students to chooseengineering as a career. With an emphasis on smart and connected cities, the SCR2 programprovides summer research experiences (eight weeks for students and six weeks for teachers).This paper presents our learnings and insights of the program for the past four years withevaluation findings. There have been 116 students and 44 teachers who have successfullyparticipated. The research program was conducted on campus in 2019, but due to COVID-19, theprogram was conducted online in 2020. In 2021 and 2022, the program was redesigned to behybrid, and six host sites participated. Despite the changes in the program, students' prowess wasenhanced by their teamwork and engagement in the projects. The post-program survey raisedconcerns about
symposium.Finding a book that captures the essence of Cyber Risk Management for an undergraduatestudents that builds upon the curriculum of an institution is no easy feat. This course hascombined using a textbook for the first third with using NIST guidance for the latter two thirds.This semester a new textbook, Cybersecurity Risk Management: Mastering the FundamentalsUsing the NIST Cybersecurity Framework by Cynthia Brumfield with Brian Haugli (2022) [10],was chosen and made a required course reading. This textbook consists of six (6) chaptersserving as the foundational reference in support of learning outcomes and supporting referencefor in-class activities and take-home assignments. Also, this textbook was adopted because of itsreading structure
cipher mode. See Section 12.5.3 in [10] and Figure 4 for more detail. In thisexercise, we focus on the decryption of a unicast packet such as an ARP or ICMP. In Exercise 3,we focus on the AES CMAC message authentication and integrity code algorithm. WPA3 usesAES with a 128-bit key, 128-bit block size and 8 Byte MIC. Note that WPA3-Enterprise supportsthe use of AES-128 CCM and 192-bit session key with AES GCMP-256 mode. The students areto identify the wTarget, that is, the message plaintext/payload (after decryption using Wiresharkwith the WPA Temporal Key (TK) extracted from the logs and the captured 4-way handshakemessages.) Figure 4: Encryption and Authentication with CCMP using TK or GTK in WPA3.The students are also to be provided
with feedback. Our data is collected through a surveywhich follows students’ interaction with our web-based drill and practice programming systemcalled Edugator in the context of a Data Structures and Algorithms (DSA) course at a large publicuniversity in the United States. Our system provided students two workflows for solving andreceiving feedback on short programming problems: (1) using a browser-based workflow and/or(2) downloading an equivalent template of the problem and feedback, and coding it locally on theircomputer (a native workflow). We qualitatively coded 199 students’ responses regarding choicesusing inductive thematic analysis to identify common themes. Our study found that while moststudents were motivated by convenience and