Training & Conferences
Total Page:16
File Type:pdf, Size:1020Kb
WWW.ISSA - COS.ORG VOLUME 6 NUMBER 6 J U N E 2 0 1 7 Training & Conferences olleagues, Our first Security+ Exam Prep Review Seminar, held on April 1 and 8, was another Hard to believe, but we’re almost huge success – as it always is – thanks to C half-way through the year. Our the exceptional work by Susan Ross and our impressive team of volunteers has volunteer instructors. And our second dedicated much time and effort to bring a Security+ Seminar kicks off in just a few variety of events to our membership. This days! Each of these seminars provides a 12- chapter hosts a lot of amazing events, all hour comprehensive due to the efforts of our review of the CompTIA volunteers. Security+ exam material. Our first conference of A Note From Over 50 students the year, the Cyber Focus registered for these Day (CFD), was a huge Seminars! success! We had over 200 Our President We held eight people attend the one-day membership meetings, in conference, earning seven Jan, Feb, Apr, and May, continuing education units. four at lunchtime and four If you weren’t able to in the evening. If you attend CFD this year, you haven’t made it to our missed some great presen- monthly meetings, here’s tations! what you missed so far: Our Training Commit- tee held two Mini- By Ms. Colleen Murphy Airport Security, by Seminars, providing three Dr. Shawn Murray continuing education opportunities for each What Constitutes mini-seminar, with more Mini-Seminars on Reasonable Security?, by Mr. David the way. If you haven’t made it to our Mini- Willson Seminars, here’s what you missed so far this Silver Linings in the Cloud, by Mr. Derek year: Cybersecurity Career Progression, by Isaacs Mr. Art Cooper; Artificial Intelligence in Do I Need an Attorney?: Cyber Legal Cyber, by Mr. Frank Gearhart; Healthcare in Landscape, by Mr. David Willson Cyber-Crisis, by Mr. Mark Spencer; and Fort Carson Cyber Program, by Ms. Using BlockChain as a Global File System, Martha Laughman by Mr. Chris Gorog. Over 100 people attended our first two Mini-Seminars of the (Continued on page 4) year! The ISSA Colorado Springs Newsletter incorporates open source news articles in compli- ance with USC Title 17, Section 107, Paragraph a (slightly truncated to avoid copyright in- fringement) as a training method to educate readers on security matters . The views expressed in articles obtained from public sources within this newsletter do not necessarily reflect those of ISSA, this Chapter or its leadership. P A G E 2 Scientists Have Found a Way to Photograph People Through Walls Using Wi-Fi By Dave Mosher, Business Insider, May 23, We scan the whole plane of a room," he says. 2017 Holl's method differs from the others in few significant ways. Wi-Fi can pass through walls. This fact is easy to take for First, it uses two antennas: one fixed in granted, yet it's the reason we place, and another that moves. The fixed can surf the web using a wireless antenna records a Wi-Fi field's background, or router located in another room. reference, for the spot it's placed in. Meanwhile, the other antenna is moved by hand to record However, not all of that the same Wi-Fi field from many different points. microwave radiation makes it to or from our phones, tablets, and "These antennas don't need to be big. They laptops. Routers scatter and can be very small, like the ones in a bounce their signal off objects, smartphone," Holl says. illuminating our homes and Second, both antennas not only record the offices like invisible light bulbs. intensity (or brightness) of a Wi-Fi signal, but Now, German scientists also its phase: a property of light that comes have found a way to exploit this from the fact it's a wave. Laser light is all one property to take holograms, or 3D phase, for example, while an incandescent bulb photographs, of objects inside of a room - puts out a mix of different phases of light. from outside of the room. Similar to lasers, Wi-Fi routers emit "It can basically scan a room with microwave radiation in one phase. someone's Wi-Fi transmission," Philipp Holl, a Finally, the signals from both antennas are 23-year-old undergraduate physics student at simultaneously fed into a computer, and the Technical University of Munich, told software teases out the differences of intensity Business Insider. and phase "more or less in real-time," says Holl initially built the device as part of his Holl. bachelor thesis with the help of his academic This is where the magic happens: The supervisor, Friedemann Reinhard. Later on software builds many two-dimensional images the two submitted a study about their as one antenna is waved around, then stacks technique to the journal Physical Review them together in a 3D hologram. And because Letters, which published their paper in early Wi-Fi travels through most walls, those “You could May. holograms are of objects inside a room. probably use a Holl says the technology is only in Holl and Reinhard's first holograms are of a drone to map prototype stage at this point, and has limited shiny metal cross placed in front of a Wi-Fi resolution, but is excited about its promise. router: out the inside of "If there's a cup of coffee on a table, you The resulting images may not look like an entire may see something is there, but you couldn't much, but they prove the concept works: the building in 20 to see the shape," Holl says. "But you could moving antenna can capture Wi-Fi shadows make out the shape of a person, or a dog on and reflections of objects in 3D, right through a 30 seconds..” a couch. Really any object that's more than 4 wall. centimetres in size." Above is a Wi-Fi hologram of a cross. Holl's The ability to see through walls using Wi- technique can capture the WiFi shadow cast by Fi has been around for years. the object (left) through a wall. Some setups can detect home intruders The applications for Holl's Wi-Fi or track moving objects with one or two Wi-Fi holography, he says, are pretty expansive. antennas. Others use an array of antennas to Adding an array of reference antennas, say, build two-dimensional images. But Holl says inside of a truck, might help rescue workers no one has used Wi-Fi to make a 3D detect people in rubble left by an earthquake - hologram of an entire room and the stuff or spy agencies see if anyone is home. inside of it. Read the rest here: "Our method gives you much better images, since we record much more signal. http://www.sciencealert.com/scientists-have- found-a-way-to-photograph-people-through- walls-using-wifi ISSA - C O S N E W S V O L U M E 6 P A G E 3 Membership Update First, I would like to welcome our new members on behalf of the Chapter! When you’re participating in Chapter activities, please take a moment to introduce yourself to members of the board, me, and other New Members members. Don’t forget to identify yourself as a new member and May feel free to ask for help or information. Thanks for joining the Chapter John Andelfinger and don’t forget to look for opportunities to lend your expertise to improve the Chapter. We’re always open to new ideas and suggestions. Timothy Montgomery We are holding relatively steady on our membership— ~475 members Andrew Engrasci as of the end of May. Overall, we are maintaining our membership with James Parker renewals and new memberships—both general and students/Freemiums. Kudos to everyone who referred a student or general member. Keep those Bonnie Moss renewals and new members coming in! Remember that for each referral Erick Herzberg you make, you are entered into the ISSA International quarterly drawing for various prizes. By emphasizing the Freemium program again I want to ensure everyone is aware that it is now an official ISSA program instead of the pilot program we’ve been working with for the last couple of years. It is no longer showing as a member type when you try to join. Now we issue a code to potential student members that they input on the payment page that cancels out the student membership fees. Eligibility rules governing the program remain the same: Full time students, not fully employed in Cybersecurity, etc. If you are referring a student, please have them contact me and I can confirm their eligibility for Freemium (or not). If they are eligible, I will provide a chapter unique payment code for them to use in the payment block when they join as a “Student” member so they can join for free. Students who don’t meet the Freemium criteria can still enroll as “Student” members, too. However, they will have to pay the current student membership rate of $55. If you know of students who might be eligible, please have them contact me. David Reed Membership Committee Chairman [email protected] Lockheed Martin bets on blockchain for cybersecurity By Luke Lancaster, C|Net, May 2, 2017 Lockheed Martin has contracted Guardtime Federal to provide blockchain cyber security, the defense company announced in a blog post. It's the first US defense contractor to adopt blockchain as part of its security approach and Lockheed Martin says the part- nership will allow it to "realize more efficient and secure software development and supply chain risk management." A blockchain is a type of secure database that maintains a constantly expanding list of records.