Global CyberPeace Challenge: Difference between revisions
Appearance
m added Category:Communities of Practice using HotCat |
|||
Line 3: | Line 3: | ||
Three competitions comprise each GCC. | Three competitions comprise each GCC. | ||
# The Cyber Policy and Strategy Challenge<br/> | # The Cyber Policy and Strategy Challenge<br/> | ||
:A simulation of an international cyber crisis that tests teams' strategies, policies, and knowledge of foreign policy and cybersecurity against necessary trade-offs, the clock, and each other.<ref>[https://www.cyberchallenge.net/cyber-policy-and-strategy-challenge/ Cyber Policy and Strategy Challenge, GCC]</ref> | #:A simulation of an international cyber crisis that tests teams' strategies, policies, and knowledge of foreign policy and cybersecurity against necessary trade-offs, the clock, and each other.<ref>[https://www.cyberchallenge.net/cyber-policy-and-strategy-challenge/ Cyber Policy and Strategy Challenge, GCC]</ref> | ||
# Capture the Flag<ref>[https://www.cyberchallenge.net/capture-the-flag/ Capture the Flag, GCC]</ref><br/> | # Capture the Flag<ref>[https://www.cyberchallenge.net/capture-the-flag/ Capture the Flag, GCC]</ref><br/> | ||
#* Irrespective of experience, age or nationality, anyone can participate in the CTF to prove their Cybersecurity skills | #* Irrespective of experience, age or nationality, anyone can participate in the CTF to prove their Cybersecurity skills | ||
Line 14: | Line 14: | ||
#** A Proof of Concept report with proper screenshots must be sent to the organizer | #** A Proof of Concept report with proper screenshots must be sent to the organizer | ||
#** participants need to secure their system before entering the OT Network as it will be attacked by the other attackers | #** participants need to secure their system before entering the OT Network as it will be attacked by the other attackers | ||
# The Peace-a-thon's objective is to have participants | # The Peace-a-thon's objective is to have participants compete over who can provide the most secure DNS Infrastructure to the community based on real-time DNS threats. | ||
==Editions== | ==Editions== | ||
As of May 2022, there have been three editions. | As of May 2022, there have been three editions. |
Revision as of 18:32, 17 May 2022
The Global CyberPeace Challenge (GCC) is a worldwide competition for recognizing talent in offering solutions to pressing cybersecurity problems. The objective is to tap into innovative approaches to solve critical real-world, technical and policy challenges. The first two editions of GCC saw over 3000 participants from over 70 countries.[1]
Overview
Three competitions comprise each GCC.
- The Cyber Policy and Strategy Challenge
- A simulation of an international cyber crisis that tests teams' strategies, policies, and knowledge of foreign policy and cybersecurity against necessary trade-offs, the clock, and each other.[2]
- Capture the Flag[3]
- Irrespective of experience, age or nationality, anyone can participate in the CTF to prove their Cybersecurity skills
- Information Technology:
- Participants/teams are provided puzzles with security vulnerabilities, with a secret key called "flag" embedded. Finding it means participants have solved the challenge and earned the points.
- there are Cryptographic, Steganographic, Web-based, Reverse engineering, Networking, and Forensics puzzles.
- Operational Technology:
- participants receive remote VPN access to a nonhardened Industrial Control System (ICS) platform with preconfigured vulnerabilities
- participants must determine the IP range of the OT Network, the devices connected to the network, the running protocols, and the vulnerabilities, and then exploit the system to gain access.
- A Proof of Concept report with proper screenshots must be sent to the organizer
- participants need to secure their system before entering the OT Network as it will be attacked by the other attackers
- The Peace-a-thon's objective is to have participants compete over who can provide the most secure DNS Infrastructure to the community based on real-time DNS threats.
Editions
As of May 2022, there have been three editions.
GCC 1.0
GCC 2.0
GCC 3.0
- ICANN Board Chair Maarten Botterman spoke on ICANN’s role in addressing DNS security threats at the Global CyberPeace Challenge 3.0.[4]