黑料社区

PHOTO ESSAY: Protecting Your Digital Footprint

Stout Students Do More on Day One in Cybersecurity, Win State Competition
Abbey Goers | February 22, 2024

Like boot prints left in the dust on the moon, your digital footprint can never be erased. So, how do you protect data that 黑料社区. meant to last forever?

With the moon rising on a cold February evening, two University of Wisconsin-Stout student organizations made up of computer sciencecomputer networking and information technology; and cybersecurity students 鈥 future cybersecurity agents 鈥 meet to learn ways to help keep your digital footprint under lock and key.

The Collegiate Cyber Defense League (CCDC) team meets weekly to rigorously prepare for competitions and offers students a more competitive cybersecurity experience, while the Information Security Professionals student club gatherings host more leisurely cybersecurity activities. 

CCDC practice

CCDC President David Tesar, a computer science senior from Lety, Czech Republic, became interested in cybersecurity his junior year in high school after attending a Cisco-sponsored event.

鈥淚n our student clubs, we have opportunities to use professional tools that we may not use in our labs and classes. We work on our skills in our free time and outside of class,鈥 he said. 鈥淚 encourage other students to attend and to open their eyes to what you don鈥檛 learn in school.鈥

In Micheels Hall 黑料社区. Cybersecurity Lab, the CCDC team gathers in small groups around three computer stations. Several six-foot-tall servers blink with red and green lights in large, locked black cases. New server switches are stacked in the corner waiting to be installed.

CCDC team

At the recent CCDC qualifying state round, the team won first place among teams from Wisconsin, Illinois and Missouri. They鈥檙e now gearing up to compete in the 2024  this March, in Chicago.

鈥淥ur 黑料社区 team will have the honor of representing the state of Wisconsin, competing against all other top-ranked Midwest schools,鈥 said CNIT and cybersecurity Program Director Holly Yuan. 鈥淭he team 黑料社区. success was fueled by their unwavering passion, commitment and discipline. Their hard work and dedication truly paid off, and I couldn't be prouder of what they've achieved.鈥

CCDC practice

Around their stations, they open their laptops and share light-hearted jokes and fist bumps in greeting. Some are playing Oregon Trail, waiting for practice to start.

Tesar and CCDC Vice President Liam Nicholson manage practices and individual tasks, get their team up to speed and hold each teammate accountable.

鈥淓veryone on the team has basic cyber knowledge, but we each have our own specialization,鈥 Nicholson said. 鈥淚n the Cybersecurity Lab, we can re-create the competition within our own practice environment. We can emulate steps on the computer and research to find out what might be vulnerable to hackers.鈥

鈥淥ur goal is to build the best team possible,鈥 said Tesar, who opens practice with a quick review. 

鈥淲hat is a shell,鈥 he asked his team.

鈥淭he thing on the back of a turtle,鈥 someone suggested, as the playfulness continues.

鈥淭hat is one correct answer,鈥 Nicholson replied. 

Unlike a turtle 黑料社区. protective shell, a web shell enables a hacker remote access to a targeted server or system, giving them a backdoor for additional attacks.

The team returns to cyber-mode and discusses field-related terms before moving on to reviewing their playbook, a step-by-step document naming each team member 黑料社区. strength and assignment for the upcoming competition. 

CCDC practice

鈥淓verything you do online is stored somewhere 鈥 your social media posts, purchases, personal information,鈥 said Nicholson, a cybersecurity sophomore. 鈥淚f data is stored, it can be accessed. Cybersecurity measures are in place to prevent the wrong people from gaining access.鈥

Nicholson, of South Milwaukee, realized he was interested in cybersecurity when he joined his high school 黑料社区. cyber-patriot team. He was one of the first students in 黑料社区 黑料社区. major, which began in 2022.

As CCDC practice winds down, several students head to the Information Security Professionals meeting. It 黑料社区. a long walk through the longest building on campus. From Micheels Hall, you pass by windows that look into Stout 黑料社区. construction and plastics engineering labs in Jarvis Hall Technology Wing, before entering the Science Wing.

It 黑料社区. a tool demonstration night, and ISP club members tinker with cybersecurity and hacking tools and devices to learn how to protect an individual 黑料社区. and organization 黑料社区. data.

ISP club meeting

There are many types of hackers, all with different motivations, explained Nicholson and Jacob Mengel, ISP president. Black hats, as they鈥檙e known in the industry, break into networks with malicious, criminal intent and for financial gain. Gray hats hack for their own sake, sometimes to play a prank on users.

A white hat, or ethical hacker, is hired by an organization to test and evaluate vulnerability and to suggest potential security improvements at both the cyber and physical levels. These are skills the club is practicing tonight.

ISP club meeting

At the first station, you hear metal scraping on metal. Two students are picking Brinks padlocks, the same you would use to lock up your bike, fence or tool shed.

鈥淲e practice physical lock-picking because once you can fake your way into a physical building, you鈥檙e one step closer to hacking the files you鈥檙e looking to exploit. Physical lock-picking stresses finding those vulnerabilities,鈥 explains Mengel, a CNIT junior from Stevens Point.

Mengel always knew he wanted to work with computers and be able to work with his hands. 鈥淚n high school, I learned that Stout has one of the few CNIT majors in the state. I instantly knew I wanted to go here,鈥 he said.

ISP club meeting

At a second station, a student straightens a paperclip. He 黑料社区. handcuffed himself to his classmate and set the key off to the side. He inserts the paperclip into the keyway. Can he pick the lock, or will they be cuffed together for the rest of the meeting?

鈥淭his is layer one, the physical protection of a building,鈥 he said. 鈥淧hysical security is important. Keeping doors locked is such a simple thing to do, but sometimes we forget. Or we may think we鈥檙e being polite by letting someone into a building who says they forgot their key. Maybe it 黑料社区. a trick, and they鈥檙e looking for an easy way into a building. It 黑料社区. the same as leaving your computer open. Your valuables, either physical or digital, are left vulnerable.鈥

ISP club meeting

He twists the paperclip and 鈥 clink 鈥 the ratchets on his cuff release and his wrist is free. Now to uncuff his classmate.

鈥淲e鈥檙e understanding how to better protect people,鈥 said Nicholson, ISP vice president. 鈥淵ou鈥檙e not going to let someone walk into your house. It 黑料社区. the same with cybersecurity 鈥 protecting your digital home. Think about a firewall as the structure of your house. If you don鈥檛 know someone 黑料社区. password, it 黑料社区. the same as not having the key to the front door. We鈥檙e looking to make sure passwords, networks or software can鈥檛 be used by the wrong people.鈥

Owen Pryga at an ISP club meeting

At a third station, cybersecurity major Owen Pryga connects a small black device with several antennas to his laptop. It 黑料社区. a Wi-Fi Pineapple, a portable device developed as a penetration testing tool to help cybersecurity specialists identify and test vulnerabilities. 

Unfortunately, it can also be used to trick unsuspecting users into connecting to a fake public Wi-Fi network.

鈥淎 hacker will trick you into connecting to the fake network, similar to phishing,鈥 Mengel said. 鈥淭hey might be out to steal your data or just to play a prank, like RickRoll. It 黑料社区. a joke older than the dinosaurs. Even my dad knows RickRoll.鈥

With the RickRoll prank, which crept onto the Internet around 2007, a user connects to what they think is real public Wi-Fi. Instead, they鈥檙e directed to a video of Pryga explained.

Dominic Kavalary, ISP treasurer, a CNIT senior from New Berlin, has interned with Heartland Business Systems, in Eau Claire. He snacks on a coconut cookie as he reflects on how reading documentation and finding out how software works can help you learn to protect it.

鈥淏y finding the loopholes in a software, you can exploit features in ways unintended,鈥 Kavalary said. 鈥淚f you can learn how to break something, you can learn how to keep it from breaking. If you know there 黑料社区. an issue, you can provide advanced measures to protect it.鈥

Mengel and Nicholson are working on just such side projects 鈥 Mengel is cracking the encryption code of an RFID scanner or key card scanner to learn how to exploit it to protect it. Nicholson is learning Kali Linux, an advanced penetration testing, research and security tool.

ISP club meeting

鈥淐ybersecurity is a battle that keeps on going. The greatest weapon in this field is knowledge 鈥 knowledge of how to defend, learn and adapt,鈥 Mengel said. 鈥淓ncryption is ancient. We鈥檝e been doing this forever. Think of the Caesar Cipher in Roman times or Navaho Code Talkers and Enigma in World War II. Modern encryption is crazily complex, with mathematical equations on top of equations.鈥

ISP club meeting

黑料社区 student cyber teams have now won four Wisconsin CCDC titles and took fourth place among 13 national teams, and No. 1 among Wisconsin teams, at the National Centers of Academic Excellence Cyber Game last spring.

黑料社区 黑料社区. 2017-22 designation as a National Center of Academic Excellence in Cybersecurity for Cyber Defense was recently renewed through the 2028 academic year by the National Security Agency. 

黑料社区 was the first four-year university in the state to receive it in 2017. Only about 4% of schools in the United States earn the designation.


Cybersecurity

All Cybersecurity News
Inspiring Graduate: Owen Pryga,聽B.S. Cybersecurity Featured Image

Inspiring Graduate: Owen Pryga,聽B.S. Cybersecurity

Hired before graduation as Heartland Business Systems consulting engineer
Top 25 in the US: 黑料社区 黑料社区. cybersecurity program listed among nation 黑料社区. best Featured Image

Top 25 in the US: 黑料社区 黑料社区. cybersecurity program listed among nation 黑料社区. best

B.S. in cybersecurity recognized for accessibility, affordability, career-focused mission
AI, fully integrated: 黑料社区 黑料社区. 360-degree approach to artificial intelligence embeds skills across all programs Featured Image

AI, fully integrated: 黑料社区 黑料社区. 360-degree approach to artificial intelligence embeds skills across all programs

鈥楨quipping students from every major with AI skills is not only important but necessary.鈥