Students and faculty mentors have suggested the following resources that have been found relevant and useful to AZSecure Cybersecurity students. If you have a resource to add, please let us know!
- Student Organizations
- Collegiate Cyber Defense Competitions
- Other Events
- Outside Certifications
- Social Networking
- Other Resources
AZSecure Cybersecurity students are expected to deposit research data that is relevant to Intelligence Security Informatics and appropriate to share in the AZSecure-data repository to make the data accessible to other researchers in accordance with current standards in research integrity, reproducibility, and replicability. AZSecure-data.org is an NSF funded Digital Infrastructure Building Blocks project (NSF #ACI-1443019) begun in 2014.
Other data resources relevant to cybersecurity are the Hacker Assets Portal (in production) and caida.org/data (Center for Applied Internet Data Analysis).
The University of Arizona's CyberCats club promotes the learning of information security through discussions and hands on activities. Open to any student who has an interest in cybersecurity.
- 2017-18 Faculty Advisor - Eric Case (MIS lecturer)
- 2017-18 President - Rachael Dunn (SFS student)
(ISC)2 Tucson Chapter - The focus of the Tucson chapter of the International Information System Security Certification Consortium is to create an environment that enables Information Security professionals to grow both personally and professionally through collaboration, education, and volunteer efforts aimed at increasing information security awareness within our community.
"CCDC competitions ask student teams to assume administrative and protective duties for an existing “commercial” network – typically a small company with 50+ users, 7 to 10 servers, and common Internet services such as a web server, mail server, and e-commerce site. Each team begins the competition with an identical set of hardware and software and is scored on their ability to detect and respond to outside threats, maintain availability of existing services such as mail servers and web servers, respond to business requests such as the addition or removal of additional services, and balance security needs against business needs. Throughout the competition an automated scoring engine is used to verify the functionality and availability of each team’s services on a periodic basis and traffic generators continuously feed simulated user traffic into the competition network. A volunteer red team provides the “external threat” all Internet-based services face and allows the teams to match their defensive skills against live opponents." From nationalccdc.org, retrieved June 2017.
Many Collegiate Cyber Defense Competitions are held throughout the United States:
See Important Dates for conference dates.
IEEE ISI: "Intelligence and Security Informatics (ISI) is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. ISI supports counterterrorism and homeland security’s missions of anticipation, prevention, preparedness and response to security events, in physical, cyber, enterprise, and societal spaces." isi-conf.org
HICSS Cyber: A symposium focused on Cybersecurity and Big Data Analytics, offered as part of the Hawaii International Conference on Systems Sciences (HICSS). azsecure-hicss.org
DEF CON: One of the world's largest hacker conventions, held in Las Vegas, Nevada. The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as social events and contests. defcon.org
BlackHat: An information security event, presenting the latest in research, development and trends. blackhat.com
CactusCon: Arizona's Largest annual hacker and security conference. cactuscon.com
Women in CyberSecurity (WiCyS): Organized by Tennesee Tech, WiCyS is held annually to address the need for mentoring and retention of women in the cybersecurity field specifically and the shortage of skilled professionals generally. csc.tntech.edu/wicys/
International Conference on Information Systems (ICIS): International conference of the Association for Information Systems (AIS) which serves society through the advancement of knowledge and the promotion of excellence in the practice and study of information systems. aisnet.org
Americas Conference on Information Systems (AMCIS): Domestic conference of the Association for Information Systems (AIS) which serves society through the advancement of knowledge and the promotion of excellence in the practice and study of information systems. aisnet.org
MIS Quarterly (MISQ): "The editorial objective of the MIS Quarterly is the enhancement and communication of knowledge concerning the development of IT-based services, the management of IT resources, and the use, impact, and economics of IT with managerial, organizational, and societal implications. Professional issues affecting the IS field as a whole are also in the purview of the journal." misq.org
Journal of Management Information Systems (JMIS): "The journal is a widely recognized forum for the presentation of research that advances the practice and understanding of organizational information systems. It serves those investigating new modes of information delivery and the changing landscape of information policy making, as well as practitioners and executives managing the information resource. A vital aim of the quarterly is to bridge the gap between theory and practice of management information systems." jmis-web.org
ACM Transactions on Management Information Systems (TMIS): "A scholarly journal, issued quarterly, that publishes the highest quality papers about the design, development, assessment, and management of information technology and systems within organizations, businesses, and societies." tmis.acm.org
Communication of the ACM (CACM): "The leading print and online publication for the computing and information technology fields. Read by computing's leading professionals worldwide, Communications is recognized as the most trusted and knowledgeable source of industry information for today’s computing professional." cacm.acm.org
ACM Transactions on Information Systems (TOIS): "a scholarly journal that publishes previously unpublished high-quality scholarly articles in all areas of information retrieval. TOIS is published quarterly." tois.acm.org
IEEE Intelligent Systems (IEEE IS): "A bimonthly publication of the IEEE Computer Society that provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently." computer.org/intelligent-systems
Journal of the Association for Information Science and Technology (JAIST): "publishes original research that focuses on the production, discovery, recording, storage, representation, retrieval, presentation, manipulation, dissemination, use, and evaluation of information and on the tools and techniques associated with these processes." onlinelibrary.wiley.com/journal/10.1002/(ISSN)2330-1643
Hack Arizona: Hosted at the University of Arizona, participants build software and hardware projects from start to finish in under 36 hours. Team or individual. hackarizona.org
AZCWR (Arizona Cyber Warfare Range): Located in Mesa, Arizona, AZCWR is a physical and virtual place for people who wish to learn any and all aspects of cyber security. Beginners guide / server is useful for anyone who wants to learn basic web pentesting. Check their calendar for special events and appearances. http://azcwr.org/
South West Cyber Security Events: This site provides a calendar display of events located in the southwest as well as listing other resources and competitions. https://swcse.com/
Other Arizona Events List: CyberDegrees.org maintains a list of events and conferences in cybersecurity by state. http://www.cyberdegrees.org/listings/arizona/
Past AZSecure Cybersecurity Fellowship students have recommended obtaining the following professional certifications:
- Certified Information Systems Auditor - CISA Certification
- Certified Information Systems Security Professional - CISSP Certification; see also “Choosing the Right Credential”
- Global Information Assurance Certification - GIAC Certification
Netsec subreddit: Focused on cyber security topics. Top voted links found by AZSecure Cybersecurity students to contain valuable content. https://www.reddit.com/r/netsec/
LinkedIn: Intelligence and Security Informatics group. https://www.linkedin.com/groups/7026335
Twitter: Intelligence and Security Informatics. https://twitter.com/IntelSecInfo
Cyber Security Degrees: This resource maintained by Degree Prospects provides job descriptions and career path information for students interested in the field of cybersecurity. http://www.cyberdegrees.org/
AskCypert: This prototype project integrates research, education, and training programs to provide critically needed testbeds, tools, and educational/training programs to allow students, researchers, professionals, and educators to have hands-on experience in cybersecruity fundamentals, and how to detect vulnerabilities, and attacks, and also protect our cybersecurity resources and services. AskCypert.org
github.com/sbilly/awesome-security: a list of some tools being used for cybersecurity including threat intelligence, packet capturing, as well as links to other related lists. https://github.com/sbilly/awesome-security
Open Security Training: Free cyber security classes. http://www.opensecuritytraining.info/Training.html
CTFTime: Lists all capture the flag events available. Students can compete as individuals, club, or school. https://ctftime.org/