{"id":13828,"date":"2018-05-03T18:13:07","date_gmt":"2018-05-03T23:13:07","guid":{"rendered":"https:\/\/www.mma-tx.org\/blog\/?p=13828"},"modified":"2018-05-23T16:21:58","modified_gmt":"2018-05-23T21:21:58","slug":"cyberpatriot-developing-computer-security-leaders","status":"publish","type":"post","link":"https:\/\/www.mma-tx.org\/blog\/13828\/cyberpatriot-developing-computer-security-leaders\/","title":{"rendered":"CyberPatriot: Developing Computer Security Leaders for the Future"},"content":{"rendered":"<p>&nbsp;<\/p>\n<figure id=\"attachment_13833\" aria-describedby=\"caption-attachment-13833\" style=\"width: 560px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13833\" src=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto.jpg\" alt=\"MMA's 2018 CyberPatriot computer security nationals team\" width=\"560\" height=\"340\" srcset=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto.jpg 560w, https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto-300x182.jpg 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><figcaption id=\"caption-attachment-13833\" class=\"wp-caption-text\">MMA&#8217;s 2018 CyberPatriot computer security nationals team &#8211;<\/figcaption><\/figure>\n<p>Cyber-crimes dominate the news on almost a daily basis and are perpetrated by\u00a0 master computer criminals who are not only after your credit card numbers, but your personal data as well.\u00a0 All of\u00a0 what they steal can be sold on the dark web for a handsome profit.\u00a0 These criminals are generally not your nerdy teen next door, but more often are members of sophisticated crime syndicates that patiently look for flaws in their target\u2019s computer security system \u2013 and there are always flaws \u2013 and steal whatever is valuable.<\/p>\n<h1>CyberPatriot: Developing Computer Security Leaders for the Future<\/h1>\n<h2>Computer Security mean National Security<\/h2>\n<p>The security of our nation is dependent on our ability to defend our underlying computer infrastructure from both criminals and hostile nation-states who wish to steal our money, intellectual property and develop capabilities to destroy vital services.<\/p>\n<p>To combat these threats the nation is in dire need of computer security professionals.\u00a0 It is estimated that more than 200,000 cyber security jobs in the US are currently unfilled. These jobs range in pay from $50,000 a year upward to $140,000.<\/p>\n<h2>CyberPatriot: Computer Security Challenge<\/h2>\n<p>The United States Air Force Association recognized the burgeoning threat to national security and created a program to enliven an interest in cybersecurity among our nations youth.\u00a0 The program they developed is called CyberPatriot and involves a series of security competitions that leads to a national finals event. In 2017, there were more than 5,000 teams from across the country that competed in the rounds prior to finals.\u00a0 The program has the backing of sponsors such as Northrop Grumman, CISCO, Boeing, Facebook and the Department of Homeland Security to name a few.<\/p>\n<p><iframe loading=\"lazy\" title=\"CyberPatriot X (2017)\" width=\"1290\" height=\"726\" src=\"https:\/\/www.youtube.com\/embed\/sesaiofAEWA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<p>During the competition teams are given computer systems that have security flaws that they must identify and fix. They are also tasked with building and configuring a computer network. \u00a0This means not only connecting the devices together, but also programming the various network devices so each communicates as it should.\u00a0 Teams have six hours to harden their systems and complete the networking tasks.\u00a0 Teams must find and fix flaws to accumulate points. Over the series of four competitions, the teams with the highest points are selected for nationals. \u00a0These teams earn an all-expense paid trip to the national competition held in Baltimore Maryland and have a chance to win recognition and college scholarships.<\/p>\n<p>Students who have an interest in computers, solving puzzles or are just curious about technology are drawn to participate in CyberPatriot.\u00a0 To compete successfully they must learn real-world, marketable, skills.\u00a0 And, just as you might predict, many go on to college to earn computer and security related degrees.<\/p>\n<h2>Marine Military Academy&#8217;s\u00a0 CyberPatriot Team<\/h2>\n<figure id=\"attachment_13833\" aria-describedby=\"caption-attachment-13833\" style=\"width: 560px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13833\" src=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto.jpg\" alt=\"MMA's 2018 CyberPatriot computer security nationals team \" width=\"560\" height=\"340\" srcset=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto.jpg 560w, https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2018\/05\/cyberPatriot2018TeamPhoto-300x182.jpg 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><figcaption id=\"caption-attachment-13833\" class=\"wp-caption-text\">MMA&#8217;s 2018 CyberPatriot computer security nationals team<\/figcaption><\/figure>\n<p>The <a href=\"http:\/\/www.mma-tx.org\">Marine Military Academy<\/a> in Harlingen, Texas has participated in the CyberPatriot program since 2014 and has attend the national competition four out of those five years. \u00a0Most recently MMA\u2019s six-member 2018 team participated in the national competition. \u00a0For one team member it was his fourth time attending nationals and had been involved in the program for five years starting in 8<sup>th<\/sup> grade.\u00a0 Beyond generating an interest in computer security, CyberPatriot also develops a student\u2019s critical thinking and team skills which are highly valued in today\u2019s work force.<\/p>\n<p>To learn more about the CyberPatriot program and how your school can participate visit the CyberPatriot website:\u00a0<a href=\"http:\/\/www.uscyberpatriot.org\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.uscyberpatriot.org\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Cyber-crimes dominate the news on almost a daily basis and are perpetrated by\u00a0 master computer criminals who are not only after your credit card numbers, but your personal data as well.\u00a0 All of\u00a0 what they steal can be sold on the dark web for a handsome profit.\u00a0 These criminals are generally not your nerdy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13832,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,258],"tags":[],"class_list":["post-13828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-academics-success","category-training-facilities"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts\/13828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/comments?post=13828"}],"version-history":[{"count":10,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts\/13828\/revisions"}],"predecessor-version":[{"id":13842,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts\/13828\/revisions\/13842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/media\/13832"}],"wp:attachment":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/media?parent=13828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/categories?post=13828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/tags?post=13828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}