Iowa State IT Students To Try Their Luck Against Hackers
Competition is designed to give future IT professionals a taste of the real world of network security
Iowa State University will be victimized by hackers this weekend, and school officials are just fine with that. That's because the hackers will be applying their demonic talents to help educate a new generation of network security professionals during the Big 12 School's 2005 Cyber Defense Competition.
The contest, one of a handful of such events across the country, will pit 11 teams of four to six Iowa State students against each other in a battle to see who's best at fending off a variety of network intrusions. The idea is to simulate the conditions young networking geeks will encounter as future IT professionals. "Hopefully, the network teams keep the network up and running, and stay one step ahead of the hackers, just like in the real world," says Nate Evans, a senior computer science and German major who's student director of the competition.
The security matchup is different from other similar events in a number of ways. Students will focus on protecting business information rather than the warfare intelligence that students guard during competitions at the military academies. And whereas participants in competitions at the University of Texas at Austin are asked to secure an already assembled network a day earlier, Iowa State's students were given all the hardware they need weeks in advance, and they set up their own network with security in mind.
Additionally, the whole competition unfolds in Iowa State's Internet Scale Event and Attack Generation Environment, a state-of-the-art security testing facility funded by the U.S. Department of Justice to the tune of $500,000, with another $700,000 on the way. (A team from the University of Illinois at Urbana-Champaign is planning to visit Iowa State to get a glimpse of the facility and to learn more about ISU's event.)
The competition works like this: The student teams set up their networks to support a range of business-related tasks, such as checking E-mail or browsing the Web, and a neutral team of students act as users, using a dedicated workstation to perform those computing tasks. Then, the team of hackers--about a dozen volunteers from the IT security community, most of whom represent private companies that are members of the FBI's local InfraGard chapter--start launching the attacks they've been working on independently for weeks. "They're given a connection to the network, and we tell them 'do your worst,'" says Evans.
The winning team--on which each member is given a $100 gift certificate for the school book store--is determined by a team of judges based on the team's effectiveness in fending off the stream of attacks over an 18-hour period starting Friday night.
The competition could soon become part of a more coordinated national program. The Iowa State event was born from a National Science Foundation workshop two years ago at which attendees from academia and private industry discussed plans for a national competition that would function like a March Madness for students interested in IT security. That ambitious goal is still a ways off, but Iowa State is taking steps in that direction. It plans to open the competition to students from other schools in its region beginning with an event next spring. Plus, the school wants to expand its reach with tentative plans to host a competition that would pit teams of industry, government, and academic IT pros against each other.
2014 Next-Gen WAN SurveyWhile 68% say demand for WAN bandwidth will increase, just 15% are in the process of bringing new services or more capacity online now. For 26%, cost is the problem. Enter vendors from Aryaka to Cisco to Pertino, all looking to use cloud to transform how IT delivers wide-area connectivity.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.