160 likes | 302 Views
CyberPatriot IV Overview. Overview. What is CyberPatriot Who can play How does the competition work. What is CyberPatriot.
E N D
Overview • What is CyberPatriot • Who can play • How does the competition work
What is CyberPatriot “CyberPatriot is the national high school cyber defense competition created by the Air Force Association (AFA) to excite, educate, and motivate the next generation of cyber defenders and other science, technology, engineering, and mathematics (STEM) graduates our nation needs.” Founding Partners:
What is CyberPatriot • Multi-round computer security competition • Designed to be a team sport • Two separate divisions • All-Service: JROTC and CAP • Open: Any high school team • Objective: Find and fix all the “issues” on your target system(s) • Anything from poor passwords to malware removal
Who can play • Competitors must be at least 13 years old and in grades 9-12 as of September 2011 • All team members in the All-Service Division must be currently enrolled in a JROTC or CAP program before participating in any competition round • Team size - 2 to 5 members (up to 5 alternates) • For the 2011-2012 season you CAN have more than one team per school in each division • But each team must have it’s own, unique coach
Who can play • Students can only participate on one team • Can’t be on Open team and Service division teams • Schools can create “combined” teams • Those schools can not have individual teams • Open division cost is $350 per team • Covers all trip costs if you qualify for finals • Access to MSDN AA Developer license • Participant kit for up to 10 students • See FAQ on uscyberpatriot.org for more details
How does the competition work • Multi-round computer security competition • First three rounds are virtual • Virtual rounds require that your team have • Computer(s) that meet the minimum specification • A reliable Internet connection • VMWare Player, 7-zip, and MD5 software
How does the competition work • Every round requires you to find and fix issues on virtual machines • Round 1: One target (usually Windows) • Round 2: Two targets (usually Windows) • Round 3: Three targets (Windows and Linux)
How does the competition work • Virtual rounds use the CyberNEXS system from SAIC for scoring • Each target has an agent that runs on it • Communicates with the scoring engine • Scores your team’s efforts locally • Must be able to communicate out on ports 80 and 443 • Do not modify/remove the CyberNEXS agent or accounts
How does the competition work • Prior to competition round • Download target • VERIFY the checksum • At start of competition round • Retrieve password to unzip target • Unzip target • Launch VM and Register • Once registered, start fixing the issues
How does the competition work • During competition round • Check “Get My Status” page on target • GMS will tell you: • If you are connected to the scoring engine • How many of the issues you’ve fixed (as a percentage) • Score is based on how many things you fix and how quickly you fix them • For rounds with multiple targets, scores are added together • Support line manned by AFA personnel during rounds
How does the competition work • Competition “window” this year • 36 hour window for each round • Targets contain a timer that runs when activated • Your team decides when to start • 6 hours from starting point • Practice rounds in Sept/Oct • Highly recommended
Important Dates • October 8, 2011 – Registration Closes • All Service Division • Round 1: Oct 28-29 • Round 2: Dec 2-3 • Round 3: Jan 13-14 • Open Division • Round 1: Nov 4-5 • Round 2: Dec 16-17 • Round 3: Jan 27-28
Important Dates • Finals for both divisions will be held Mar 22-24, 2012 during AFA’s CyberFutures Conference at the Gaylord National Hotel and Convention Center, National Harbor, Md.
Tips • Read documents and instructions carefully • Organize patches, programs, etc. for virtual rounds • Get used to virtual machines early • Develop your own team procedures and checklists • Consider the order in which you do things
Tips • Run on the fastest machine you can find • Make sure your system has at least 2 GB of memory • Make sure you have at least 20 GB of free disk space • In later rounds, run targets on separate systems