The GenCyber Hawaii program provides summer cybersecurity camp experiences for students and teachers. The goals of the program are to help all students understand correct and safe on-line behavior, increase diversity and interest in cybersecurity and careers in the cybersecurity workforce of the Nation, and improve teaching methods for delivering cybersecurity content in K-12 computer science curricula.
Our vision is for the GenCyber program to be part of the solution to the shortfall of skilled cybersecurity professionals. Ensuring that enough young people are inspired to direct their talents in this area is critical to the future of our country’s national and economic security as we become even more reliant on cyber-based technology in every aspect of our daily lives.
Funding: Camps are free and funding is provided jointly by the National Security Agency and the National Science Foundation.
For more information about the national GenCyber program please visit: https://www.gen-cyber.com
What to Expect
Campers will learn the basics of information technology and cybersecurity in a fun and comfortable setting. There will be lessons and lots of hands-on labs!
GenCyber Program Outcomes:
- >An understanding of the GenCyber Cybersecurity First Principles
- >Understanding and promoting ethical behavior and cyber safety
- >Basic knowledge of cybersecurity terminology, concepts, tools and techniques, and
- >Exposure to post-secondary educational opportunities and career pathways
Beginner Camp Topics (may be subject to change):
- >GenCyber Overview: Philosophy & Principles
- >Introduction to Cybersecurity
- >Introduction to the Internet
- >Introduction to Networking
- >Introduction to Forensics
- >Introduction to Coding
- >Introduction to Cryptography
- >Introduction to Windows and Windows Security
- >Introduction to Linux and Linux Security
Intermediate Camps will cover similar topics but at a more in-depth level and may also include advanced topics.
Abstraction is a fancy word for summarizing or explaining in a way we can easily understand. A map is an abstraction of the Earth. The speedometer on a car is an abstraction for how fast the car is going.
Information hiding is any attempt to prevent people from being able to see information. It can be hiding the content of a letter, or it can be applied to hiding how the letter is delivered.
One of the ways to protect information is by limiting what people can do with your information and resources. You may allow someone to read a letter, but not edit it.
The concept of modularity is like building blocks. Each block can be put in or taken out from a bigger product. Each block has its own separate function that is interchangeable with other blocks.
Resources such as hardware (memory, disk drives, display screens) and system objects (semaphores, linked list, shared memory) have to be separated and used in the way they were intended.
Separating areas where resources are located prevents the information worlds from colliding.
Cyber security uses multiple layers of defenses for protecting information. If one layer is defeated, then the next one should catch it.
Minimization refers to having the least functionality of a program or device. The goal is to simplify and decrease the number of ways the software can be exploited.
A process is created when a program is run. By keeping processes separated, it prevents the failure of one process from causing another to fail.
Simplicity of Design
The less complicated something is, the less likely it is to have problems. It is also easier to fix and troubleshoot.