Scholarship program to train students in cybersecurity

September 18, 2012

MANHATTAN, Kan. -- Millions of people depend on the Internet every day and cyber criminals are counting on that, according to a Kansas State University cybersecurity expert.

"Hackers are performing cyber espionage by gathering information on companies, seeking out national secrets or starting cyber warfare by disabling critical infrastructure," said Xinming "Simon" Ou, associate professor of computing and information sciences.

To help counter the threat, the National Science Foundation has awarded $2.3 million to Kansas State University's department of computing and information sciences to provide scholarships to qualified students interested in becoming cybersecurity and information assurance professionals. A team of computing and information sciences faculty, including Ou, Gurdip Singh, Eugene Vasserman, John Hatcliff and Scott DeLoach, lead the scholarship program.

According to Ou, many systems society uses every day -- such as smartphones, online companies, media communications, transportation, electricity and hospital systems -- are highly dependent on a very fragile cyber infrastructure that, if hacked into, could be disastrous and shake people's sense of security like a cyber version of Pearl Harbor or 9/11.

"The nation is in dire need of people who are capable of handling the cybersecurity challenges we face," Ou said. "We are lagging behind in the number of experts we have versus the threats we see."

About 6 million attempts are made each day to hack into the U.S. Department of Defense's computers, Ou said. While safeguarding national secrets is a priority, experts also realize that disrupting physical infrastructure is a real possibility.

"It has been shown that by hacking into the computer systems controlling a power generator's turbine, it can set the turbine into high speed until self-destruction," Ou said. "And our power grid in the U.S. is pretty much accessible from anywhere in the world thanks to the Internet."

A newly developed course by the computing and information sciences department, Cyber Defense Basics, uses a contained off-the-grid cybersecurity lab for mock exercises. The lab allows instructors to test students' abilities to defend against cyber attacks without infecting systems outside the lab. It teaches students the basics of cyber defense and how to counterattack.

"The public may not be very aware of how vulnerable we are these days, but the government is," said Gurdip Singh, head of the department of computing and information sciences at Kansas State University. "There have been successful incidents where attackers from another part of the world were able to penetrate U.S. financial and government computer systems. That's why training the next generation to counter these attacks is so important. This scholarship program will be a wonderful opportunity for students interested in the field."

Scholarship applicants must be U.S. citizens and will be subjected to background checks. The scholarship package includes a $20,000-$30,000 stipend plus tuition and fees, as well as money for materials and professional development such as attending cybersecurity conferences and trainings. Scholarship recipients are obligated to serve a government agency in a cybersecurity and information assurance position for the equivalent number of years they received the scholarship.

"Cybersecurity is not a pure technical problem; it needs the whole society's attention and effort to address," Ou said.
-end-
The first scholarships will be awarded sometime in 2013. For more information, contact Ou at 785-532-6350 or xou@k-state.edu.

Kansas State University

Related Cybersecurity Articles from Brightsurf:

Computer scientists' new tool fools hackers into sharing keys for better cybersecurity
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them.

Cultural differences account for global gap in online regulation -- study
Differences in cultural values have led some countries to tackle the specter of cyber-attacks with increased internet regulation, whilst others have taken a 'hands-off' approach to online security -- a new study shows.

Study finds companies may be wise to share cybersecurity efforts
Research finds that when one company experiences a cybersecurity breach, other companies in the same field also become less attractive to investors.

$4.6 million award creates program to train cybersecurity professionals
A five-year, $4.63 million award from the National Science Foundation will enable a multi-disciplinary team of researchers at the University of Arkansas to create a program to recruit, educate and train the next generation of cybersecurity professionals.

First cyber agility framework to train officials developed to out-maneuver cyber attacks
To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the US Army, scientists at The University of Texas at San Antonio, developed the first framework to score the agility of cyber attackers and defenders.

Cyber of the fittest: Researchers develop first cyber agility framework to measure attacks
The framework proposed by the researchers will help government and industry organizations visualize how well they out-maneuver attacks over time.

Army researchers identify new way to improve cybersecurity
Researchers at the US Army Combat Capabilities Development Command's Army Research Laboratory, the Army's corporate research laboratory also known as ARL, and Towson University may have identified a new way to improve network security.

How susceptible are hospital employees to phishing attacks?
A multicenter study finds high click rate for simulated phishing emails, potential benefit in phishing awareness training.

A Georgia State cybersecurity study of the dark web exposes vulnerability to machine identities
A thriving marketplace for SSL and TLS certificates -- small data files used to facilitate confidential communication between organizations' servers and their clients' computers -- exists on a hidden part of the Internet, according to new research by Georgia State University's Evidence-Based Cybersecurity Research Group (EBCS) and the University of Surrey.

Army scientists revolutionize cybersecurity through quantum research
Army scientists have found a novel way to safeguard quantum information during transmission.

Read More: Cybersecurity News and Cybersecurity Current Events
Brightsurf.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.