Many Network Security students and individuals in everyday life are concerned about identity protection and rightfully so. Trusted companies are breached every day and information is leaked. The legal aspect aside, it still happens and private information is still breached. This is one reason information should be monitored and watched over. Some of the resources for my identity protection I use are going to be listed below.
Last week the UAT CCDC team competed in the last invitational—or practice round—of the season for the Western Regional Collegiate Cyber Defense Competition (WRCCDC). At WRCCDC colleges compete against each other in maintaining and securing servers. This experience was only our second invitational. (You can learn more about our first go around here.)