KeenTween
  • Home
  • Inspire her
  • Phenom
  • STEM
  • Gender
  • FUN
  • Math fear?
  • summer fun
  • Then & Now
  • About

cyber security


 CyberPatriot is the National Youth Cyber Education Program created to help direct students toward careers in cybersecurity or other science, technology, engineering, and mathematics disciplines. The program, created by the Air Force Association, features the National Youth Cyber Defense Competition for high school and middle school students. Your School sure would have a club too! Get the list of registered teams: Here

I.  become a cyberpatriot

Picture

CyberPatriot is the National Youth Cyber Education Program.  At the center of CyberPatriot is the National Youth Cyber Defense Competition. The competition puts teams of high school and middle school students in the position of newly hired IT professionals tasked with managing the network of a small company.

In the rounds of competition, teams are given a set of virtual images that represent operating systems and are tasked with finding cybersecurity vulnerabilities within the images and hardening the system while maintaining critical services in a six hour period.  Teams compete for the top placement within their state and region, and the top teams in the nation earn all-expenses paid trips to Baltimore, MD for the National Finals Competition where they can earn national recognition and scholarship money Learn more..
​




II. what is cyber security?

Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

III. what is cryptography?


​Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence.

This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers.





So today, lets walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.

Science

Technology

Engineering

Mathematics

Empowerment

  • Home
  • Inspire her
  • Phenom
  • STEM
  • Gender
  • FUN
  • Math fear?
  • summer fun
  • Then & Now
  • About