Inspiring the next generation of cybersecurity professionals
Sponsored by the National Security Agency and National Science Foundation, GenCyber
is a 6-day, residential summer camp open to students of diverse cybersecurity experience.
If accepted to the yearly camp cohort, campers will enjoy engaging, hands-on learning
opportunities including classroom activities and field trips to NSA Georgia and the
Fort Eisenhower Cyber Center of Excellence.
Rising high school juniors and seniors are eligible to attend GenCyber.
Are there specific criteria needed for acceptance into GenCyber?
Students who attend the GenCyber Camp shall demonstrate exceptional skill, creativity
and knowledge in math and science. Academic achievement and social maturity are considered
in the selection process. There is no specific numerical minimum test score or GPA
set by the committee, however, admittance to the program is competitive.
Will I be graded or given credit for work completed at GenCyber?
The GenCyber camps are prestigious, pre-collegiate summer programs, but they do not
provide grades or college course credit. Accepted students are not required to take
any exit exams or standardized tests regarding major courses of study.
I am a special needs student and require special accommodations to attend GenCyber.
Can I still participate if accepted?
Yes. If a special needs student is accepted to GenCyber, camp staff will reach out
to the parent or child to determine if accommodations are possible within the confines
of the program.
GenCyber First Principles
A fancy word for summarizing or explaining in a way that is easily understood.
Able to be inserted or removed from a project, each module has its own function interchangeable
with other modules.
Separating areas where resources are located prevents accidents and loss of data,
keeping information worlds from colliding.
Resources hardware, system objects, or processes must be separated and used as intended.
Information hiding is any attempt to prevent people from being able to see information.
It can be hiding the content of a letter, or it can be applied to hiding how the letter
A process occurs when a task is executed. Keeping processes separate prevents the
failure of one process from negatively impacting another.
Cyber security uses multiple layers of defenses for protecting information. If one
layer is defeated, then the next one should catch it.
Simplicity of Design
The less complicated something is, the less likely it is to have problems. It is also
easier to fix and troubleshoot.
One of the ways to protect information is by limiting what people can do with your
information and resources. You may allow someone to read a letter, but not edit it.
Minimization refers to having the least functionality of a program or device. The
goal is to simplify and decrease the number of ways the software can be exploited.