Collegiate cyber defense competition where teams of 8 defend real-world networks
World's largest cyber defense competition cofounded with the Air Force to inspire students towards STEM careers
Individual or team network assessment and network defense competition where competitors vie for control of resources
Collegiate cyber defense competition where teams compete by securing provided virtual machines
Low- and no-cost professional training solutions through certification prep courses and cybersecurity awareness training.
Research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs
We customize training, host workshops, and conduct community-wide exercises to suit your organization’s individual needs
Beginning in 2002, the CIAS began conducting a series of community and state cybersecurity exercises around the country. These were successful events in that participants went away having learned about issues related to the importance of cybersecurity within states and communities, and how important information sharing is in order to be able to address attacks involving more than one organization.
While participants learned about various cybersecurity issues, a common problem was a lack of understanding concerning where to start implementing a community-wide cybersecurity program. The CIAS studied this issue and determined what was needed was more specific guidance to help states and communities understand where to start and how to progress. This research resulted in the development of the Community Cyber Security Maturity Model (CCSMM), which provided both a way to measure the current maturity of the state’s or community’s program and guidance to know what steps they could take to improve.
Visit our Community Cyber Security Maturity Model page to learn how it can help create a comprehensive cybersecurity program in your community.
Over the years, research conducted by the CIAS has led to multiple research papers being presented at the Hawaii International Conference on System Sciences (HICSS). HICSS has been known worldwide as the longest-standing working scientific conferences in Information Technology Management. Since 1968, HICSS has provided a highly interactive working environment for top scholars from academia and industry from over 60 countries to exchange ideas in areas of information, computer and system sciences.
Harrison, Rutherford, White, “The Honey Community: Use of Combined Organizational Data for Community Protection”, Proceedings of the 48th Annual Hawaii International Conference on System Science, January 5-8, 2015, Grand Hyatt, Kauai, Hawaii. Read the Paper Here.
This paper focuses on how to determine the threat to a community and what indications and warnings can lead us to suspect an attack is underway. To try and help answer these questions, this research uses the concepts of Honeypots and Honeynets, extending them to a multi-organization concept within a geographic boundary to form a Honey Community. The initial phase of the research done in support of this paper was to create a fictitious community with various components to entice would-be attackers and determine if the use of multiple sectors in a community would aid in the determination of an attack.
White, Sjelin, Harrison, “The Need for Information Sharing and Analysis Organizations to Combat Attacks on State and Community Public and Private Networks”, 52nd Annual Hawaii International Conference on Systems Science, January 9, 2019, Grand Wailea, Maui, HI. Read the Paper Here.
This paper describes how a state or community can use the creation of an Information Sharing and Analysis Organization (ISAO) to jumpstart various aspects of its cybersecurity program, incorporating a number of established programs in a single initiative, to protect their computer systems and networks.
Goles, White, and Dietrich, “Dark Screen: An Exercise in Cyber Security”, University of Minnesota, June 2005. Read the Paper Here.
The digital age has transformed how organizations function. The production and delivery of essential goods and services is now highly dependent on the global information infrastructure: the complex and interconnected telecommunications networks and information systems owned and operated by a multitude of discrete organizations. Yet, this amorphous entity is beyond the control of individual organizations. This paper presents Dark Screen, a scenario-based exercise for identifying and assessing resources and capabilities useful in protecting the information infrastructure.
Granado and White, “Developing a Community Cyber Security Incident Response Capability”, 42nd Annual Hawaii International Conference on System Sciences, 5-8 January 2009, Big Island, Hawaii.Read the Paper Here.
Community leaders do not have direct control or authority over the many disparate organizations within a community but may reasonably be expected to direct the response to such an attack. This paper addresses this issue and makes various recommendations for what communities can do in preparing for a community response to a cyber-attack or incident.
Granado and White, “Cyber Security and Government Fusion Centers”, Proceedings of the 41st Annual Hawaii International Conference on System Science, 2008. Read the Paper Here.
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed to take what may seem to be disparate pieces of information on a variety of subjects and “fuse” them together to be able to recognize indicators of potential terrorist attacks. This paper discusses the need to develop a cyber capability in fusion centers and the importance of government involvement in coordinating a state’s, community’s, or region’s cyber defense efforts.
Sjelin and Dietrich, “Method to Identify High Value Assets for Small Government Agencies and Small to Mid-sized Organizations”. Read the Paper Here.
Every organization has critical information and technology assets that are essential to their business operations and require enhanced security. Organizational resources that can be dedicated to cybersecurity are finite; therefore, those resources should be applied deliberately and strategically focusing on the most important assets. This paper will describe a method for identifying high value assets that can be integrated into an organization’s or agency’s cybersecurity program.
When the CIAS was created in 2001, it received a total of $5 million from the Department of Defense through a grant sponsored by Senator Kay Bailey Hutchison to research cybersecurity. A large portion of this grant was intended to be used to help jumpstart the security program at The University of Texas at San Antonio. Research projects included topics like hardware-based intrusion detection, elliptic curve cryptography, detection of steganography and biometric access control methods.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.