Inspiring the next generation of cybersecurity professionals 

 

Sponsored by the National Security Agency and National Science Foundation, GenCyber is a 7-day, residential summer camp open to students of diverse cybersecurity experience. If accepted to the yearly camp cohort, campers will enjoy engaging, hands-on learning opportunities including classroom activities and field trips to NSA Georgia and the Fort Gordon Cyber Center of Excellence. 

GenCyber

goals of the gencyber camp: 

  • Expose high school students to potential careers and issues in cybersecurity. 
  • Teach students to secure their digital lifestyle. 
  • Demonstrate to students why "Internet of Things" devices need to be secured. 
  • Augusta University's program is designed to teach the GenCyber First Principles (listed below), cybersecurity ethics and online safety and hygiene.

Contact Us

GenCyber Camp at Augusta University

706-721-1110

gencyber@augusta.edu

School of Computer and Cyber Sciences

Facebook Group: GenCyber Camp

@AUG_Cyber

@aug_cyber

GenCyber FAQ's:

GenCyber First Principles

 

Abstraction 

 

A fancy word for summarizing or explaining in a way that is easily understood.

Modularity 

 

Able to be inserted or removed from a project, each module has its own function interchangeable with other modules. 

Domain Separation 

Separating areas where resources are located prevents accidents and loss of data, keeping information worlds from colliding. 

Resource Encapsulation 

Resources hardware, system objects, or processes must be separated and used as intended. 

Information Hiding 

Information hiding is any attempt to prevent people from being able to see information. It can be hiding the content of a letter, or it can be applied to hiding how the letter is delivered. 

Process Isolation  

A process occurs when a task is executed. Keeping processes separate prevents the failure of one process from negatively impacting another. 

Layering 

Cyber security uses multiple layers of defenses for protecting information. If one layer is defeated, then the next one should catch it. 

Simplicity of Design 

The less complicated something is, the less likely it is to have problems. It is also easier to fix and troubleshoot. 

Least Privilege 

One of the ways to protect information is by limiting what people can do with your information and resources. You may allow someone to read a letter, but not edit it. 

Minimization 

Minimization refers to having the least functionality of a program or device. The goal is to simplify and decrease the number of ways the software can be exploited. 



The future starts here. Join the fun.

Applications coming soon for GenCyber 2021!  

Apply