2020 Cyberfair
Theme: Cyber Wizardy
Thursday, October 29th 2020
Event Summary
The 16th edition of the Cyber Security and Awareness Fair was our first successful virtual Cyber Fair . This year's event marked the first ever Capture the Flag and Virtual format. Attendees entered the event though a wizards landscape in to various Zoom rooms for the presentations. The Job Fair was hosted on the Brazen software platform. This year also brought together the college of Business, Engineering, and Science to host 4 of the 6 hands-on demonstrations alongside dynamic speakers like Bryan S. Ware from CISA covering “ Securing our Nation's Digital Networks” and CPP alum Diane Miller on“Launching your career in challenging times .” Chaffey College and Troy High School hosted demonstrations on securing your home & work devices and prepping for Cyberpatriot. CPP took our top five spots in the poster contest. The third Cybersecurity Workforce Job Fair was held with companies in attendance and students submitting resumes. Key recruiters were Dreambox Creations, AT&T, Tanium, and City of Hope. All presentations, demonstrations, and poster sessions were recorded on the day of the fair and were made available for viewing after the event.
Demo Village
Presented by /script
Learn about possible attack surfaces for routers and how to secure router/Lapps in order to keep IoT devices safe. Recent exploits of IoT vulnerabilities.
Presentation Link:
Presented by FAST
Artificial intelligence (AI) and facial recognition play large roles in our society. Unfortunately, they come with the all too common bias. FAST recognizes these issues and presents to you "AI: From Facial Recognition to TikTok." In our booth, we will look at the technical and societal issues that plague artificial intelligence and facial recognition and will discuss common security issues that can be easily fixed to secure even those who find computers most difficult. Additionally, we will discuss the security of popular apps: TikTok and Snapchat.
Presentation Link:
Presented by Troy
Learn how to prepare and train for Cyberpatriot :
- How to compete remotely in the world of COVID
- Practices on zoom
- Team digital coordination
- Q&A with Coach Stubblefield (2x national champion) and some Troy HS CyberPatriot competitors
Presentation Link:
Presented by MISSA
The attacks by phishing websites have increased during covid-19. It is important that everyone, from organizations to individuals becomes aware of it in order to prevent thousands of financial losses and more importantly identity theft.
Purpose of this project is to teach people the dangers of phishing. Showing exactly how user credentials are logged and then manipulated by attackers.
Presentation Link:
Presented by Chaffey
Remote working is the new normal but the cyber threats have only grown and adapted. This video will show you cyber security weaknesses, cyber hacks, and things you can do to secure your mobile devices and routers at your home office and your small business away from the home.
Presentation Link:
Presented by SWIFT
Penetration testing plays a crucial role in cyber security by simulating how an attacker can gain access to an organization’s resources in order to prevent future attacks before they can occur. In the era of remote learning and working from home, the number of people connecting to organizations remotely is greater than ever, resulting in new potential vulnerabilities within an organization. In our presentation, we will be demonstrating the different steps in penetration testing and showcasing typical methods used by potential attackers.
Presentation Link:
Noble Theatre of Speakers
Brett St Pierre HID,
Diane Miller, Northrop Grumman
In challenging times, perhaps even more so during a global pandemic, employers need to hire great cybersecurity talent. For some employers, their needs may not change but certainly how they fill those needs may be very different now. Diane will share insights about the Future of Work – how careers are evolving and how launching your career during a challenging time might require different approaches and skills. Let’s make sure the highly talented cybersecurity students at Cal Poly Pomona become part of our diverse global cybersecurity workforce!
Presentation Link:
Brian Donohue, Red Canary
There are nearly 200 parent techniques in the MITRE ATT&CK matrix—and who-knows-how-many subtechniques. If you try to develop thorough detection or preventive coverage for all of them, you'll end up miring your security operations team with an endless amount of work that delivers a questionable amount of value. In this talk, we'll explore how you can focus your efforts on the ATT&CK techniques that adversaries are most likely to leverage against you and the data sources that give you the best visibility into those techniques.
Presentation Link:
Bryan S. Ware, Cyber Infrastructure
Keynote
Securing the Nation's Cyber Infrastructure, Nation State attacks during Covid19 ,and career opportunities with CISA.
Presentation Link:
Warren Yu, Naval Postgraduate School
Come learn about little-known federal internships and scholarships (many of them dealing directly with cyber security) that pay you during summers, for tuition, or to launch a career in a STEM-related field! Topics include: Understanding the fundamental differences between Invention vs Innovation; Understanding the job impact of very recent federal cloud computing initiatives; and learn how to lead a private, secure, and convenient digital life as you transition through school and into a career.
Presentation Link:
Dennis London, - London Security Solutions
The statistics of cybercrime should be terrifying for everyone. With over 800,000 records lost or stolen every 24 hours…no one is safe. As people migrate their activities online, the threat only continues to increase. That is why you should understand and take the necessary and needed precautions to secure your virtual self. This session will cover those precautions, principles, and steps to ensure your virtual identity remains your own.
Presentation Link:
Corey White, Cyvatar Ai
There is a worldwide cybersecurity skills shortage. According to CSO online, 70% of organizations report that their business is impacted by the lack of professionally trained cybersecurity talent. This session will uncover the future of cybersecurity and how you can build skills and experience today to prepare for a career in this rapidly growing industry.
Presentation Link:
Great Hall of Posters
By William Vong, Zachary Donovan and Yanxun Liu
Join the zoom meeting at any time to view this poster!
Storage is an important part of our daily life from our baby pictures to our birthday videos. Early on, people needed physical drives for school, work, and personal information. The ages of expandable physical storage are beginning to come to its end. With the introduction of cloud services brings along Software Defined Storage or also known as SDS. SDS has given people the luxury of not carrying a physical storage device anymore. We can now save our information on the cloud with a press of a button. It is implemented to server infrastructures as it is not a set capacity. With Software Defined Storage, the capacity can be easily flexible depending on the company or infrastructure needs. SDS is more dynamic and allows resources to be added when demand increases during a certain period of time. This allows storage to be added almost instantaneously. Hardware is all virtualized as a software entity that is managed by an application rather than physically adding the resources to a facility. In SDS there is so much one can do in managing their storage from automation to scalability. Automation can control the total space needed by raising or dropping the storage amount based on the overall size required. Scalability plays a huge part in changing the size of all the resources without affecting the performance of it.
Presentation Link:
By Rafael Fernando, Keshav Sreekumar, Marvin Larios and Nick Brannies
Join the zoom meeting at any time to view this poster!
Designed a mesh network that can be deployed using a swarm of drones. Mesh technology allows you to expand the total coverage based on the number of nodes that are deployed. In order to accommodate several different natural disaster scenarios. This project successfully establishes a network that victims can use to communicate during a natural disaster scenario.
Presentation Link:
By Angel Jimenez
Join the zoom meeting at any time to view this poster!
A powerful and efficient Network Intrusion Detection System (NIDS) is one of the main network security issues. Despite substantial advancement in NIDS technologies, in comparison to anomaly detection techniques, most methods are still using less capable signature-based techniques.
Detection of intruders plays a big part in network protection by engaging system administrators to warn about suspicious behavior such as assaults and malware. IDS is an important defensive line to defend sensitive networks from the ever-expanding problems of attack. Today, there are numerous obstacles to data security analysis due to rapid development in computer networks and applications. Events that may violate the computer systems standards such as availability, authority, secrecy, and integrity can be described as intrusions/attacks. Security strategies and tools are unable to detect new attack conditions and cannot study in-depth network packets. The amount of malware found is expected to expand recently at more than 90% of small- to medium-sized companies (Shekhawat et al., 2019). Real-time network malware identification can minimize malware spread on the network considerably.
Presentation Link:
By Meetkumar Patel
Join the zoom meeting at any time to view this poster!
The need for a new authentication method such as biometrics becomes apparent as the data breaches on password-based authentication increase. However, current biometric forms of authentication become unusable once compromised. Additional limits are realized when an attacker coerces an authorized user into a forced authentication. To resolve both issues, I propose creating an authentication mechanism that depends on the user's neurophysiological responses to chosen pieces of music (non-lyrical) measured using electroencephalographic (EEG) signals. This poster will describe the procedure for creating a system that incorporates such idea for person classification and authentication. In a group study, the aim is that participant listen to individually selected music and music selected by other participants during an EEG reading. The change in the Alpha and Beta band frequencies across eight electrode EEG sensors serves as the input feature vector for a supervised machine learning algorithm that trains on the user and attacker EEG readings. Ultimately, the goal of the algorithm is to create a user-specific model to uniquely identify the respective user based on the corresponding EEG response to music and grant authentication. This research study lays a solid foundation for creating a promising EEG-based authentication system by solving the drawbacks of current biometric authentication methods
Presentation Link:
By Saketh Sadhu, Matthew Cervana and Kyle Huang
Join the zoom meeting at any time to view this poster!
The era of technology has inspired the creation of many technologies that improve our everyday lives. The Internet of Things (IoT) is the center of all internet technologies. IoT is described as a network of physical objects or “things” that is connected to each other. These objects range from computers to smart fridges - each have the ability to connect and share data wirelessly over the internet. Developers & Engineers will often develop new technologies to increase the efficiency and security of IoT devices. Software-Defined Network (SDN) is the latest emerging technology looking to improve IoT devices and increase efficiency.
Presentation Link:
Sponsors
We would like to thank our wonderful sponsors for donating to help bring awareness to Cyber Security and the Information Technology Field.
Gold Scholar
Silver Scholar
Bronze Scholar
Virtual Career Fair