><span><span><span> excited to be, as Amazon, part of this hackathon with Mason and TraCCC and the other partners that participated in this first hackathon, to really think about ways that we can fight counterfeiters and the scourge of counterfeiting. This partnership is key to us moving forward and going after counterfeiters and beating them at this threat.”</span></span></span></span></span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2022-11/Kebharu%20Smith%20photo.JPG" width="400" height="267" alt="man in front of a video camera" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Kebharu Smith, director of Amazon’s Counterfeit Crimes Unit, spoke with the media following the hackathon. Photo by Blue Clarity</figcaption></figure><p><span><span><span><span><span><span>Which brings us back to Yella and Reddippali, the Mason students who finished second in the competition with their friend from UVA.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Asked why they decided to focus on counterfeit medicine and pharmacies, Reddippali said, “Because we felt it had the most impact on people with lives at stake. With other counterfeit goods, it is the stealing of intellectual property. But we felt this was more urgent.”</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Yella, Reddippali, and </span></span></span></span><span><span>Krishnamurthy, all from Ashburn, Virginia, met in high school. Reddippali said Yella came up with the idea of the Chrome extension, but they all collaborated on the details that include checking the legitimacy of online pharmacies and creating a forum where users can provide feedback that can be accessed by local, state and federal authorities.</span></span></span></span></p> <figure class="quote"><span><span><span><span>“They were so thoughtful in thinking about counterfeiting as a health and safety issue,” said Louise Shelley, TraCCC’s founder and director. “And they were so incredibly clever in thinking about solutions.”</span></span></span></span></figure><p><span><span><span><span>They are also thinking about the future of their project.</span></span></span></span></p> <p><span><span><span><span>“We’re definitely going to go on with this project in a more serious way,” Yella said. “We feel this product can revolutionize the medicine industry. We definitely want to use our funds to make it successful in the future.”</span></span></span></span></p> <p><span><span><span><span>In the moment, though, “They were so excited,” Shelley said, “they were shaking.”</span></span></span></span></p> <p><span><span><span><span>Other awards:</span></span></span></span></p> <p><span><span><span><span><span>Mason’s </span></span></span><a href="https://cina.gmu.edu/"><span><span><span>Criminal Investigations Network and Analysis Center</span></span></span></a><span><span><span> sponsored a special $10,000 prize to fund follow-up research by </span></span></span><a href="https://devpost.com/software/a-capp-team-1"><span><span><span>A-CAPP Team #1</span></span></span></a><span><span><span>, which proposed producing a central database to help law enforcement and private businesses track individuals and factories that manufacture or sell counterfeit items.</span></span></span></span></span></p> <p><span><span><span><span><span>The $5,000 student prize went to </span></span></span><a href="https://devpost.com/software/the-spartan-solution"><span><span><span>The Spartan Solution</span></span></span></a><span><span><span>, which demonstrated a cipher-based solution to combat counterfeit listings on e-commerce sites before the listings reach consumers.</span></span></span></span></span></p> <p><span><span><span><span><span>The crowdsource prize of $2,000 went to </span></span></span><a href="https://devpost.com/software/g-i-n-global-inventory-network"><span><span><span>Team G.I.N.</span></span></span></a><span><span><span>, which detailed creation of a network, accessible by a QR code, that will allow everyone the ability to distinguish between genuine and counterfeit goods.</span></span></span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="89a11b90-877d-44b0-b572-31651e9b5e1f" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-83cf3e847d99661eb2188854e3941029f13e689a83dce9a4b564c967d1c36566"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/information-technology-students-stepped-secure-virginias-elections" hreflang="en">Information technology students stepped up to secure Virginia’s elections </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 28, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-04/myeong-lees-information-network-research-will-guide-virginia-board-people-disabilities" hreflang="en">Myeong Lee’s information network research will guide  the Virginia Board of People with Disabilities</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">April 4, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2023-11/mason-students-grads-claim-top-prizes-tracccs-2023-anti-counterfeiting-hackathon" hreflang="en">Mason Students, Grads Claim Top Prizes in TraCCC’s 2023 Anti-Counterfeiting Hackathon</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 20, 2023</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2023-09/schar-school-study-shows-4-hubs-illicit-trade-and-reasons-they-flourish" hreflang="en">Schar School Study Shows 4 ‘Hubs’ of Illicit Trade—and the Reasons They Flourish</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 27, 2023</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2023-08/registration-open-masons-traccc-launches-second-annual-hackathon-fight-counterfeiters" hreflang="en">Registration Open: Mason’s TraCCC Launches Second Annual Hackathon to Fight Counterfeiters</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 30, 2023</div></div></li> </ul></div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/116" hreflang="en">Campus News</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/1016" hreflang="en">Amazon</a></div> <div class="field__item"><a href="/taxonomy/term/591" hreflang="en">Schar School of Policy and Government Terrorism Transnational Crime and Corruption Center (TraCCC)</a></div> <div class="field__item"><a href="/taxonomy/term/671" hreflang="en">Arlington campus</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/17476" hreflang="en">Spirit Magazine</a></div> <div class="field__item"><a href="/taxonomy/term/17481" hreflang="en">Spirit Spring 2023</a></div> <div class="field__item"><a href="/taxonomy/term/17511" hreflang="en">At Mason</a></div> <div class="field__item"><a href="/taxonomy/term/7096" hreflang="en">Mason Momentum</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div> </div> </div> Mon, 07 Nov 2022 17:44:39 +0000 Colleen Rich 103116 at New scoring framework addresses software vulnerabilities /news/2022-10/new-scoring-framework-addresses-software-vulnerabilities <span>New scoring framework addresses software vulnerabilities</span> <span><span lang="" about="/user/1011" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Tama Moni</span></span> <span>Tue, 10/25/2022 - 13:50</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/malbanes" hreflang="und">Massimiliano Albanese</a></div> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span>The AV <a href="https://cec.gmu.edu">College of Engineering and Computing</a> has launched the Mason Vulnerability Scoring Framework (MVSF), which publishes a continuously updated ranking of the most-common global software weaknesses. The work, in conjunction with <a href="https://www.parc.com/" target="_blank">PARC</a> (Palo Alto Research Center), relies on the <a href="https://nist.gov">National Institute of Standards and Technology’s</a> (NIST)—Common Vulnerabilities and Exposures data and other sources of vulnerability information to create an up-to-date database that can be used to identify and mitigate risks. This line of work has resulted in multiple pending patent applications and a Best Paper Award at the 19th International Conference on Security and Cryptography.</span></span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2022-10/Vulnerability-scoring-NS-thumbnail_600x600.jpg" width="600" height="600" alt="Graphic with blue computer code and yellow locks on a black background" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Cybersecurity code with 1s and 0s<br /> Photo provided by iStock images</figcaption></figure><p><span><span>Liza Wilson Durant, Mason’s associate provost for strategic initiatives and community engagement, says, "This preemptive tool to guide strategic defense against cybersecurity vulnerabilities will not only safeguard systems but mitigate potential business revenue losses for those who leverage the tool. “ </span></span></p> <p><span><span>An existing list called the Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses, compiled by The <a href="https://mitre.org">MITRE Corporation</a>, has long been the industry standard. MVSF improves on the CWE Top 25 by having data input monthly, compared to MITRE’s yearly reporting. This improvement allows researchers, programmers, developers, and others to have an accurate, almost real-time picture of where software vulnerabilities are most likely to be exploited. Additionally, where MITRE ranks the top 25 vulnerabilities, MVSF ranks the top 150. </span></span></p> <p><span><span>Associate Professor, <a href="https://ist.gmu.edu">Department of Information Sciences and Technology</a> and Associate Director, <a href="https://csis.gmu.edu/">Center for Secure Information Systems</a>, Max Albanese oversees the project for Mason. He says, “If there is a trend where a certain type of vulnerability is becoming more severe, you don’t have to wait for a full year to discover that; you’ll see that class of vulnerability getting worse – or better – month-to-month.”  MVSF can even correct course based on new information, going back and re-ranking weaknesses’ order in a previous month based on new information that was not known at the time of original ranking. </span></span></p> <p><span><span>Albanese further notes that NIST assigns a severity score to vulnerabilities based on a combination of an exploitability score – how difficult the vulnerability is to exploit – and an impact score – how bad the consequences would be if the vulnerability were exploited. MVSF uses those components as variables but allows users to add their own, additional variables not considered by NIST. MVSF also allows users to decide how to weigh the variables that rank the vulnerabilities. This customizability, still under development, is an important feature of the new system. </span></span></p> <p><span><span>Mason and PARC’s collaboration on the Mason Vulnerability Scoring Framework builds on a relationship that started with both of them working on a Defense Advanced Research Projects Agency (DARPA) project dubbed SCIBORG: Secure Configurations for the Internet of Things (IoT) based on Optimization and Reasoning on Graphs. The goal of SCIBORG was to devise fundamentally new approaches to determine security configurations that protect critical infrastructure and IoT-based systems.</span></span></p> <p><span><span>The association with PARC here was important to making the project a success. “Working with GMU was a productive collaboration,” says Marc Mosko, principal scientist, PARC. “Configuration vulnerabilities are growing, now comprising over 15 percent of all Common Vulnerability and Exposure (CVE) notices. We appreciate that across many different industry sectors, there are often gaps in context between management, software security teams, and those who are responsible for ensuring systems are performing optimally on an ongoing basis. Our work addresses these evolving configuration security needs, and we look forward to exploring opportunities to apply this work in the future.”</span></span></p> <p>Mason and PARC’s collaboration on the Mason Vulnerability Scoring Framework builds on a relationship that started with both of them working on a Defense Advanced Research Projects Agency (DARPA) program <a href="https://www.darpa.mil/program/configuration-security" target="_blank">ConSec</a> in a project dubbed SCIBORG: Secure Configurations for the Internet of Things (IoT) based on Optimization and Reasoning on Graphs. The goal of SCIBORG was to devise fundamentally new approaches to determine security configurations that protect critical infrastructure and IoT-based systems.</p> <p><span><span>Albanese, who is also an external consultant for MITRE, has initiated a collaboration with MITRE’s group responsible for CWE to leverage synergies between the two organizations.</span></span></p> <p><span><span>In addition to the excitement of the innovation, it is equally impactful to see undergraduate students involved in its design and implementation and innovating alongside their mentor faculty," says Wilson Durant.</span></span></p> <p><span><span>The <a href="https://www.cci-novanode.org/">Virginia Commonwealth Cyber Initiative (CCI)</a> will provide continued support for two Mason undergraduate students to assist with the project, which Albanese says is key for the continued maintenance of the system. </span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/17166" hreflang="en">configuration vulnerabilities</a></div> <div class="field__item"><a href="/taxonomy/term/1451" hreflang="en">Internet of Things</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Tue, 25 Oct 2022 17:50:54 +0000 Tama Moni 101611 at Commonwealth Cyber Initiative CATAPULT fund launches translational research projects /news/2022-10/commonwealth-cyber-initiative-catapult-fund-launches-translational-research-projects <span>Commonwealth Cyber Initiative CATAPULT fund launches translational research projects</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 10/06/2022 - 14:18</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="90e15bd6-772b-4e20-ba74-f53e2bac4044"> <div class="cta"> <a class="cta__link" href="https://cyberinitiative.org"> <h4 class="cta__title">Learn About the CCI <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span>As researchers and their teams work to answer questions and find solutions for protecting privacy and securing information through cybersecurity innovation, many set their sights on commercialization. Still, the path from research ideas to consumer products can be long and winding. To help straighten the path the Commonwealth Cyber Initiative (CCI) is supporting a Cyber Acceleration, Translation, and Advanced Prototyping for University Linked Technology (CATAPULT) Fund. The fund’s purpose‑‑advance collaborative translational research projects among CCI partners, to speed up the progress of academic research outcomes to the marketplace. </span></span></span></span></p> <p><span><span><span>"It is truly exciting to tap into the breadth of innovation from academic institutions across the Commonwealth and introduce these faculty inventors to the opportunity to expand the impact of their research through commercialization,” says Liza Wilson Durant, associate dean, strategic initiatives and community engagement, College of Engineering and Computing. “It is just the right time for Virginia to support and accelerate cybersecurity innovation as the Commonwealth establishes its role as a magnet for new companies with the best and brightest solutions to the nation's greatest cybersecurity challenges."</span></span></span></p> <p><span><span><span><span>In July 2022 CCI awarded seven teams from four universities in the Northern Virginia Node funding for their projects. These research teams received up to $50,000, with funding increments released based on the achievement of agreed-upon milestones. The teams and their projects are as follows.</span></span></span></span></p> <p><span><span><strong><span><span>Protecting Smartphones from Fingerphoto Spoofing</span></span></strong></span></span><br /><span><span><span><span><a href="https://gmu.edu" title="Mason">AV</a> Assistant Professor <a href="https://volgenau.gmu.edu/profiles/emarasco" title="Marusco profile">Emanuela Marasco’s</a> </span></span><span><span>the project addresses the urgent need for a mechanism that properly secures smartphone technology. Contactless fingerprint authentication allows faster capture times, unattended operations, and high hygiene. These systems, however, are still in the early stages of development. Although researchers are advancing matching, the risk of spoofing for contactless authentication must be mitigated as well. This project addresses the problem.</span></span></span></span></p> <p><strong>Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing  </strong><br /><span><span><span><span>As the number of Internet of Things (IoT) devices has increased rapidly, IoT botnets and information stealer attacks have exploited the vulnerabilities of IoT devices. It is still challenging, however, to detect the initial intrusion on IoT devices before massive attacks. Professor Gang Zhou,</span></span><span><span> from the College of William & Mary, </span></span><span><span>and his partners at Old Dominion University are addressing the challenge of the lack of accurate models in real-time for ubiquitous attack detection with their project.</span></span></span></span></p> <p><strong>Algorithm Evaluation for Backdoor Detection and Mitigation in Remote Sensing Systems</strong><br /><span><span><span><span>Artificial Intelligence (AI) technology has advanced to the point that it is inescapable in life and work. AI models extract knowledge from data to make decisions. Though AI has achieved state-of-the-art performances for many applications, it can be easily deceived by the backdoor attack.<strong> </strong><a href="https://odu.edu" title="Old Dominion University">Old Dominion University</a></span></span><span><span><strong> </strong>Professor<a href="https://www.odu.edu/directory/people/j/jli" title="Jang Li"> Jiang Li</a> </span></span><span><span>and his partners at <a href="https://maxar.com" title="Maxar">Maxar’s</a> </span></span><span><span>project leverages a novel approach to addressing this concern.</span></span></span></span><br />  </p> <p><span><span><strong><span><span>RF Fingerprinting Techniques for Millimeter-Wave Device Authentication in 5G/NextG Wireless Communication</span></span></strong><br /><span><span>Millimeter-wave (mmWave) technology is a key enabler for 5G and NextG wireless communications as it supports applications that require high-throughput and ultra-low latency. Due to the broadcast nature of the wireless medium, however, mmWave communication is vulnerable to various attacks. With this project <a href="https://volgenau.gmu.edu/profiles/kzeng2" title="Kai Zang">Kai Zeng,</a> </span></span><span><span>associate professor, AV</span></span><span><span> and his team aim to develop robust and efficient techniques to address these vulnerabilities.</span></span></span></span></p> <p><strong>Extended Reality Empowered 5G Telemedicine Mentoring</strong> <br /><span><span><span><span>Old Dominion University</span></span><span><span> Associate Professor <a href="https://ww2.odu.edu/~sshetty" title="Shetty">Sachin Shetty</a>’s</span></span><span><span> project looks at the development and commercialization of a 5G telemedicine platform that leverages Extended Reality technologies and a 5G environment. Because 5G technology supports massive capacity connections and fast data rates it has the potential to transform healthcare training and service delivery. One example, 5 G-enabled telemedicine, connects remotely located medical providers and allows access to near real-time data, and permits split-second decision-making critical in health care environments.</span></span></span></span></p> <p><span><span><span><span><strong>Super Timelines</strong><br /> When a cybersecurity incident occurs, analysts need to quickly construct a forensic timeline of events to assess the impact and plan the response. This effort typically involves extracting logs and other artifacts from various sources and then combining them into a single list, ordering them by date and time. Only then can an analyst look for clues to help better understand the course of events before, during, and after the incident. With Super Timelines, Florian Buchholz, </span></span><span><span>professor at <a href="https://jmu.edu" title="James Madison University">James Madison University</a>,</span></span><span><span> and his partners at Gigasheet (https://www.gigasheet.com) will develop a turnkey solution for this problem, based on a modern cloud-based infrastructure.</span></span></span></span></p> <p><span><span><span><span>“Without this funding from CCI, the research and start-ups that are so critical to Virginia’s strategy of building a high-impact cyber economy would not have the opportunity to meet the wonderful members of the tech community who have rallied around them to provide advice, guidance, and structure to launching new products and companies,” says Associate Vice President of the Office of Research Innovation and Economic Development, at AV, Paula Sorrell.</span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Thu, 06 Oct 2022 18:18:33 +0000 Martha Bushong 99511 at Zhisheng Yan nabs Best Student Paper Award /news/2022-10/zhisheng-yan-nabs-best-student-paper-award <span>Zhisheng Yan nabs Best Student Paper Award</span> <span><span lang="" about="/user/1441" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Teresa Donnellan</span></span> <span>Wed, 10/05/2022 - 14:57</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/zyan4" hreflang="en">Zhisheng Yan</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>A recent paper by Department of Information Sciences and Technology Assistant Professor Zhisheng Yan received the Best Student Paper Award at ACM Multimedia Systems (MMSys) 2022 conference held in Athlone, Ireland. ACM MMSys is a premier conference on multimedia. The awarded paper results from a collaborative project between Yan and researchers at the <a href="https://illinois.edu/" target="_blank">University of Illinois Urbana-Champaign</a>.</p> <p>In his paper, Yan writes, “Image compression standards such as JPEG and its variants designed for human viewing are no longer the optimal choice for emerging video analytics applications where machines and computer algorithms are the end consumers. We show in this paper that it is necessary and feasible to achieve fast and compact image compression while maximizing the accuracy of image classification and object detection algorithms through a machine-centered design.” </p> <p>To read the paper, “Context-aware Image Compression Optimization for Visual Analytics Offloading,” go to <a href="https://mason.gmu.edu/~zyan4/papers/cico_mmsys22.pdf" target="_blank">https://mason.gmu.edu/~zyan4/papers/cico_mmsys22.pdf</a>. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/15171" hreflang="en">Media Research</a></div> </div> </div> </div> </div> </div> Wed, 05 Oct 2022 18:57:56 +0000 Teresa Donnellan 99431 at Fulbright faculty finds Finland, a small nation that punches well above its weight  /news/2022-05/fulbright-faculty-finds-finland-small-nation-punches-well-above-its-weight <span>Fulbright faculty finds Finland, a small nation that punches well above its weight </span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Fri, 05/06/2022 - 14:02</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/johri" hreflang="und">Aditya Johri</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>As part of my faculty study leave for 2021-2022, I spent the fall 2021 semester in Finland as a Fulbright-Nokia Distinguished Chair at the Department of Computer Science, Aalto University in Espoo, a suburb of the capital city Helsinki. When I mentioned my upcoming trip to colleagues at Mason, friends and colleagues were all curious – what made you apply to go to Finland? Finland was a strategic choice based on a number of factors including the range of Fulbright opportunities available, my experience with a postdoc in my lab who got his PhD at Aalto, and a visit I had made to Helsinki as part of an NSF workshop where I had met many academics from Finland. I was also aware that like other Nordic countries, Finnish people were very comfortable with English removing one potential barrier to travel. But most of all what had attracted me to Finland was the quality and quantity of research that Finland produces in the two fields where my research interests intersect – computing and education.  </p> <p>At Aalto, I worked as part of Learning Technologies or LeTech group led by Prof. Lauri Malmi and in close collaboration with the Critical AI and Crisis Studies (CRAI-CIS) research group led by Professor Nitin Sawhney. The LeTech group is at the forefront of computing education, especially the use of novel technologies for learning programming and abstractions. The CRAI-CIS is a new group at Aalto and group members are engaged in researching and designing AI-driven public services, including public health services related to COVID. During my time at Aalto, I wanted to develop expertise in ethics of AI, especially in educational technology, and was extremely lucky to find such a tight intellectual fit. </p> <p>Travel preparations for the trip were marked with a lot of uncertainty due to COVID and although when I reached Finland in early August many meetings were online, slowly folks started showing up on campus and I was able to participate in many in-person activities. The opening up of the campus allowed me to attend and give talks and discuss research and teaching with new colleagues and even some old ones like Milos Mladenovic whom I knew from my time at Virginia Tech. Having prior contacts was also helpful with process of settling into a new city and institution.  </p> <p>Beyond my collaborations at Aalto, I was able to travel across Europe and present at different places and attend conferences. The advantage of Europe in terms of proximity cannot be understated. I was able to present papers at reach conferences and give invited talks in Rome, Italy, Stockholm, Sweden, Eindhoven, the Netherlands, and Tallinn, Estonia. These visits also allowed me to showcase the work that my lab does and also publicize AV as an institution. </p> <p>Beyond the academic engagements, there were other factors that had made Finland an attractive place to visit and I was not disappointed. Although I speak multiple languages the ease of doing work and of living in Scandinavian countries with their high level of English adoption was definitely a plus. In this regard I was thoroughly impressed with Finland. Finns are very proud of their language and most public work is carried out in Finnish, but they are fluent in English. Public transport within the city and between cities is superb, and city planning is excellent. In Helsinki most neighborhoods have a grocery store, convenience store, coffee shop and restaurants all within walking distance.  </p> <p>The other attraction was being able to spend time in a country where public services are strong. It isn’t surprising that other Fulbright Scholars came explicitly to study these services In Finland. A new friend and colleague, Fred Markowitz, from Northern Illinois University was studying mental health and deviant behavior, including studies of prison systems in Finland. Finns are proud of their social innovations, women have had a right to vote since the inception of the country 100 years ago, and of public sharing of common resources such as mushrooms and berries in the wild.  </p> <p>In terms of my time on campus, I was pleasantly surprised by the support that faculty and students have their needs – from technical support, building managers, to support for labs and paperwork. This something that is increasingly amiss at U.S. academic institutions. Public funding for education in Finland means more resources for those who work and learn there. The building where I had my office had a break area with coffee machines, hot water for tea, and all utensils. It also had refrigerators and dishwashers. Compared to American campuses, the campus there was a lot more homogenous in terms of student and faculty population and this is downside that the university and workforce there realizes.  </p> <p>A Fulbright experience is unique and I highly recommend others to look into the opportunity. In addition to the Fulbright Scholars, Finland also supports those who are not in academia to visit the country. Students, of course, have their own program and there is also funding for short visits. Finally, the Fulbright Specialist program allows one to travel for specific projects that include workshop, curriculum development, and others. Finding a partner in the host nation is important and every country does it differently so there is a bit of legwork involved but the Fulbright website of each country provides information on staff that can help you make connections.  </p> <p>Finally, as I write this in April 2022, the war in Ukraine is at the forefront of international news. It reminds me of a lot of conversations with colleagues in Finland. Finland shares a long border with Russia and was ruled by the Russian empire for almost 200 years. Therefore, it is not surprising that geopolitics in relation to Russia is never far from the minds of Finnish people. They never joined NATO, something they are now considering, and have often maintained a neutral stance in matters related to Russia. This time that is not the case and University of Helsinki and Aalto University are offering free education to Ukrainian students. It is easy to forget when one lives in a country with oceans on two sides and relatively friends nations across the borders that when you share borders, you need to have a very different mindset. It is good to be reminded that we all have our own constraints.   </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/12256" hreflang="en">Fulbright</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Fri, 06 May 2022 18:02:57 +0000 Martha Bushong 69801 at Persistence and perseverance pays off for IT graduate  /news/2022-05/persistence-and-perseverance-pays-it-graduate <span>Persistence and perseverance pays off for IT graduate </span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Fri, 05/06/2022 - 12:35</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Benhur Hadgu describes his college journey as an uphill battle that taught him never to give up. He says, “It's easy to start anything but hard to finish.” Like many Mason students, he started his journey at Northern Virginia Community College so he could develop the habits and learn material that would prepare him for higher education.  </p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-08/Benhur_Hadgu_Graduation.jpg?itok=2jYjL6yR" width="350" height="350" alt="Benhur Hadgu graduation portrait" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Benhur Hadgu</figcaption></figure><p>“When I entered NOVA, I was determined to be successful and reach my goals. I worked hard to build good habits and routines to study and learn,” he says. “I took advantage of NOVA's opportunities, and I started to develop my mindset. I took Math and English courses from the beginning and worked hard to overcome my challenges. I always wanted to be in technology.”  </p> <p>After completing his Associate of Science degree, he found he still was not quite ready for a four-year college. He decided to get experience in IT and enrolled in Year Up (a program within the Cisco Networking Academy) which provided hands-on training and prepared him for an internship at Blue Cross Blue Shield.  </p> <p>When Hadgu enrolled full-time at Mason he was working part-time, but when he registered, he found out that some credits did not transfer from NOVA and had to retake core prerequisites and core programming courses. “I struggled the first semester due to the intense curriculum requirements, but I persisted, adapted, and did well in my courses after adjusting to Mason’s higher standards and more serious environment.” He says, “I made sure I was always around positive associations with people that stretch me and bring out the best in me.” </p> <p>It took Hadgu four and a half years to complete his bachelor’s degree from AV, but he says it was all worth it. “Mason is a good school that gives students a lot of opportunities. I now understand why it's essential to go to a good school. My life has improved. I have learned, grown, and become a better human being due to being challenged, disciplined, and pushed academically.” </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/1081" hreflang="en">transfer students</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/2026" hreflang="en">Northern Virginia Community College</a></div> </div> </div> </div> </div> </div> Fri, 06 May 2022 16:35:51 +0000 Martha Bushong 69741 at New Mason IT grad says ‘just go for it’ /news/2022-04/new-mason-it-grad-says-just-go-it <span>New Mason IT grad says ‘just go for it’ </span> <span><span lang="" about="/user/971" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Rena Malai</span></span> <span>Mon, 04/25/2022 - 15:59</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><div class="align-left"> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-04/abuirshaidpic.png?itok=9IRdb5jT" width="349" height="350" alt="Dania O Abu-Irshaid" loading="lazy" typeof="foaf:Image" /></div> </div> <p><span><span><span><span><span><span><span>It was a friend’s serendipitous homework assignment that had Dania O Abu-Irshaid, upcoming George Mason graduate from the <a href="https://ist.gmu.edu">Department of Information Sciences and Technology,</a> switch her undergrad work from pre-law to a STEM path.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>She says she’s always had a natural knack for coding, and it’s something that’s always interested her. But when she helped a fellow Mason student with a Python coding exercise, that’s when it clicked.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“I was thinking about pre-law, but after taking a class in it, I didn’t feel like it suited me. I was undecided,” says Abu-Irshaid. “Then my friend was struggling with this homework assignment and I ended up finishing it for her in five minutes. She looked at me and said, this is what you should be doing.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>When Abu-Irshaid made the move to study IT, with a concentration in cybersecurity, that’s when things really picked up for her. As the oldest child in her family, she was relied on to be the tech savvy expert and help fix wifi routers in the house or explain internet nuances to her parents. Although she is the first female in her family to study and work in STEM, she’s confident of the opportunities coming her way. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>After graduation, Abu-Irshaid will enter a ten weeklong internship with the <a href="https://www.elections.virginia.gov/">Virginia Department of Elections</a>, where she will work in the cybersecurity sector. She also sees potential for a corporate position with one of the big contenders—namely Walmart. As a resident advisor at Mason to freshman engineering students, Abu-Irshaid says some of her mentees good naturedly tease her about her Walmart aspirations to this day.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“I’m like, guys, Walmart isn’t just about celery and sticky buns, they have a corporate side,” she says. “But they’ll still ask me how Walmart’s going and what kind of merchandise I have.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>With a bright future ahead, she says she’ll miss her time at Mason, particularly the diverse community and her role as an advisor.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“I love the community and culture at Mason. There’s always something to do, and something to look forward to on campus. But I’ll hopefully be back, in some capacity,” says Abu-Irshaid.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Her message for future grads is to just go for it, whether it’s a job, course of study, or opportunity.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“It’s really as simple as that, and it’s what got me everywhere,” she says. “Just go to that club meeting, go to that class, ask your professor that question. You’re not going to get the results unless you go for it.”</span></span></span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/1606" hreflang="en">STEM</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/8541" hreflang="en">women in computing</a></div> <div class="field__item"><a href="/taxonomy/term/1421" hreflang="en">diversity</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/481" hreflang="en">Graduation</a></div> <div class="field__item"><a href="/taxonomy/term/15831" hreflang="en">CEC 2022 graduates</a></div> </div> </div> </div> </div> </div> Mon, 25 Apr 2022 19:59:42 +0000 Rena Malai 69046 at CSIRTs protect cybersecurity; expand job opportunities /news/2022-03/csirts-protect-cybersecurity-expand-job-opportunities <span>CSIRTs protect cybersecurity; expand job opportunities </span> <span><span lang="" about="/user/971" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Rena Malai</span></span> <span>Fri, 03/11/2022 - 15:05</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/shashem6" hreflang="en">Sherif Hashem</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Cybersecurity is a growing concern for anyone using technology—which is pretty much everyone. It’s an area that has seen tremendous research since the first global attacks surfaced in the late 1980s and early 1990s. </p> <p>Low-income countries can have challenges with getting appropriate cybersecurity protective measures in place and developing much-needed cybersecurity talents. To address this concern, <a href="https://ist.gmu.edu/" target="_blank">George Mason Information Sciences and Technology</a> professor <a href="https://ist.gmu.edu/profiles/shashem6" target="_blank" title="Sherif Hashem profile">Sherif Hashem</a> was part of a team that produced a report ‘Cyber Incident Management in Low-Income Countries.’ The report was funded by <a href="https://www.google.com/search?q=global+affairs+canada&client=safari&channel=mac_bm&source=hp&ei=PjsmYsC6EuqlytMP9eyUqA4&iflsig=AHkkrS4AAAAAYiZJTranFkpWk77_zhn9mZ_Ai1t09bhS&gs_ssp=eJzj4tTP1TcwzIk3z1FgNGB0YPASTc_JT0rMUUhMS0vMLCpWSE7MS0xJBADJiguE&oq=global+affai&gs_lcp=Cgdnd3Mtd2l6EAEYADILCC4QgAQQxwEQ0QMyBQguEIAEMggIABCABBDJAzIFCAAQgAQyBQgAEIAEMgUIABCABDIFCAAQgAQyCwguEIAEEMcBEK8BMgUIABCABDIFCAAQgAQ6DgguEIAEELEDEMcBEKMCOggIABCABBCxAzoRCC4QgAQQsQMQgwEQxwEQ0QM6CwgAEIAEELEDEIMBOggIABCxAxCDAToECAAQQzoHCAAQsQMQQzoQCC4QsQMQxwEQ0QMQ1AIQQzoRCC4QgAQQsQMQxwEQowIQ1AI6CwguEMcBENEDEJECOgUIABCRAjoKCC4QxwEQowIQQzoKCAAQsQMQgwEQQzoOCC4QgAQQsQMQxwEQ0QM6CwgAELEDEIMBEJECUABYgA9g5RpoAHAAeACAAXeIAZwGkgEEMTEuMZgBAKABAQ&sclient=gws-wiz" target="_blank">Global Affairs Canada</a>, and presented last month in an international webinar by the <a href="https://thegfce.org/" target="_blank">Global Forum on Cyber Expertise.</a> </p> <p>According to Hashem, having Computer Security Incidence Response Teams (CSIRTs) in place can greatly help in handling and preventing cyber attacks. He says Computer Incidence Response is a term that popped up globally about 30 years ago, and it is associated with professionals who respond to the threats made over computer systems and networks.  </p> <p>“Established CSIRTs can help detect a cyber attack when it happens, and greatly minimize its impact,” Hashem says. “Cyber attacks against critical national infrastructure can be some of the most impactful as they can potentially affect everyone in society.” </p> <p>One recent example is the Colonial Pipeline ransomware attack in 2021, the largest cyber attack on an oil infrastructure target in U.S. history, says Hashem. </p> <p>“CSIRTs across the globe work together to mitigate such cyber attacks and help bring the criminals to justice,” he says. “Without CSIRTs in situations like this, the aftermath of a cyber attack can be devastating. It’s better to be prepared and minimize any losses; recover quickly.”  </p> <p>The ‘Cyber Incident Management in Low-Income Countries’ report showcases CSIRT models and structures that are workable within limited budgets. The report also provides guidance on developing technical skills within CSIRTs and highlights a wide range of training programs and tools. </p> <p>“Our research findings can be used holistically by any entity looking to establish CSIRTs, whether there is a limited budget or not,” says Hashem. </p> <p>The first CSIRT was created by Carnegie Mellon University over thirty years ago, says Hashem. Since then, the cybersecurity space has become an area rich with job opportunities. An estimated 400,000 open cybersecurity jobs are available today in the United States alone. </p> <p>“I hope this motivates students to consider information security as a part of their education and career plan,” says Hashem. “The opportunities are endless.” </p> <p>The <a href="https://youtu.be/B0XX3Qavf9w" target="_blank">full webinar is available to view on You Tube.</a>  <a href="https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-1-v16.pdf" target="_blank">Part 1</a> and <a href="https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-2-v16.pdf" target="_blank">part 2</a> of the report are also available to view. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> </div> </div> </div> </div> </div> Fri, 11 Mar 2022 20:05:11 +0000 Rena Malai 66866 at