September 25, 2018

The U.S. Cyber War Needs More Soldiers

In a small town in Alaska, a sophisticated cyber attack nearly wiped out the Matanuska-Susitna (Mat-Su) Borough network servers with a virus cocktail of ransomware, a trojan horse, time bomb, Cryptolocker and dead man’s switch, according to reports by BleepingComputer and BBC. This attack forced the town’s businesses to dust off old typewriters and conduct business by hand until IT experts were able to get back online. While the use of machines that click clack is unsustainable in the digital world, the Mat-Su attack is just one example of the type of criminal activity happening in the public sector that…

How does Blockchain Impact Privacy?

Blockchain believers hail the distributed ledger technology as a transformative means to enhance trust and transparency. But how does it impact privacy? Cyber Security Expert and UAT Adjunct Professor Damian Chung empowers his students to develop blockchain solutions for real-world problems. Despite his enthusiasm for blockchain technology, he still preaches caution: “Companies looking to implement blockchain solutions will have to consider how much anonymity and privacy is required so that the proper architecture is designed. The more restrictive the environment, the lower the user adoption rate. Naturally, a permissioned blockchain would have less nodes but contain better privacy. Even in…

What is an Ethical Hacker?

Ethical Hackers are talented hackers who use their superpowers for good. In essence, hackers are smart people who want to understand how things work. They tear things down to their basic components—a process known as reverse engineering—to get a deep understanding of something. The term hacker is often misused or misunderstood in the media and in the community. There are actually three different types of hackers: white hats (the good guys), black hats (the bad guys) and gray hat (the guys who ride that good guy/bad guy line). If companies and organizations don’t understand how hackers can get into their…

5 Tips for Launching Your Cyber Security Career

We may hit 3.5 million unfilled cyber security jobs by 2021. That’s a lot of SOC analysts, network engineers, systems administrators, IT auditors and penetration testers. Education, business, government and community partners all recognize the cyber skills gap, but it’s still tough to get a job—or at least the job that you want. We asked University of Advancing Technology Cyber Security Program Champion Greg Miles to share his top tips for launching a successful career in cyber security. We also invited McKesson’s Head of Cyber Security Active Defense Lonnie Benavides to campus to share his industry insights with UAT students. Here are their…

Why You Should Study Blockchain

On April 27, 2018, North Korea and South Korea signed the Panmunjom Declaration for Peace, Prosperity and Unification of the Korean Peninsula. Two electronic versions—one in English and one in Korean—have been stored on the Ethereum blockchain. The energy industry alone has invested $1 billion in blockchain. And four of the world’s largest automakers want to put blockchain technology in your car. “Blockchain is right up there with the invention of the Internet,” said Damian Chung, Sr. Director of Cybersecurity Engineering and Development at Dignity Health. Chung thinks blockchain has the potential to revolutionize healthcare, empower businesses to bypass the middle man…

Summer Sizzles with Cyber Security

Opportunities in Cyber Security heat up during the summer with well-known industry events like Black Hat and DEF CON! Each summer, UAT Cyber Security students can apply to work as paid volunteers at the iconic Black Hat Briefings in Las Vegas. No, they aren’t there to party! At Black Hat, they gain industry experience in setting up networks, WiFi connections, routers, switches, and much more. This internship alone can open so many doors for students looking to network and break into the industry upon graduation. The day after Black Hat ends, DEF CON begins and many students stick around to…

Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

Antimatter Security LLC

Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC. The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” Participants will immerse themselves in the world…

UAT CCDC Team Places 3rd, Qualifying for Regionals

2018 CCDC Qualifier

The results are in! Out of 17 teams competing in the CCDC Qualifier, UAT had to place 8th or better… UAT placed 3rd overall and took 1st in the defense category. Congrats to this amazing group of dedicated Network Security students. Currently UAT is the top Arizona College coming out of the 2018 CCDC Qualifier. Next stop is the regionals. Here are the standings: 1 – Cal Poly Pomona 2 – Stanford Univ. 3 – University of Advancing Tech 4 – CSU Northridge 5 – UC Riverside 6 – San Diego State Univ. 7 – National Univ. 8 – Arizona…

What is Network Security?

What is Cyber Security

Blog co-written by UAT Cyber Security Program Champion Greg Miles and Digital Media Maven Lauren Fach Network security, or cyber security, is an industry where professionals are trained to prevent and monitor unauthorized access or attempts to access, misuse, or modify a computer network and network-accessible resources. A network can be private, like within a company, school, business, or home and is designed to keep users out that do not have the correct login credentials. Other networks may be open to public access; an example would be the free Wi-Fi at Starbucks or a hotel. Many Network Security pros will warn against using public Wi-Fi…

CCDC Qualifier This Saturday at UAT

Cyber Security Degree at UAT

Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach the regionals, they first must qualify. The CCDC Qualifier takes place on Saturday, Jan. 27, and our students will compete from the Cyber Warfare Range on campus, from 10:30 a.m. – 4:30 p.m. “UAT is competing against over 16 other colleges and we are all Blue Teams, defending servers against the CCDC Red Team. They have practiced their skills for months and I wish them all good luck this Saturday,”…