Cybersecurity /engineering/ en Two 兔子先生传媒文化作品 students earn scholarships for women in cybersecurity /engineering/2019/09/27/two-cu-boulder-students-earn-scholarships-women-cybersecurity <span>Two 兔子先生传媒文化作品 students earn scholarships for women in cybersecurity</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-09-27T09:12:46-06:00" title="Friday, September 27, 2019 - 09:12">Fri, 09/27/2019 - 09:12</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/engineering/sites/default/files/styles/focal_image_wide/public/article-thumbnail/hayes-peyrot.jpg?h=83eb93c2&amp;itok=iQa9qeIN" width="1200" height="600" alt="Stacy Hayes and Jennifer Peyrot"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/engineering/taxonomy/term/419"> Awards </a> <a href="/engineering/taxonomy/term/417"> Diversity </a> <a href="/engineering/taxonomy/term/387"> Students </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/engineering/taxonomy/term/124" hreflang="en">Blog</a> <a href="/engineering/taxonomy/term/431" hreflang="en">Cybersecurity</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default 3"> <div class="ucb-article-text" itemprop="articleBody"> <div><div class="feature-layout-callout feature-layout-callout-xlarge"> <div class="ucb-callout-content"><p> </p><div class="imageMediaStyle medium_750px_50_display_size_"> <img loading="lazy" src="/engineering/sites/default/files/styles/medium_750px_50_display_size_/public/article-image/hayes-peyrot.jpg?itok=HbpP7TjO" width="750" height="422" alt="Stacy Hayes and Jennifer Perot with flatirons in background"> </div> <p>Senior Stacy Hayes (left) and graduate student Jennifer Peyrot (right) are the college's newest cyberscholars.&nbsp; </p></div> </div><p class="lead">Two College of Engineering and Applied Science students have received <a href="https://cra.org/cra-wp/scholarships-and-awards/scholarships/swsis/" rel="nofollow">Scholarships for Women Studying Information Security</a>.&nbsp;</p><p>Undergraduate Stacy Hayes and graduate student Jen Peyrot have both received a prestigious SWSIS award 鈥 only 16 were given out this year 鈥 that grants at least $5,000 to each winner.&nbsp;鈥淚t鈥檚 unusual for a university to have more than one student recipient of this national award in a given year,鈥 said Dan Massey, director of the Technology, Cybersecurity and Policy program. 鈥淲e have many women expressing interest in cybersecurity at the college, and to have two of our students recognized in this way shows the caliber of work they are producing.鈥</p><h2>Drawn to national defense</h2><p>Hayes is a senior studying computer science, where she is also pursuing a business minor. She is president of the 兔子先生传媒文化作品 <a href="http://www.cutbp.org/SiteFiles/Home.html" rel="nofollow">Tau Beta Pi&nbsp;chapter</a> and is actively involved in <a href="http://wic.cs.colorado.edu/" rel="nofollow">Women in Computing</a>.&nbsp;</p><p>Originally planning to get a business degree, Hayes made a last-minute decision to apply to engineering school instead. 鈥淚 always liked math,鈥 said Hayes, 鈥渁nd a friend told me I鈥檇 be a great engineer. Now she gets to say 鈥業 told you so.鈥欌</p><blockquote><p>鈥淲ith my dedication to help protect the nation, I recognize that my understanding of information security concepts is crucial so that I may be part of preventing further breaches. The safety and security of this country remains of the utmost importance and I want to dedicate my life to being part of the solution.鈥 - Stacy Hayes</p></blockquote><p>She discovered a strong aptitude for coding and fell in love with computer science, but after exploring possible career paths she might take with her degree, they all came up short for her.</p><p>鈥淣one of them seemed to fulfill my desire to contribute back to society,鈥 Hayes said. 鈥淢y search led me to national defense, where I could make a bigger impact.鈥&nbsp;</p><p>She is attracted to cybersecurity because it is a constantly evolving field that, as she says, will never be fully figured out. Hayes has interned for two summers in software development at Lockheed Martin, where she participated on teams with a broad range of security expertise. She hopes to work there after graduation and contribute to protecting national security.</p><h2>From the Army to the classroom</h2><p>Shortly after signing up for her first cybersecurity course, Peyrot decided to pursue a Master鈥檚 of Science in Technology, Cybersecurity and Policy. She wasn鈥檛 completely new to the subject, however, having previously served as a signals intelligence analyst in the U.S. Army. &nbsp;</p><p>鈥淲hen I was in the Army, I was a codebreaker, which is really data security, but people didn鈥檛 call it that back then,鈥 Peyrot said.</p><p>After the Army, she became a teacher and then an instructional technology coordinator in the St. Vrain Valley School District. In 2017, she organized a GenCyber camp with some advice and guidance from Massey. She began supporting teachers who were piloting cybersecurity education in the classroom and quickly became the point person for cybersecurity in the whole district.</p><blockquote><p>鈥淓ven if students don鈥檛 go into the field of cybersecurity, they can bring that perspective into their business, and they can realize that this is part of everyday life and something that everyone needs to consider.鈥 - Jennifer Peyrot</p></blockquote><p>鈥淓ven if students don鈥檛 go into the field of cybersecurity, they can bring that perspective into their business, and they can realize that this is part of everyday life and something that everyone needs to consider,鈥 said Peyrot.&nbsp;</p><p>The district is especially supportive of cyber education because there are so many cybersecurity firms in the area. Peyrot is engaged in developing partnerships with these companies to give students an opportunity to practice what they learn and see if this might be a career path for them.&nbsp;</p><p>She plans to continue her role in the school district while pursuing her master鈥檚 at 兔子先生传媒文化作品. She noted that, as a teacher, the scholarship was essential for her to be able to afford graduate school.</p><p><br> &nbsp;</p></div> </div> </div> </div> </div> <div>Undergraduate Stacy Hayes and graduate student Jen Peyrot have both received a prestigious SWSIS award 鈥 only 16 were given out this year 鈥 that grants at least $5,000 to each winner. </div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Fri, 27 Sep 2019 15:12:46 +0000 Anonymous 3513 at /engineering Students compete in national Hacking for Defense contest /engineering/2019/07/19/students-compete-national-hacking-defense-contest <span>Students compete in national Hacking for Defense contest</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-07-19T15:06:18-06:00" title="Friday, July 19, 2019 - 15:06">Fri, 07/19/2019 - 15:06</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/engineering/sites/default/files/styles/focal_image_wide/public/article-thumbnail/founders_fund_0.jpg?h=27f988cb&amp;itok=3H6m40Dg" width="1200" height="600" alt="Students participating in Starts H4D stand together at Founders Fund sign"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/engineering/taxonomy/term/387"> Students </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/engineering/taxonomy/term/431" hreflang="en">Cybersecurity</a> </div> <span>Trevor Stanley</span> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default 3"> <div class="ucb-article-text" itemprop="articleBody"> <div><div class="feature-layout-callout feature-layout-callout-xlarge"> <div class="ucb-callout-content"><p> </p><div class="imageMediaStyle medium_750px_50_display_size_"> <img loading="lazy" src="/engineering/sites/default/files/styles/medium_750px_50_display_size_/public/article-image/founders_fund_0.jpg?itok=woV_nZ0s" width="750" height="450" alt="Students participating in Starts H4D stand together at Founders Fund sign"> </div> <p>From left, team members included Trevor Stanley, Chris Coffey, Will Shand, Cory Cranford and Gerano Montoya.</p></div> </div><p>兔子先生传媒文化作品 students were among only six universities invited to present an innovative network security concept in June as part of <a href="https://www.nsin.us/events/starts-h4d/" rel="nofollow">Starts H4D</a>, a pitch competition for cutting-edge national security solutions.</p><p>The group presented at Founders Fund, a leading venture capital firm in San Francisco, alongside teams from Stanford, University of Southern California and Duke on projects ranging from image recognition of drones, GPS jammer detection, innovative learning platforms and IoT security.</p><p>The 兔子先生传媒文化作品 team included computer science graduate student Trevor Stanley, Leeds School of Business student Chris Coffey, applied mathematics master鈥檚 student Will Shand, Technology, Cybersecurity and Policy program master鈥檚 student Cory Cranford, and mechanical engineering master鈥檚 student Gerano Montoya.</p><p>Their team, CharIoT (Characterizing the Internet of Things), developed a new machine learning approach for identifying different kinds of internet-enabled devices on a network.</p><p>Here, Trevor Stanley shares his takeaways from the class and competition:</p><p><em>The national Hacking for Defense program, sponsored by the <a href="https://www.nsin.us/" rel="nofollow">National Security Innovation Network</a>, was renamed Designing for Defense at 兔子先生传媒文化作品 because of the emphasis our mentors placed on understanding first principles, making sense of extremely ambiguous and at times complex problems, and creating original solutions.</em></p><p><em>I participated in a hackathon hosted by NSIN (formerly called MD5) last year and immediately applied for next year鈥檚 Designing for Defense course. I specifically set out to expand my knowledge and experiences through the course and felt empowered to take leadership on developing a solution to a real-world problem given to our team by the National Security Agency.</em></p><p><em>Our inclusive team of computer science students, applied math students and business students was committed to developing an effective and innovative solution for characterizing Internet of Things device traffic on a network, which could become invaluable for protecting military and healthcare networks.</em></p><p><em>Effective teamwork and communication was the biggest challenge and resource for our team. Over the semester our team dynamic and collective understanding of the NSA鈥檚 problem evolved. Helping the technical students and the business students communicate effectively with one another was incredibly rewarding for me personally, as I was able to draw on the skills I had developed while working on the Technology to Market team in my research group.</em></p><p><em>As a team, we were able to further develop our ability to respectfully debate, challenge each other鈥檚 opinions, communicate, collaborate, and effectively execute on work that was essential to our mission. For instance, our team was the only one among the other seven that raised $700 in seed funding, formed a company, created over 80 datasets, and conducted over 80 interviews with industry and government experts.</em></p><p><em>After winning the final competition between other 兔子先生传媒文化作品 teams working with various Department of Defense sponsors, our team decided to continue our project beyond the classroom.</em></p><p><em>We applied for the national Hacking for Defense competition, Starts H4D, co-sponsored by Founders Fund and NSIN in the heart of Silicon Valley.</em></p><p><em>I was humbled and inspired by the innovative solutions developed by the other teams and shared in the collective zeal for civilian service. CharIoT is a truly unique opportunity to continue adding value to the defense community as civilians, and we鈥檒l continue this form of national service by utilizing the resources we gained from Starts H4D to further develop our IoT security solution.</em></p></div> </div> </div> </div> </div> <div>兔子先生传媒文化作品 students were among only six universities invited to present an innovative network security concept in June as part of Starts H4D, a pitch competition for cutting-edge national security solutions.</div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Fri, 19 Jul 2019 21:06:18 +0000 Anonymous 3107 at /engineering 兔子先生传媒文化作品 is top producer in national cybersecurity competition /engineering/2019/06/25/cu-boulder-top-producer-national-cybersecurity-competition <span>兔子先生传媒文化作品 is top producer in national cybersecurity competition</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-06-25T13:21:44-06:00" title="Tuesday, June 25, 2019 - 13:21">Tue, 06/25/2019 - 13:21</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/engineering/sites/default/files/styles/focal_image_wide/public/article-thumbnail/hackathon.png?h=90b2bfd9&amp;itok=QXr92rL0" width="1200" height="600" alt="students collaborating around computers"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/engineering/taxonomy/term/413"> Education </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/engineering/taxonomy/term/431" hreflang="en">Cybersecurity</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default 3"> <div class="ucb-article-text" itemprop="articleBody"> <div><p> </p><div class="imageMediaStyle medium_750px_50_display_size_"> <img loading="lazy" src="/engineering/sites/default/files/styles/medium_750px_50_display_size_/public/article-image/hackathon.png?itok=HIghdSh9" width="750" height="191" alt="Students in a large room collaborating with each other in front of computers."> </div> <p>Nearly 13,000 college students across America took part in the first stage of 2019&nbsp;<a href="https://www.cyber-fasttrack.org/" rel="nofollow">Cyber FastTack</a>&nbsp;competition during April,&nbsp;solving a series of increasingly difficult cybersecurity challenges to demonstrate their aptitude for cybersecurity careers.&nbsp;</p><p>Based on their success, 2,400 of those students 鈥 including 24 from the University of Colorado Boulder 鈥 received invitations to take part in the second round. In fact, 兔子先生传媒文化作品&nbsp;<a href="https://www.sans.org/cyber-fast-track/state-ranking" rel="nofollow">produced the most first-stage qualifiers</a>&nbsp;in Colorado and ranked No. 14 in the nation.</p><p>Students are now competing in the second stage for $2.5 million in scholarships for college tuition and advanced cybersecurity training, as well as for recognition for themselves and their colleges.</p><p>鈥淚t鈥檚 great to be ranked first in the state and we鈥檙e proud of our 24 students who have advanced to the second stage,鈥 said Dan Massey, director of&nbsp;<a href="/program/tcp/" rel="nofollow">Technology, Cybersecurity and Policy (TCP)</a>&nbsp;and professor of computer science. 鈥淭his is another indicator of the growing interest in the field which our recently launched cybersecurity program addresses.鈥</p></div> </div> </div> </div> </div> <div>Sponsored by governors in 25 states, the program trains students in critical skills while they compete for scholarships</div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Tue, 25 Jun 2019 19:21:44 +0000 Anonymous 3001 at /engineering