UR Cybersecurity club addresses cyber threats in workshop b

Firewall configuration made easy through networking workshop
The University of Regina Cybersecurity Club hosted a networking workshop on March 7.
Participants gained a general understanding about computer networks and witnessed a live demo of security-system configration, also known as firewalls. Firewalls usually serve as a first line of defense against illicit and unauthorized access to computer systems and malware.
Khoi Le is a fourth-year computer science student as well as a member of the UR Cybersecurity Club. When asked about the reason behind the workshop, Le said configured security-systems are important because they protect one’s data.
“When someone thinks of cybersecurity, I bet they think of hackers or malicious actors that [steal] millions of dollars,” Le said. “That was my initial perception of cybersecurity, at least. The offensive aspect of cybersecurity is no doubt exciting, but I also want to show people that there is a defensive aspect to the security in cybersecurity.”
Le said students can configure their own firewalls to block malicious sites, advertisements and unfriendly countries. “They can also segment their network into multiple networks to improve their internal security,” he said.
Satyam Singh, a second-year computer science student as well as co-executive member of the UR Cybersecurity Club said the workshop tied in with the overall vision of the club, which is to educate people about cybersecurity. It starts with networking and security-system configuration. ““This workshop was the basics and the first step of it all.”
While the term “firewall configuration” may seems daunting for those who are not tech-savvy, Le’s live demonstration showed participants the process is more accessible than one might think.
Le showed the participants thow to block traffic and avoid losing one’s personal information and sensitive data to t outside threats. Like a water filter removes impurities, the security system removes malicious traffic so that only safe data remains in the computer system.
“This hands-on session is meant to show attendees that all the theoretical knowledge discussed in the workshop can be applied to the real world,” said Le.“I hope the attendees feel that security-system installation and configuration is doable after the live demo.”
Le’s advice for students is to first learn about industry-standard practices, and then put that knowledge to use. On the offensive side, there’s hacking methods and ethical ways to use them like participating in bug bounties. On the defensive side, learn about firewalls and network segmentation.
“If you do not use it, you lose it,” he said. “Practicing frequently will help you keep your technical skills sharp and your knowledge of industry trends up to date.”