{"id":97805,"date":"2014-10-27T08:52:17","date_gmt":"2014-10-27T12:52:17","guid":{"rendered":"https:\/\/today.uconn.edu\/?p=97805"},"modified":"2014-10-30T10:44:55","modified_gmt":"2014-10-30T14:44:55","slug":"cybersecurity-contest-challenges-teams-to-think-like-a-hacker","status":"publish","type":"post","link":"https:\/\/today.uconn.edu\/2014\/10\/cybersecurity-contest-challenges-teams-to-think-like-a-hacker\/","title":{"rendered":"Cybersecurity Contest Challenges Teams to Think Like a Hacker"},"content":{"rendered":"<figure id=\"attachment_97803\" aria-describedby=\"caption-attachment-97803\" style=\"width: 400px\" class=\"wp-caption alignright\"><a href=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDUNewHaven.jpg\"><img decoding=\"async\" class=\"wp-image-97803 img-responsive lazyload\" data-src=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDUNewHaven.jpg\" alt=\"University of New Haven team members discuss strategy in the Capture the Flag competition, during a two-day cybersecurity conference organized by the Center of Excellence for Security Innovation, a partnership between Comcast and the UConn School of Engineering's Center for Hardware Assurance, Security, and Engineering. Their coach, Frank Breitinger, will teach a course next semester called \u201cHacking.\u201d (Christopher LaRosa\/UConn Photo)\" width=\"400\" height=\"267\" data-srcset=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDUNewHaven.jpg 630w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDUNewHaven-300x200.jpg 300w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDUNewHaven-150x100.jpg 150w\" data-sizes=\"(max-width: 400px) 100vw, 400px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 400px; --smush-placeholder-aspect-ratio: 400\/267;\" \/><\/a><figcaption id=\"caption-attachment-97803\" class=\"wp-caption-text\">University of New Haven team members discuss strategy in the Capture the Flag competition, during a two-day cybersecurity conference organized by the Center of Excellence for Security Innovation, a partnership between Comcast and the UConn School of Engineering&#8217;s Center for Hardware Assurance, Security, and Engineering. (Christopher LaRosa\/UConn Photo)<\/figcaption><\/figure>\n<p>Computer hackers descended upon UConn this past week, and for their efforts, came away with more than $100,000 in prize money.<\/p>\n<p>Teams from 43 colleges including UConn gathered at the Lewis B. Rome Commons Ballroom to take part in various challenges at CyberSEED, a two-day cybersecurity conference that also featured speakers and panel discussions. Rear Adm. David Simpson, chief of the Federal Communications Commission&#8217;s Public Safety and Homeland Security Bureau, gave a talk about the state of national and international cybersecurity.<\/p>\n<p>The conference, which took place Oct. 21-22, was organized by the Center of Excellence for Security Innovation (CSI), a partnership between Comcast and UConn School of Engineering\u2019s Center for Hardware Assurance, Security, and Engineering (CHASE). It was the first of what is planned to be an annual event.<\/p>\n<p>The competitions featured both software and hardware challenges, but the most popular was Capture the Flag. Here, teams hacked away at classified files of the fictitious country Cyberia, acting on behalf of the small neighboring nation Sanctus Pirata. The files provided details of the country\u2019s oil rigs, allowing the smaller nation to tap into them if successful.<\/p>\n<figure id=\"attachment_97804\" aria-describedby=\"caption-attachment-97804\" style=\"width: 400px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDSyracuse.jpg\"><img decoding=\"async\" class=\"wp-image-97804 img-responsive lazyload\" data-src=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDSyracuse.jpg\" alt=\"The team from Syracuse University hacks away for classified files in the Capture the Flag competition, during a two-day cybersecurity conference organized by the Center of Excellence for Security Innovation, a partnership between Comcast and the UConn School of Engineering's Center for Hardware Assurance, Security, and Engineering. (Christopher LaRosa\/UConn Photo)\" width=\"400\" height=\"267\" data-srcset=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDSyracuse.jpg 630w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDSyracuse-300x200.jpg 300w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2014\/10\/CyberSEEDSyracuse-150x100.jpg 150w\" data-sizes=\"(max-width: 400px) 100vw, 400px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 400px; --smush-placeholder-aspect-ratio: 400\/267;\" \/><\/a><figcaption id=\"caption-attachment-97804\" class=\"wp-caption-text\">The team from Syracuse University hacks away for classified files in the Capture the Flag competition. (Christopher LaRosa\/UConn Photo)<\/figcaption><\/figure>\n<p>Teams came from as far as Washington State and New Mexico. Some were veterans of hacking competitions, others complete novices. Coming to UConn for their first hacking competition, East Tennessee State University flew into Connecticut at 2 a.m. Energy drinks and coffee figured heavily in their strategy. Their coach, computer science professor Mike Lehrfeld, said the team members had spent much of the past few weeks discussing strategies and different scenarios they might encounter.<\/p>\n<p>\u201cThe competition allows them to showcase what they\u2019ve worked on all year long,\u201d he said.<\/p>\n<p>In the end, it was Brown University who took top honors based on speed and the number of documents uncovered. They won $15,000 for first place. Overall, more than $100,000 was awarded to winning teams. No one went away empty-handed: every participant received a Samsung tablet.<\/p>\n<blockquote><p>These kinds of efforts will pay off for the good guys. You need to know how a system is vulnerable before you can protect it. &#8212; Andrew Rector, Bloomberg University<\/p><\/blockquote>\n<p>So how do you prepare for a hacking competition?<\/p>\n<p>\u201cLots of YouTube video, lots of Googling,\u201d said Andrew Rector, a senior with the team from Bloomsburg University in central Pennsylvania. Even though they were taking on the role of the bad guys, he said, &#8220;these kinds of efforts will pay off for the good guys. You need to know how a system is vulnerable before you can protect it.&#8221;<\/p>\n<p>Indeed, conference speaker Cheri Caddy, director of cybersecurity policy integration and outreach at the White House, told the audience that security efforts have lagged because of a lack of training in the field.<\/p>\n<p>Michael Garvin, senior manager of product management for Symantec, was one of the architects of the Capture the Flag competition. They devise their games partly by current events \u2013 who\u2019s committing cyberattacks and why \u2013 and from feedback from companies who want to protect their security.<\/p>\n<p>These competitions, he said, are a way of identifying vulnerabilities in a company\u2019s computer system.<\/p>\n<p>\u201cWe\u2019ll ask companies \u2018What is it that you\u2019re worried about?\u2019 Then we can prevent those things from happening, or lessen the amount of damage,\u201d he said. \u201cWe\u2019ve seen some interesting and novel methods in these competitions \u2013 all the better to help us prepare.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent competition on campus demonstrated that those protecting the security of data need to be as ingenious as the hackers.<\/p>\n","protected":false},"author":58,"featured_media":97803,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","wds_primary_category":0,"wds_primary_series":0,"wds_primary_attribution":0,"footnotes":""},"categories":[1715,1],"tags":[],"magazine-issues":[],"coauthors":[117],"class_list":["post-97805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-community-impact","category-uncategorized"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-04-12 16:11:53","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/97805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/comments?post=97805"}],"version-history":[{"count":5,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/97805\/revisions"}],"predecessor-version":[{"id":97829,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/97805\/revisions\/97829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media\/97803"}],"wp:attachment":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media?parent=97805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/categories?post=97805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/tags?post=97805"},{"taxonomy":"magazine-issue","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/magazine-issues?post=97805"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/coauthors?post=97805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}