Higher Ed Information Security Council Contest Seeks Student Videos

Malware dressed like ninjas; a talking computer that warns its owner not to walk away, leaving it behind; a lone guy in a cavernous room using social engineering by phone to obtain private information from an unsuspecting student. These are the topics of a few of last year's winners in a video competition hosted by the EDUCAUSE & Internet2 Higher Education Information Security Council (HEISC). The latest contest was announced as part of October's National Cyber Security Awareness Month (NCSAM), an event promoted by Homeland Security and intended to draw attention to information security, data protection, and privacy programs.

EDUCAUSE is a higher education IT community, and Internet2 is a consortium of universities working with government and private industry entities on advanced networking technologies.

The contest seeks videos two minutes or less, 30-second public service announcements, or posters developed by college students to inform other students about safe computing practices.

The top three winners in each category will receive cash prizes--$2,000 for the top video and the top announcement and $1,500 for the top poster. The winners will also be featured on the HEISC Web site and may be used in campus security awareness campaigns.

The deadline for entries is March 8, 2013. Rules are available at educause.edu and last year's winners may be viewed on YouTube, Facebook, and Pinterest.

HEISC was formed in 2000 specifically to address the common security ailments of the higher education sector. The latest priorities focus on bring-your-own-device programs and cloud computing. The NCSAM website includes an online resource kit with templates, checklists, guidelines, training materials, and other tools contributed by Educause member universities and colleges.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • glowing digital brain interacts with an open book, with stacks of books beside it

    Federal Court Rules AI Training with Copyrighted Books Fair Use

    A federal judge ruled this week that artificial intelligence company Anthropic did not violate copyright law when it used copyrighted books to train its Claude chatbot without author consent, but ordered the company to face trial on allegations it used pirated versions of the books.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.