Risk
8/16/2010
02:58 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

National High School Cyber Defense Competition Registering Teams For Fall

CyberPatriot III is presented by Northrop Grumman

ARLINGTON, Va., Aug. 16 /PRNewswire-USNewswire/ -- The registration deadline is looming to participate in the nation's premier high school cyber defense competition, CyberPatriot III.

"Our unique online competition still has room for teams," said Bernie Skoch, CyberPatriot Commissioner. "To join, a high school teacher signs up and signs on five bright students for a fun, hands-on learning opportunity. It's a great chance for the top teams to win scholarship money and a trip to Washington, D.C."

CyberPatriot,presented by Northrop Grumman, is the one-of-a-kind national cyber security competition produced by the Air Force Association (AFA), a nonprofit organization headquartered near Washington, D.C. The registration deadline is October 8, 2010.

Teams of five, with an approved coach (generally a teacher) sponsoring them, learn to defend a computer network from real-life computer threat scenarios. In the fall, hundreds of teams across the nation will square off online, using special software and programs provided by CyberPatriot, to competitively solve vulnerabilities in their network. The top teams then compete again in a series of online rounds to determine finalists for an all-expenses-paid trip to the nation's capital and the Championship Round at the Gaylord National Convention Center, in conjunction with AFA's Cyber Futures Symposium and Technology Exposition in April of 2011.

Any high school can field a team for the Open Division, while JROTC units from any service or Civil Air Patrol are also eligible to field a team for the All Service Division. The educational experience and materials are identical for students in either division.

"Cyber security is growing in importance, and will be an important career path," said Skoch, a retired Air Force Brigadier General. "CyberPatriot gives young people an inside look at an exciting field, and could lead to more options for a college educational track."

Coaches can learn more about CyberPatriotand sign up at www.uscyberpatriot.org. Information is also available from the CyberPatriot staff at [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.