Welcome to the third annual Cybersecurity Across Disciplines (CyAD) Conferencehosted by the National Cybersecurity Training & Education Center (NCyTE)!
The schedule is tentative and subject to change. Please check back regularly for the most current version.
Important Notice: All sessions are first-come, first-served. While you can plan your schedule in Sched, it does not guarantee a seat in any session. CyAD registrants check your email inbox or junk folder for Sched invite.
Sign up or log in to add sessions to your schedule and sync them to your phone or calendar.
5G networks will support billions of IoT devices, enabling Industry 4.0, smart infrastructure, connected cars, and public safety. IoT introduces new security risks due to device scale and attack surfaces. A strong IoT security approach requires zero trust and defense-in-depth strategies. Some of the Key risks: supply chain compromises, weak authentication, DDoS, malware, botnets, and data breaches.
This study will showcase access to 5G network, discovery of KPI of a 5 network, the simulation of 3 different attacks on 5G networks including:
1- Jamming 5G network: A 5G jamming attack is a type of denial-of-service (DoS) attack that disrupts wireless communication by overwhelming a 5G network with interference, preventing devices from transmitting or receiving signals effectively 2- Bidding 5G network: A 5G bidding attack is a type of downgrade attack where an attacker forces a device to connect to a lower-generation network (e.g., 4G, 3G) instead of the more secure 5G network. This allows the attacker to exploit weaker security protocols and intercept or manipulate communications. 3- A man in the middle attack: A Man-in-the-Middle (MitM) attack in a 5G network occurs when an attacker intercepts, alters, or relays communication between a user and the network without their knowledge. Despite 5G’s enhanced security, sophisticated MitM attacks can still exploit vulnerabilities in network authentication, encryption, and signaling protocols. Each one of the attacks will be showcased, simulated, and visualized.
Professor/Director of Cyber Defense / Networking / Programming, Roane State CC
Computer Science/Computer Information Technology Educator with over 30 years of teaching and training in IT, Cyber defense, information assurance, and digital forensics. Passion for teaching and training students to strengthen the IT and cybersecurity disciplines by developing dynamic... Read More →