Monday – June 12, 2017

Location: Donald P. Corbett Hall (DPC) – Business School

The registration will be in the lobby of DPC.

Schedule

8:30 AM – 9:00 AM Registration DPC Lobby

9:00 AM – 10:20 AM Cybersecurity Tutorial Part 1 by George Markowsky

10:20 AM – 10:40 AM Coffee Break

10:40 AM – Noon Cybersecurity Tutorial Part 2

Noon – 1:30 PM Lunch

1:30 PM – 2:50 PM Virtual Reality Tutorial Part 1 by Chuck Carter

2:50 PM – 3:10 PM Coffee Break

3:10 PM – 4:30 PM Virtual Reality Tutorial Part 2

4:30 PM – 6:00 PM Reception at the Hudson Museum

Cybersecurity Tutorial

This tutorial will be divided into three parts. The first part will deal with cyberwarfare and cybercrime. The second part will survey some of the tools and techniques used for cyberoffense and cyberdefense. The third part will show how to set up your own cybersecurity lab.

In the first part of this tutorial, we will show that cyberwarfare can be thought of as the latest embodiment of military intelligence. The ubiquity of computing devices has blurred the distinction between kinetic and non-kinetic forms of warfare. This tutorial will survey the precursors of cyberwarfare, the current state of cyberwarfare and some scenarios for how it might develop in the future. We will discuss how cyberwarfare relates to cybercrime, terrorism, hacktivism, and citizen action. We will also name the most active parties in the cyberwar space and what their strategies are. Cyber warfare is a real phenomenon and is a major force in the political landscape. Cyber warfare has the capability to engage the individual citizen.
We will discuss how people can avoid being collateral damage in the constant cyber warfare that is taking place on the Internet. In the second part of the tutorial, we will discuss some key concepts necessary for understanding cybersecurity. These include some basic networking concepts such as IP addresses, protocols, scanning, and packet captures. Exercises will include reading and understanding simple scanning results and packet captures.

The third part of the tutorial will discuss the building of a cybersecurity lab based on Kali Linux. From 2006 through 2012, a group called Offensive Security put out a series of collections of hacking tools that were called BackTrack. BackTrack Version 5 was released on August 13, 2012, and contained over 300 penetration testing (“hacking”) tools. Offensive Security decided to revise their entire approach and on March 13, 2013, the first version of their revised toolkit, Kali 1.0, was released. We will discuss the use of virtual machines in building a cybersecurity lab and experimenting with some of the material presented in the first two parts of the tutorial. All the tools discussed in this tutorial are open source and available free of charge. No prior cybersecurity experience is required to attend this tutorial.
OBJECTIVES
To survey the cyberwarfare, cybercrime and cybersecurity landscape and to a better understanding of what is happening out in cyberspace. To provide basic knowledge of some key concepts in cybersecurity. To provide basic knowledge that can be used for protection in cyberspace. To provide instruction on how to set up a comprehensive, personal cybersecurity lab that can be used for further study.
INTENDED AUDIENCE
Anyone interested in cybersecurity who would like to gain some understanding of what is happening behind the scenes. The tutorial contains a lot of valuable information that is accessible to people who do not have a technical background, as well as technical information that can help people get started exploring this fascinating area on their own.

George Markowsky Bio

George Markowsky — Cybersecurity Tutorial Instructor

Dr. George Markowsky is Professor of Computer Science and Director of the Cybersecurity Lab in the School of Computing and Information Science at the University of Maine. He teaches cybersecurity at the University of Maine and coaches the Cyber Defense Team. In 2013-2014 he was a Visiting Scholar in the Department of Computing Security at the Rochester Institute of Technology.

Virtual Reality Tutorial

(VR – What is it?) In this tutorial, Chuck Carter from Eagre Games will discuss how new off the shelf game software can be used by literally anyone desiring to make VR products, games and experiences with little to no knowledge of programming or art. Software like Unreal Engine leads the way for the vast majority of immersive and real-time gaming and VR movie making projects. The ease of use for early adopters looking to make VR-based content is opening the door to virtually anyone who has a fast computer and one of the many commercial headsets readily available. Carter will show why this is important and just how easy it is to make your own VR projects.

A Virtual World

Another Virtual World

Yet Another Virtual World

Charles Carter Bio

Charles Carter — Virtual Reality Tutorial Instructor

 

Once upon a time Carter helped create Myst and 26 other video games including the Command and Conquer and Red Alert franchises, Marvel Ultimate Alliance 2, Nox, Pacman World Rally, Kyrandia and many others – Carter worked on TV shows like Babylon5 (as a digital Matte Painter) as well as having contributed work on Star Trek the Experience and Disney’s Mission to Mars motion rides. His illustration and animation work has been seen on the BBC, National Geographic, US Dept. of Defense, Homeland Security, Scientific American, NASA, Caltech, and JPL as well dozens of additional publications and organizations.

Currently, Carter is the founder of Eagre Games.

Hudson Museum

This is the site of our first reception. Below are some photos of the museum. See https://en.wikipedia.org/wiki/Hudson_Museum and http://umaine.edu/hudsonmuseum/ for more information.

The Entrance to the Hudson Museum

The Interior of the Hudson Museum

Some of the Displays

A Mammoth Tusk