This session is designed for highschool students
Interested in what a security attack looks like? Netsim is a simulator game walks you through the basics of how computers communicate with each other, with an emphasis on security. You will learn how to perform attacks that real hackers use and see how they work in our simulator!
Through the use of a network simulator game (CS4G Netsim) this workshop introduces participants to foundations of computer networks and their security. Participants will be able to perform realistic network attacks within the confines of the game that correspond to real network attacks. We will conclude with examples of the implications of the attacks demonstrated and potential defenses that are used to protect computer networks.
**BEFORE WiCS Con starts: Please bring a laptop or tablet that has an installed internet browser (e.g., Google Chrome) to the workshop!
Location: DC 2585
Speakers:
Shanza is a Master's student in the Cheriton School of Computer Science co-supervised by professors Leah Zhang-KennedyÌý²¹²Ô»åÌý, and a student member of the . Previously, she worked with CISPA's Usable Security group on multiple research projects. Presently, Shanza is interested in tackling the pervasive lack of inclusivity and fairness in technology solutions. She strives to develop frameworks that prevent discriminatory behaviour in undereducated and non-weird communities that can make tech more usable and secure.
Tanmayi is a PhD student in Electrical & Computer Engineering at the Communications Security Lab at UÀ¶Ý®ÊÓÆµ, supervised by Prof. Guang Gong. She holds a Master’s degree in Applied Science from UÀ¶Ý®ÊÓÆµ and also previously worked as a software engineer, where she developed secure routing protocols for a telecom equipment company.Her research focuses on building privacy-preserving systems that remain secure in the post-quantum era. Specifically, she works on designing cryptographic protocols such as zero-knowledge proofs and post-quantum digital signatures that can preserve user privacy and data integrity even when quantum computers render today’s encryption obsolete.