Beat to 1337: How to create a successful university cyber defense organization

Video thumbnail (Frame 0) Video thumbnail (Frame 8184) Video thumbnail (Frame 11534) Video thumbnail (Frame 13315) Video thumbnail (Frame 14792) Video thumbnail (Frame 16549) Video thumbnail (Frame 17808) Video thumbnail (Frame 19904) Video thumbnail (Frame 20332) Video thumbnail (Frame 20843) Video thumbnail (Frame 21475) Video thumbnail (Frame 21917) Video thumbnail (Frame 22696) Video thumbnail (Frame 23175) Video thumbnail (Frame 23839) Video thumbnail (Frame 24248) Video thumbnail (Frame 26549)
Video in TIB AV-Portal: Beat to 1337: How to create a successful university cyber defense organization

Formal Metadata

Title
Beat to 1337: How to create a successful university cyber defense organization
Title of Series
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
2013
Language
English

Content Metadata

Subject Area
Abstract
A university with no prior CTF experience and no students with significant prior information security experience may find competition a daunting task. Most competitions require a large amount of technical knowledge to set up, along with a fair amount of organization. But how are students with no information security knowledge going to compete in CTF competitions and keep from getting completely owned? Well, the answer is, they're not. The most important step to successful competition is educating oneself. In this presentation, we describe our efforts as a team of undergraduate students interested in creating our school's cyber defense organization and beginning to participate in CTF competitions. We introduce the methodologies that we used (and continue to use) in order to start educating and motivating bright students about information security and keep them interested. We will use our personal experience and proven successful tactics to outline the necessary steps to take and to expose the commonly overlooked necessities of starting a cyber defense organization, regardless of if you are a student interested in information security, an advisor looking to motivate students, an alumnus looking to share your passion for information security, etc. Information security education must continue outside the classroom. Although the demand for information security knowledge is high, the requirements are rigid. While the industry is growing very rapidly, students who do not show passion and dedication to the field, and deep practical knowledge will be quickly left behind. We aim to leave you armed and ready to compete with and learn from some of the best and brightest information security students in the world. Mike Arpaia is a Junior in the CyberSecurity program at Stevens Institute of Technology and is a co-founder of the Stevens Cyber Defense Team. Mike works as a Security Consultant/Penetration Tester Intern at Gotham Digital Science LLC. His primary interests are in web application security and exploitation. Ted Reed was a student interested in cyber-security. Now he likes model planes and simulation.

Related Material

Video is accompanying material for the following resource
Presentation of a group Computer Social class Informationstheorie Cybernetics Hacker (term) Self-organization
Augmented reality Data structure
Mathematics Overhead (computing) Googol Computer
Disintegration Collaborationism Computer network Data storage device Data management Computer hardware Software Visualization (computer graphics) Repository (publishing) output Local ring Flag Self-organization Traffic reporting
Sample (statistics) Graph (mathematics) Demo (music) Mathematical analysis Binary file
View (database) Online help
Simultaneous localization and mapping Gamma function Simulation Window
Sic View (database) Simultaneous localization and mapping Voltmeter Drum memory
Execution unit Oval Length System administrator Content (media) Lipschitz-Stetigkeit Game theory Scalable Coherent Interface
Mathematics System administrator Gamma function
Sign (mathematics) Raw image format Execution unit Link (knot theory) Sic Computer cluster System administrator Hill differential equation Range (statistics) Menu (computing) Routing
Execution unit NP-hard Infinity
Online help Electronic meeting system
Demo (music) Implementation
Metric system Collaborationism Cybernetics Electric current
Feedback