PURE CYBERSECURITY Michigan Is Taking a Leading Role and Developing Innovative Solutions for Protecting the Security of Systems and People

Total Page:16

File Type:pdf, Size:1020Kb

PURE CYBERSECURITY Michigan Is Taking a Leading Role and Developing Innovative Solutions for Protecting the Security of Systems and People PURE CYBERSECURITY Michigan is taking a leading role and developing innovative solutions for protecting the security of systems and people. MICHIGAN MEANS SUCCESS more than 123,000 engineers in the state— 3 Michigan has developed a robust cybersecurity the most in the nation. Through strategic community focused on connecting the interests partnerships between educational institutions, of the cyber, automotive, defense and aerospace government, and private industry, Michigan is industries. Michigan’s Cybersecurity Initiative leading the nation in preparing the workforce is the world’s first comprehensive state-level for careers in cybersecurity. approach to cyber, improving the state’s • Pinckney Community Schools in Michigan is defenses and fostering rapidly growing cyber the first school district in the nation to create talent and business environments. an institute aimed at addressing the rising • Michigan ranks third for cybersecurity need for people certified to address cyber- growth potential according to Business crime. The institute provides educational and Facilities’ 13th annual rankings report.1 certification opportunities for high school and • Key Department of Defense R&D and college students, and tech professionals. procurement facilities are located in Michigan • SAE Michigan CyberAuto Challenge pairs to support developing dual-use technologies high school students with professionals to that have both commercial automotive and participate in virtual hacking exercises to military applications. develop auto and cyber specific talent as • The tech industry in Michigan added 13,160 well as mitigate risk in cyber automotive jobs in 2017, which is third only to California development. and Texas.2 • The Michigan Statewide Educational Network (MISEN) has brought 10 gigabit capability COMMITMENT TO EDUCATION to Michigan intermediate school districts. Overall, Michigan has more than 55 Managed by Merit Network, MISEN will independent universities and colleges, 28 have the ability to purchase consortia- community colleges, and 15 public universities. based services leveraging economies of More than 6,600 engineers graduate from scale, consolidating services, and driving Michigan universities annually, for a total of down technology costs. Utilization of this 1 https://businessfacilities.com/2017/07/business-facilities- 13th-annual-rankingsreport 3 https://e.economicmodeling.com/ 2 www.cyberstates.org analyst/?t=2LYQW#h=9Q7rW&page=occupation_table www.michiganbusiness org network will give instructors the tools and designed to help cybersecurity professionals funds needed to train K–12 students in high prepare for real-world situations and has demand careers including technology and expanded the pool of available cybersecurity cybersecurity, and assist in building a cyber- workers in Michigan (and beyond).5 ready talent pipeline. • The Michigan National Guard has five • Michigan is home to the CyberTruck installations to the Michigan Cyber Range Challenge, the first program of its kind in the and is able to conduct first-class cyber country. The event brings college students, training exercises in a secure environment. U.S. Military Academy cadets, academics, and • A critical component to swift cyber response professionals to southeast Michigan for two is the Michigan Cyber Civilian Corps. days of classroom instruction and two days Announced in 2013, Cyber Civilian Corp is of hands-on activities. The vehicles involved a group of dedicated volunteers with a include semi-trucks and military vehicles mission to work with government, private used to detect improvised explosive devices. sector, and educational institutions around Through this challenge, student are able to the state to provide rapid response in the test theories on real-world information. event of a declared state of emergency due to a cyber event. ACCESS TO TALENT • Michigan State Police’s Cyber Command As of 2016, there were nearly 140,000 people Center investigates cyber crime incidents working in Michigan’s IT and cybersecurity throughout Michigan and plays a critical industry, more than half of whom are in the role in providing investigative support in the 4041-170923 Detroit region.4 Continually building upon this seizure, acquisition, and analysis of digital workforce is a priority not only throughout the evidence including digital device forensic state’s educational ecosystem but also through examinations for the law enforcement Dedicated to shared economic a variety of programs and initiatives. community. success, the MEDC promotes the state’s assets and opportunities • The Michigan Cyber Range, powered by that support business investment Merit, offers a platform for cyber exercises, Michigan has the resources, talent, and community vitality. The product testing, and digital forensics, and and infrastructure to help cybersecurity MEDC’s business assistance programs and services connect more than 40 professional certifications based business thrive. To find out how you can companies with people, resources, on the National Initiative for Cybersecurity be a part of Michigan’s success story, partners, and access to capital. Education (NICE) framework. This training is visit www.michiganbusiness.org. www.michiganbusiness org 4 Emsi Inc., 2017. 5 www.merit.edu/cyberrange.
Recommended publications
  • QUILT CIRCLE2020 a Letter from the President
    THE QUILT CIRCLE2020 A Letter From the President This 2020 Quilt Circle edition commemorates the 20th Anniversary of The Quilt. The fabric of our research and education (R&E) networking community has never been stronger. While our Quilt community has evolved in new and exciting ways in the past two decades, we have also been faced with a number of challenges which we take head-on and always with the spirit of collaboration. As we address the unprecedented challenges presented by the current global public health crisis due to the COVID-19 pandemic, the work of our members is more important than ever to the missions of their member communities. U.S. higher education institutions rely on R&E networks to give them a competitive edge in the most impactful scientific research initiatives which is essential in this crisis. We connect the educational institutions that support university medical centers and their associated hospitals. R&E networks also connect tens of thousands of other community anchor institutions, including K-12 schools, public libraries, local/state government, research sites, cultural institutions, public safety, and tribal lands. Being responsive and providing vital networking infrastructure and resources right now to address immediate needs is who we are and what we do. R&E networks are part of our nation’s critical infrastructure. This year’s edition of The Quilt Circle showcases several examples of the key role of R&E network members in both providing and facilitating the use-network infrastructure to further scientific discovery and collaborations at higher education institutions of all sizes.
    [Show full text]
  • On Multi-Point, In-Network Filtering of Distributed Denial-Of-Service Traffic
    On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic Mingwei Zhang∗, Lumin Shi∗, Devkishen Sisodia∗, Jun Li∗, Peter Reihery ∗ University of Oregon fmingwei, luminshi, dsisodia, [email protected] y University of California, Los Angeles [email protected] Abstract—Research has shown that distributed denial-of- in a common language. Further, it is also unknown how these service (DDoS) attacks on the Internet could often be better solutions perform under insufficient knowledge of the attacks handled by enlisting the in-network defense of multiple au- or against intelligent adversaries who can dynamically revise tonomous systems (ASes), rather than relying entirely on the victim’s Internet Service Provider at the edge. Less noticed their attack strategies to escape defense. Without a quantitative but important is the fact that an in-network defense can also comparison, it is hard for a DDoS victim to select the most remove DDoS traffic from the Internet early en route to the suitable solution to achieve its defense goal and meet the victim, thus decreasing the overall load on the Internet and resource requirements. reducing chances of link congestion. However, it is not well In this paper, we introduce a modeling and simulation understood to what degree different in-network defense strategies can achieve such benefits. In this paper, we model the existing framework to systematically evaluate in-network DDoS de- two main categories of in-network DDoS defense algorithms fense algorithms. The framework contains a general model (PushBack, SourceEnd) and propose a new type of algorithm that can describe the attack and defense for various defense (StrategicPoints).
    [Show full text]
  • Merit Network, Inc
    Single Source Certification DATE: 10/18/2017 Authority is requested to make the following purchase under the provision of USF System Regulation USF4.02040(2)(b) , as a non-competitive purchase available from only one source. ITEM(S): Model City/Simulated Cyber Range, Educational Services and Training, and Secure Sandbox technology PRICE: $ Approximately $300,000 over three years FUND #: 100009 VENDOR ID: REQUISITION#: TBD TBD VENDOR NAME: Merit Network, Inc. PURCHASE ORDER #: TBD FEDERAL GRANT:__ Y __✔ N Describe the equipment, commodity or contractual service and how it is to be used. Provide the justification for the single source (note price cannot be used for justification). Attach additional pages if necessary. See Attached 10/18/2017 _____________________________ ________________________________ Purchasing Agent Date Approved by: Date Authority: USF4.02040 (2)(b) PUBLIC POSTING START DATE END DATE 10/18/2017 10/20/2017 Last Modified: 02/15/201107/27/2012 Page 1 of 4 The Florida Center for Cybersecurity is seeking to obtain a comprehensive set of solutions from a vendor including the following: Model City/Simulated Cyber Range, Educational Services and Training, and Secure Sandbox technology to ensure a robust user experience that delivers continuity across systems and ease-of-use. Merit Network, Inc. is a non-profit corporation, governed by Michigan’s four-year publicly supported universities, that operates a statewide research and education network, and provides network services and other cyber-related products and services (such as the Michigan Cyber Range) to its users. Merit offers a “Cyber Range Hub”. This hub would provide all of the following services: Alphaville, created by the Michigan Cyber Range, is a virtual training environment specifically designed to test cyber security skills.
    [Show full text]
  • Growth of the Internet
    Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] Preliminary version, July 6, 2001 Abstract The Internet is the main cause of the recent explosion of activity in optical fiber telecommunica- tions. The high growth rates observed on the Internet, and the popular perception that growth rates were even higher, led to an upsurge in research, development, and investment in telecommunications. The telecom crash of 2000 occurred when investors realized that transmission capacity in place and under construction greatly exceeded actual traffic demand. This chapter discusses the growth of the Internet and compares it with that of other communication services. Internet traffic is growing, approximately doubling each year. There are reasonable arguments that it will continue to grow at this rate for the rest of this decade. If this happens, then in a few years, we may have a rough balance between supply and demand. Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] 1. Introduction Optical fiber communications was initially developed for the voice phone system. The feverish level of activity that we have experienced since the late 1990s, though, was caused primarily by the rapidly rising demand for Internet connectivity. The Internet has been growing at unprecedented rates. Moreover, because it is versatile and penetrates deeply into the economy, it is affecting all of society, and therefore has attracted inordinate amounts of public attention. The aim of this chapter is to summarize the current state of knowledge about the growth rates of the Internet, with special attention paid to the implications for fiber optic transmission.
    [Show full text]
  • Broadband for Education: the National Internet2 K20 Initiative’S and WICHE’S Recommendations to the FCC
    Broadband for Education: The National Internet2 K20 Initiative’s and WICHE’s Recommendations to the FCC Who are we? Internet2: We bring together Internet2’s world-class network and research community members with innovators from colleges and universities, primary and secondary schools, libraries, museums and other educational institutions, the full spectrum of America’s education community, including both formal and informal education. The National K20 Initiative extends new technologies, applications, and rich educational content to all students, their families and communities – no matter where they’re located. We have had immense success connecting the institutions above – in fact, over 65,000 institutions are now connected to the National Internet2 network – but to realize fully the potential of Internet2 all institutions must have adequate bandwidth. What follows are principles we endorse and urge the FCC to adopt. We divide our recommendations into two interrelated categories: connectivity and e-rate support. Western Interstate Commission for Higher Education (WICHE): WICHE and its 15 member states work to improve access to higher education and ensure student success. Our student exchange programs, regional initiatives, and our research and policy work allow us to assist constituents in the West and beyond. Equitable access to broadband technology and, in particular, technology-enabled education, is among our strategies. At present much of the West, particularly the “frontier West,” has little or no access to adequate bandwidth. Many of our institutions are not among those connected by and participating in the Internet2 K20 Initiative. The principles and recommendations below would remedy this situation. Our recommendations: (1) Connectivity • Elementary schools, secondary schools, and branch libraries should be connected at 100 Mbps to 10 Gbps.
    [Show full text]
  • The Quilt a Collaboration of U.S. Research and Education Networks
    The Quilt A Collaboration of U.S. Research and Education Networks Slide 1 April 15, 2014 The Quilt The Quilt is a non-profit collaboration of our country’s advanced regional research and education networks. Created in 2000, The Quilt is a member- powered, vibrant forum where leaders from these networks come together to exchange knowledge, experience and ideas to collectively advance networking for research & education. The Quilt aims to influence the national agenda on information technology infrastructure, with particular emphasis on networking for research and education. Through this coalition, Quilt members collaborate to promote the delivery of networking services at lower cost, higher performance and greater reliability and security. Quilt members are our country’s not-for-profit networking organizations serving research and education with similar missions to; support research and education, collaborate, manage advanced networks, provide advanced networking services and further knowledge and innovation. Slide 2 April 15, 2014 Introductions • The U.S. non-profit research and education networks are funded, governed and structured differently. These aspects of the organizations reflect the diverse and complex environments of the communities and states in which they operate. • While diverse in some aspects, these organizations are similarly missioned with common goals which are to provide an advanced network infrastructure, services and applications which support of the research and education goals of the institutions each serve. Slide
    [Show full text]
  • Remarks on the Anniversary of the Merit Computer Network
    Remarks on the Anniversary of the Merit Computer Network James J. Duderstadt President Emeritus and University Professor of Science and Engineering Ann Arbor November 16, 2006 2 Introduction Happy 40th Anniversary!!! • It is an honor to be able to participate in this celebration and well-deserved recognition of the extraordinary impact Merit has had on our state, the nation, and, indeed, the world. • • It is also great to see so many of those responsible for its achievements present…and still ticking! • • Actually, I arrived at Michigan about the same time that Merit was launched, and my career has been not only heavily influenced by at times interwoven with Merit’s. • • Hence, I thought it might be appropriate to take a quick nostalgia trip through these years, commenting on various aspects of Merit’s history from a personal perspective as a user, occasional defender, and strong admirer of the Merit Network. • • Before dredging up what my failing memory has to offer, let me stay in the present mode for just a moment to mention an experience I had just last week. Salzburg Seminar • Just arrived back from Salzburg, where I led a week long session of 45 higher education leaders from 25 nations and all five continents on a discussion of the changing needs and nature of higher education in the face of o rapidly changing demographics o globalization o and the knowledge economy • Whether in developed nations in Europe, Asia, or North America or in developing nations elsewhere, there is a growing recognition of two imperatives o “massification” of teriary education o lifelong learning 3 • And everywhere there is also a recognition that the scaffolding for this effort will be provided by cyberinfrastructure–or as the rest of the world calls it, ICT–information and communications technology.
    [Show full text]
  • Description of Omnipop for Proposals
    Description of OmniPoP for Proposals Summary The OmniPoP is a collaborative effort between 12 of the member universities of the Big Ten Academic Alliance. Together, these institutions have pooled their efforts to create a high performance shared infrastructure based in the Chicago area. This infrastructure was designed to complement and augment the shared fiber infrastructure that the Big Ten Academic Alliance members had previously purchased. The OmniPoP operates a high capacity switching infrastructure that supports 10 gigabit and 100 gigabit connections to its member institutions and equivalent high capacity links to national research and education networks such as Internet2, ESnet, and Starlight. This allows OmniPoP connections to be leveraged to provide services to large data flows in support of multi-institutional cooperative research efforts. Efforts supported today include interconnections between the Large Hadron Collider (LHC) Tier 2 efforts at the member institutions and the Midwest Openflow Crossroads Initiative (MOXI) project which links several midwest regional networks to the GENI backbone. OmniPoP Infrastructure and Peerings The Omnipop infrastructure consists of a redundant pair of 100 gigabit capable switches. These switches operate from geographically diverse co-location facilities within the Chicago metropolitan areas. These facilities also serve as Points of Presence (PoPs) for other major networks such as Internet2, ESnet (Department of Energy’s Energy Sciences Network), and Starlight (the international peering exchange), enabling seamless cross connections to the major national and international research and education networks that support much of the academic research community. An additional benefit to these facilities is that they offer the opportunity for Big Ten Academic Alliance members to co-locate additional network related equipment in support of their own projects independent of the OmniPoP core infrastructure.
    [Show full text]
  • Marcia A. Mardis
    Marcia A. Mardis 1902 Harriet Dr. Tallahassee FL 32303 734.476.7171 • [email protected] General Information Professional Preparation 2005 Ed.D., Eastern Michigan University. Major: Educational Leadership. summa cum laude. 1992 M.I.L.S., University Of Michigan-Ann Arbor. Major: Library and Information Science. magna cum laude. 1990 Bachelor of Arts, University Of Michigan-Ann Arbor. Major: History. cum laude. Professional Credentials 1992–2014 Michigan Professional Teacher Certification, K-12, History and School Library Media. Professional Experience 2013–present Associate Professor, School of Library and Information Studies, College of Communication & Information, Florida State University. Responsible for research, teaching, and service related to information studies. 2009–2013 Assistant Professor, College of Communication and Information, Florida State University. Responsible for service, teaching and research relating to library studies. 2005–2008 Assistant Professor, School of Library and Information Studies, Wayne State University. Responsible for service, teaching and research relating to library and information studies. 2003–2008 Research Investigator, School of Information, University of Michigan. Responsible for teaching and research relating to library and information studies. 1999–2005 Senior Lecturer, College of Education, Eastern Michigan University. Responsible for teaching relating to teacher education, education administration, and research methods. 1998–2005 Advanced Networking Researcher, Merit Network, Inc, University of Michigan. Responsible for research and engineering relating to digital libraries and broadband networking. 1994–1998 Director of Media Services, Associate Principal, and Director of Debate, The Keystone School. Responsible for administering K-12 school library program, overseeing student conduct, and teaching and coaching speech and debate students. Visiting Professorships 2013 School of Information Studies, Charles Sturt University, Wagga Wagga, Mardis CV • 1 Australia.
    [Show full text]
  • The Evolution of Internet Evidence 1
    Name: Sam Kavande Rocha Enrollment: 2777582 Nombre del curso: Name of professor: Information technologies Tania Zertuche Module: Activity: 1 Evidence 1 Date: 8 / September / 2015 References: The evolution of Internet Evidence 1 1 Table of contents: Introduction Page 2 Topic explanation Page 2 to 3 Conclusions Page 4 Bibliography Page 5 references 2 Introduction: The Internet is evolving. The majority of end-users perceive this evolution in the form of changes and updates to the software and networked applications that they are familiar with, or with the arrival of entirely new applications that change the way they communicate, do business, entertain themselves, and so on. Evolution is a constant feature throughout the network Topic explanation: The history of the Internet begins with the development of electronic computers in the 1950s. Initial concepts of packet networking originated in several computer science laboratories in the United States, Great Britain, and France. The US Department of Defense awarded contracts as early as the 1960s for packet network systems, including the development of the ARPANET (which would become the first network to use the Internet Protocol.) The first message was sent over the ARPANET from computer science Professor Leonard Kleinrock's laboratory at University of California, Los Angeles (UCLA) to the second network node at Stanford Research Institute (SRI). Packet switching networks such as ARPANET, NPL network, CYCLADES, Merit Network, Tymnet, and Telnet, were developed in the late 1960s and early 1970s using a variety of communications protocols. Donald Davies was the first to put theory into practice by 3 designing a packet-switched network at the National Physics Laboratory in the UK, the first of its kind in the world and the cornerstone for UK research for almost two decades.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • The Quilt Circle 2014 Edition
    A Letter from the President The cover of The Quilt Circle this year is a photo from the inside of the Large Hadron Collider (LHC) in Geneva, Switzerland. We chose this cover for several reasons. First, it depicts a renowned example of global, collaborative scientific research that requires specialized networking infrastructure. This type of effort would not be possible today if not for the advanced networking infrastructure deployed by research and education networks all over the world. Through extensive collaboration, coordination and interconnection, these networking facilities bring new high-energy physics data to the desktop of the physicists dispersed worldwide leading to new scientific discoveries. Secondly, the LHC photo is significant because it is an example of collaborations within the research and education community at the highest level. These types of collaborations toward the pursuit of common goals are the hallmark of the research and education (R&E) networking community. Collaboration is a vital component of our community’s work, and our Quilt members are the ultimate collaborators bridging the human network with physical networks at the community, state, national and international levels. You can read all about these types of collaborations in this latest edition of The Quilt Circle. This year’s publication showcases our members’ efforts in providing tools and infrastructure to support science research and the big data movement; deploying and training on leading-edge networking technologies including software-defined networking; the completion of statewide network infrastructure projects funded through the Broadband Technologies Opportunity Program; the role of R&E networks in economic development; connecting libraries, municipal and county governments to our networks; partnering with member institutions for education technology; providing strategic services to members, and much more.
    [Show full text]