You are a SPECIAL Librarian! You are a Military Librarian!

Archive | Web/Tech

Registration Opens for U.S. Cyber Challenge’s Annual Cyber Quests Competition

Upcoming Cyber Quests Competition to Determine Qualifiers for Summer 2016 Cyber Campscyberchallenge
Washington, D.C., April 11, 2016 – U.S. Cyber Challenge opened registration today for the 2016 Cyber Quests online competition. The annual Cyber Quests competition
determines who qualifies for the U.S. Cyber Challenge (USCC) Summer Cyber Camps, a leading nationwide program in cybersecurity workforce development. While registration
opened today, the actual competition will open on Monday, April 25, 2016, with the competition closing on Friday, May 6, 2016. To register and compete, visit uscc.cyberquests.org.
The Cyber Quests competition and USCC camps are designed to improve cybersecurity skills, provide training & mentorship from renowned instructors and highlight skills for potential employers. For this specific Cyber Quests, competitors need to identify incident indicators and ultimately apply skills required of a Security Monitoring and Event Analyst job role as outlined in the Council on CyberSecurity’s Mission Critical Role Project report.
For Cyber Quests, participants will have 24-hours to complete the competition, beginning from the time they begin answering questions. Winners are determined based on who achieves the highest score in the shortest amount of time, and top performers who are 18 years or older and U.S. citizens, will then be eligible to receive an invitation to one of the week-long Cyber Camps offered across the country. The three camps will be hosted by Delaware State University, Moraine Valley Community College (Illinois), and Southern Utah University.
Those who attend a USCC Cyber Camp will receive high level instruction from some of the nation’s most talented cybersecurity teachers and practitioners, participate in handson
lab activities, network with employers at the camp job fair, and compete in a capture-the-flag competition that challenges both their technical skill sets and their ability to work
in a team environment.
U.S. Cyber Challenge is supported in part through sponsorships by AT&T, Cyber Ninjas, Workday, NIC, PCM-G, Monster Government Solutions, Federal CIO Council, Common Knowledge Scholarship Foundation, the Department of Homeland Security, Microsoft, SANS Institute, Lockheed Martin, AFFIRM, and Amazon Web Services.
For information about becoming a sponsor of a Summer Cyber Camp, contact Karen S. Evans, National Director at kevans@uscyberchallenge.org. To learn more about Cyber Quests, visit the website at USCC.CyberQuests.org. Details about the summer camps are on the U.S. Cyber Challenge website – www.USCyberChallenge.org.
###
About U.S. Cyber Challenge:
U.S. Cyber Challenge (USCC) is a program of the Council on CyberSecurity (CCS), a
501(c)(3) organization, and has the mission to significantly reduce the shortage in the
cyber workforce by serving as the premier program to identify, attract, recruit and place
the next generation of cybersecurity professionals. The goal of U.S. Cyber Challenge is to
find 10,000 of America’s best and brightest to fill the ranks of cybersecurity professionals
where their skills can be of the greatest value to the nation. For more information, visit
www.USCyberChallenge.org.

FOR IMMEDIATE RELEASE
Contact: Katie Hanson
Phone: 847-337-1818
Email: Katie@ShermanConsultingInc.com

Posted in Students, Training, Web/TechComments Off on Registration Opens for U.S. Cyber Challenge’s Annual Cyber Quests Competition

Posts for Teach Me Technology Day

Posts for Teach Me Technology Day

Posts are now available on New Technologies for Federal Libraries blog for the Teach Me Technology Day (12 April 2016) .  More will be added as I receive them from those who did presentations and demonstrations.  It was a great success.  Thank you to all who participated.

https://newtech4fedlib.sites.usa.gov/category/teach-me-tech-day/

Members of the working group:

  • Co-Chair: Nancy Faget (Army Research Laboratory nancy.g.faget.civ@mail.mil <mailto:nancy.g.faget.civ@mail.mil>  )
  • Co-chair: Lila Faulkner (Department of Justice libraries lila.faulkner@doj.gov <mailto:lila.faulkner@doj.gov> )
  • Web chair: Bill Drew (Air Force Research Laboratory, wilfred.drew.ctr@us.af.mil <mailto:wilfred.drew.ctr@us.af.mil> )
  • Data chair: Chris Belter (NIH library, christopher.belter@nih.gov <mailto:christopher.belter@nih.gov> )
  • Programming chair:  Lee Lipscomb (Federal Judicial Center llipscomb@fjc.gov <mailto:llipscomb@fjc.gov>  )

 

Bill Drew

Web Chair – FEDLINK Libraries and Emerging Technologies Working Group

Posted in NewTech4FedLib, Web/TechComments Off on Posts for Teach Me Technology Day

Phishing Emails and You — Monthly Cyber Security Tips Newsletter

Phishing Emails and You

From the Desk of Desk of Thomas F. Duffy, Chair, MS-ISAC

Be Aware of Phishing Scams

First and foremost you should utilize a spam filter (this service is should be provided by your email provider), keep all of your systems patched and your anti-virus software up to date. The second line of defense against phishing is you. If you are vigilant, and watch for telltale signs of a phishing email, you can minimize your risk of falling for one. Telltale signs of a potential phishing email or message include messages from companies you don’t have accounts with, spelling mistakes, messages from the wrong email address (e.g. info@yourbank.fakewebsite.com instead of info@yourbank.com), generic greetings (e.g. “Dear user” instead of your name), and unexpected messages with a sense of urgency designed to prompt you into responding quickly, without checking the facts. “Resume” and “Unpaid Invoice” are popular attachments used in phishing campaigns. Here are some scenarios you may encounter:Reserved: Social engineering refers to the methods attackers use to manipulate people into sharing sensitive information, or taking an action, such as downloading a file. Sometimes social engineers interact with the victim to persuade the victim to share details or perform an action, such as entering information into a login page.

  • An email appearing to be from the “fraud department” of a well-known company that asks you to verify your information because they suspect you may be a victim of identity theft.
  • An email that references a current event, such as a major data breach, with a malicious link to setup your “free credit reporting.”
  • An email claiming to be from a state lottery commission requests your banking information to deposit the “winnings” into your account.
  • An email with a link asking you to provide your login credentials to a website from which you receive legitimate services, such as a bank, credit card company, or even your employer.
  • A text message that asks you to call a number to confirm a “suspicious purchase” on your credit card. When you call, the operator will know your name and account information and ask you to confirm your ATM PIN. (This is a form of SMSishing – What should you do?)

Recommendations

  • Be suspicious of unsolicited emails, text messages, and phone callers. Use discretion when providing information to unsolicited phone callers, and never provide sensitive personal information via email.
  • If you want to verify a suspicious email, contact the organization directly with a known phone number. Do not call the number provided in the email. Or, have the company send you something through the US mail (which scammers won’t do).
  • Only open an email attachment if you are expecting it and know what it contains. Be cautious about container files, such as .zip files, as malicious content could be packed inside.
  • Visit websites by typing the address into the address bar. Do not follow links embedded in an unsolicited email.
  • Use discretion when posting personal information on social media. This information is a treasure-trove to spear phishers who will use it to feign trustworthiness.
  • Keep all of your software patched and up-to-date. Home users should have the auto update feature enabled.
  • Keep your antivirus software up-to-date to detect and disable malicious programs, such as spyware or backdoor Trojans, which may be included in phishing emails.

For More Information

The information provided in the Monthly Security Tips Newsletter is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network from their home computer. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes.

Disclaimer: These links are provided because they have information that may be useful. The Center for Internet Security (CIS) does not warrant the accuracy of any information contained in the links and neither endorses nor intends to promote the advertising of the resources listed herein. The opinions and statements contained in such resources are those of the author(s) and do not necessarily represent the opinions of CIS.

Center For Internet Security

Northeast Headquarters | 31 Tech Valley Drive | East Greenbush, NY 12061 | Phone: 518-266-3460

Mid-Atlantic Headquarters | 1700 North Moore Street | Suite 2100 | Arlington, VA 22209 | Phone: 703-600-1935

Posted in Current Events, Web/TechComments Off on Phishing Emails and You — Monthly Cyber Security Tips Newsletter

Translate:

DMIL on Facebook

"Ike and Dutch: Mentor, Protégé, and Common Sense by Dr. Gene Kopelson" presentation at the U.S. Army Heritage and Education Center

https://youtu.be/9jZSI6bF7d0

Published on Feb 24, 2017

As Ronald Reagan traveled across the United States campaigning for the highest office in the land, the Governor of California possessed an ace in his hand unmatched by his opponents: the ear and advice of former president Dwight D. Eisenhower. Reagan was in constant contact with Ike, following his advice at every turn and going so far as to base his entire 1966 campaign on his mentor’s own successful run years before. Eisenhower’s astute view of internal Washington politics, foreign affairs, military matters, and the swirling pool of primary rivals, provided his protégé the fuel he needed to learn, and eventually win, the war of words. In his latest book, Reagan’s 1968 Dress Rehearsal: Ike, RFK, and Reagan’s Emergence as a World Statesman, Dr. Gene Kopelson outlines the story of Reagan’s first presidential bid with an in-depth look behind the scenes. On Wednesday, February 15, 2017 at the U.S. Army Heritage and Education Center in Carlisle, Pennsylvania, Dr. Kopelson gave a lecture titled, “Ike and Dutch: Mentor, Protégé, and Common Sense,” to delve deeper into the relationship between Reagan and his mentor and how it not only shaped Reagan’s future campaigns, but his presidency, as well.

In his lecture at the USAHEC, Dr. Kopelson uses never-before-tapped audio clips, interviews with the original 1968 campaign staff, Eisenhower’s personal diary, and material straight from personal correspondence to show how Eisenhower influenced Reagan’s politics and eventually, his far-reaching presidential policies. From Reagan’s hawkish views on Vietnam to his perspective on the Arab-Israeli situation, his groundbreaking steps with Gorbachev and the Soviets to nuclear defense, Eisenhower and Reagan had a close and personal relationship which changed America’s future.

Lecture Date: February 15, 2017

Length: 52 Minutes
... See MoreSee Less

Fri February 24th  ·  

View on Facebook

Military Libraries Division of the Special Libraries Association shared The Library of Congress's video. ... See MoreSee Less

Fri February 24th  ·  

View on Facebook

Military Libraries Division of the Special Libraries Association shared Henry Louis Gates, Jr.'s video. ... See MoreSee Less

Fri February 24th  ·  

View on Facebook

Military Libraries Division of the Special Libraries Association shared U.S. Naval War College Library's photo. ... See MoreSee Less

Thu February 23rd  ·  

View on Facebook

Follow Us On:

Categories

Blog Archives