Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Facilitating a battle between hackers: computer security outside of the classroom
Backman N.  SIGCSE 2016 (Proceedings of the 47th ACM Technical Symposium on Computing Science Education, Memphis, TN, Mar 2-5, 2016)603-608.2016.Type:Proceedings
Date Reviewed: Mar 29 2016

Backman describes an attack/defend security contest for inexperienced undergraduates. The contest uses capture the flag, where an attacking team exploits vulnerabilities to acquire sensitive data, “the flag.” The defending team works to patch such vulnerabilities. The game is intended for small liberal arts universities that can offer only a few computer science (CS) courses and often only one in computer security. The game serves also to integrate many ideas in the CS curriculum.

In 2015, the third year the game was offered, 70 students from four universities participated (three time zones). The contest consists of eight one-hour rounds. At the beginning of each round, a new flag is delivered to each team. Scoring is based on capturing a flag, defending a flag, and maintaining service uptime. The paper presents countermeasures against inappropriate tactics. It also describes the architecture of the contest framework: an administrative virtual machine, in Linux, and virtual machines for each team. Support scripts are also described. Teams interact with the game through a website on the administrative virtual machine. An engaging feature of the website is an audible message produced when a flag is captured.

The paper points out the difficulty of scaling the contest. Other universities are interested in participating, but the author believes increasing beyond 16 teams in a single contest would diminish the educational value. The contest does appear to be educationally worthwhile and engaging to students. The paper is readable, with sufficient guidance for someone to develop a similar contest.

Reviewer:  B. Hazeltine Review #: CR144269 (1606-0442)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security (K.4.4 ... )
 
 
Computer Science Education (K.3.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security": Date
Security fundamentals for e-commerce
Hassler V., Artech House, Inc., Norwood, MA, 2000.  409, Type: Book (9781580531085)
May 20 2002
Building firm trust online
Schoder D., Yin P. Communications of the ACM 43(12): 73-79, 2000. Type: Article
Oct 1 2001
Electronic commerce relationships: trust by design
Keen P., Ballance G., Chan S., Schrump S., Prentice Hall PTR, Upper Saddle River, NJ, 2000.  249, Type: Book (9780130170378)
Feb 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy