The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2011 vol.9)
pp: 56-59
Gregory Conti , US Military Academy
Thomas Babbitt , US Military Academy
John Nelson , US Military Academy
ABSTRACT
Most hacker conferences sponsor diverse and intense competitions. These competitions test the participants' creativity and problem-solving skills, are fun and innovative, and draw large, enthusiastic groups of participants and spectators. Academia and the computer security industry have widely adopted hacker competitions, such as DEF CON's Capture the Flag, to augment information security education. Many other hacker competitions, however, are less known. This article surveys some of them, identifying those that can energize and enhance information security education.
INDEX TERMS
hacking, hacking competitions, computer security, security and privacy, hacker conferences, capture the flag, computer security education
CITATION
Gregory Conti, Thomas Babbitt, John Nelson, "Hacking Competitions and Their Untapped Potential for Security Education", IEEE Security & Privacy, vol.9, no. 3, pp. 56-59, May/June 2011, doi:10.1109/MSP.2011.51
REFERENCES
1. S. Bratus, "What Hackers Learn That the Rest of Us Don't: Notes on Hacker Curriculum," IEEE Security & Privacy, vol. 5, no. 4, 2007, pp. 72–75.
2. G. Conti, "Why Computer Scientists Should Attend Hacker Conferences," Comm. ACM, vol. 48, no. 3, 2005, pp. 23–24.
3. M. Locasto, "Helping Students Own Their Own Code," IEEE Security & Privacy, vol. 7, no. 3, 2009, pp. 53–56.
4. W. Adams et al., "Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives," Proc. 2nd Conf. Cyber Security Experimentation and Test, Usenix Assoc., 2009, p. 2.
5. N. Shachtman, "Crack the Code in Cyber Command's Logo," blog, 7 July 2010; www.wired.com/dangerroom/2010/07solve-the-mystery-code-in-cyber-commands-logo .
6. K. Zetter, "Solving the Enigma of Kryptos," Wired.com, 21 Jan. 2005; www.wired.com/culture/lifestyle/news/2005/ 0166334.
7. J. Grand, "Research Lessons from Hardware Hacking," Comm. ACM, vol. 49, no. 6, 2006, pp. 44–49.
8. R. Lemos, "Mandiant Researchers Win Race to Zero," SecurityFocus,11 Aug. 2008; www.securityfocus.com/brief795.
9. M. Blaze, Safecracking for the Computer Scientist, tech. report, Dept. of Computer and Information Science, Univ. of Pennsylvania, 2004.
10. M. Lennon, "Snoop Dogg Joins the War on Cybercrime," SecurityWeek,1 Sept. 2010; www.securityweek.comsnoop-dogg-teams-norton-fight-cybercrime .
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool