Personal tools
  •  
You are here: Home Tutorials WORLDCOMP'15 Tutorial: Dr. George Markowsky
Call For Participation
General Attendees
Click here for details


Call for Papers
Submission of
LATE BREAKING PAPERS

Click here for details


Important Dates
July 27-30, 2015
The WORLDCOMP'15
20 joint conferences


Featured Workshops
Doctoral Colloquium
&
Demos Sessions

Click here for details


« September 2015 »
Su Mo Tu We Th Fr Sa
12345
6789101112
13141516171819
20212223242526
27282930
 

WORLDCOMP'15 Tutorial: Dr. George Markowsky

Last modified 2015-07-12 11:17


Cyberwarfare, Cybercrime and Cybersecurity
Dr. George Markowsky
Professor of Computer Science and Director Cybersecurity Lab
University of Maine
Orono, Maine, USA

Date & Time: July 28, 2015 (05:40pm - estimated duration: about 2+ hours)
Location: Ballroom 2


DESCRIPTION

    This tutorial will be divided into three parts. The first part will deal with cyberwarfare and cybercrime, the second part will survey some of the tools and techniques used for cyberoffense and cyberdefense. The third part will show how to set up your own cybersecurity lab.

    In the first part of this tutorial, we will show that cyberwarfare can be thought of as the latest embodiment of military intelligence. The ubiquity of computing devices has blurred the distinction between kinetic and non-kinetic forms of warfare. This tutorial will survey the precursors of cyberwarfare, the current state of cyberwarfare and some scenarios for how it might develop in the future. We will discuss how cyberwarfare relates to cybercrime, terrorism, hacktivism, and citizen action. We will also name the most active parties in the cyberwar space and what their strategies are. Cyber warfare is a real phenomenon and is a major force in the political landscape. Cyber warfare has the capability to engage the individual citizen. We will discuss how people can avoid being collateral damage in the constant cyber warfare that is taking place on the Internet.

    In the second part of the tutorial, we will discuss some key concepts necessary for understanding cybersecurity. These include some basic networking concepts such as IP addresses, protocols, scanning and packet captures. Exercises will include reading and understanding simple scanning results and packet captures.

    The third part of the tutorial will discuss the building of a cybersecurity lab based on Kali Linux. From 2006 through 2012, a group called Offensive Security put out a series of collections of hacking tools that were called BackTrack. BackTrack Version 5 was released on August 13, 2012 and contained over 300 penetration testing (“hacking”) tools. Offensive Security decided to revise their entire approach and on March 13, 2013 the first version of their revised toolkit, Kali 1.0, was released. We will discuss the use of virtual machines in building a cybersecurity lab and experimenting with some of the material presented in the first two parts of the tutorial. All the tools discussed in this tutorial are open source and available free of charge.

    No prior cybersecurity experience is required to attend this tutorial.


OBJECTIVES

    • To survey the cyberwarfare, cybercrime and cybersecurity landscape and to a better understanding of what is happening out in cyberspace.
    • To provide basic knowledge of some key concepts in cybersecurity.
    • To provide basic knowledge that can be used for protection in cyberspace.
    • To provide instruction on how to set up a comprehensive, personal cybersecurity lab that can be used for further study.

INTENDED AUDIENCE

    People who have experience with computers and who are interested in cybersecurity.

BIOGRAPHY OF INSTRUCTOR

    Dr. George Markowsky is Professor of Computer Science and Director of the Cybersecurity Lab in the School of Computing and Information Science at the University of Maine. He teaches cybersecurity at the University of Maine and coaches the Cyber Defense Team. In 2013-2014 he was a Visiting Scholar in the Department of Computing Security at the Rochester Institute of Technology. His website is http://DrGM.us and the website of his lab is http://mainecybersecurity.org.

Conference Proceedings
Get WORLDCOMP'13 & '14 Proceedings
Click Here

Past Events
WORLDCOMP'14
Click Here

WORLDCOMP'13
Click Here

WORLDCOMP'12
Click Here

WORLDCOMP'11
Click Here

WORLDCOMP'10
Click Here

WORLDCOMP'09
Click Here

WORLDCOMP'06, '07, & '08
Click Here


Photo Galleries

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events




 


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)