WASHINGTON, Monday, April 18, 2011 – The University of Washington’s Computer Science and Engineering Cyber Defense Team won first place in the 6th annual National Collegiate Cyber Defense Challenge (NCCDC), with Texas A&M following in second place and the University of Louisville in third.
The three-day challenge was held April 8-10th at the Hilton San Antonio Hotel. The competition was created in 2005 to spur regular cyber security exercises amongst post-secondary level students. The contestants are made up of winning teams from each regional challenge, with nine teams competing in this year’s challenge.
Each group must manage a hypothetical network, which imitates the infrastructure of a mid-size company of approximately 50 users, utilizing 7 to 10 servers and Internet services including web servers, mail servers and e-commerce sites. Judges score the teams on their ability to detect and respond to outside threats, maintain Internet services and balance business and security needs.
The approximately 250 NCCDC volunteers, administrators and participants are organized into teams, each categorized by a separate color. The red team is composed of security personnel professionals and penetration testers who simulate the “bad guys” by playing hacker, throwing curve balls and attempting to break into each University network. Other teams include the white team, which evaluates team performance, and the black team, which provides technical and administrative support.
Each university team is given a room with a number of computers, tables and white boards. Two judges remain in each room at all times to both score the team as well as make sure no rules are broken.
“We worked well as a team,” says Baron Von Oldenburg, a junior computer engineering major and member of the UW cyber defense team. “When tension did arise, we did a good job of diffusing the situation without pointing fingers.”
In addition to promoting IT education, for many students the competition proves an excellent networking opportunity. Von Oldenburg said three different companies have approached him since the competition, all relating to job opportunities. Alumni from the UW team have gone on to work for Google Security, Apple and Microsoft.
This is UW’s first NCCDC win, and their fourth time winning the Pacific Rim Collegiate Cyber Defense Competition (NCCDC). The team is self-funded and self-organized. To prepare, team captain Alexei Czeskis took the team down to train at UW’s Tacoma campus.
“We wanted to make sure we had all of our bases covered,” says Czeskis.
“The top three teams all exhibit good time management skills, technical skills, and the ability to balance defending their networks from live attacks and responding to the business tasks we presented to them,” says CCDC director Dwayne Williams.
Due to the perpetual advancing teachnology industry, the competition has changed drastically over its short five-years.
“Each year the competition evolves and becomes more difficult,” says Williams. “We add more equipment, new technologies, increased the amount of work we expect the teams to do, and so on. We’ve seen a dramatic increase in the skills and capabilities of the teams coming to the National CCDC. We’ve had to basically make it much harder so we can continue to challenge them.”
Additional contestants this year hailed from DePaul University, Montana Tech, Northeastern University, Towson University, and Cal Poly Pomona.
The University of Washington brought the Alamo Cup, the challenge’s coveted trophy, back to Seattle, where it will be displayed at the Paul G. Allen Center for Computer Science and Engineering until next year’s competition
Microsoft Executive Calls For Improved Information Sharing Between Governments and Companies
Brad Smith said information sharing is critical for preventative measures against cyberattacks.
WASHINGTON, September 20, 2021—Microsoft Vice Chair Brad Smith called for improved information sharing between countries to prevent cyberattacks on critical infrastructure.
While participating in a Washington Post Live discussion on September 20, Smith pointed toward certain sectors and aspects of society that should be protected from cyberwarfare. He specifically mentioned that a country’s digital supply chains, healthcare systems, and electoral processes should be considered off limits.
“I think the sobering fact of life is that unfortunately the world typically comes together to do what needs to be done only after it has experienced some kind [disaster],” he said.
“If we said we won’t harm civilians in a time of war, why should we for a moment, tolerate this kind of harm to civilians in what is supposed to be a time of peace?” Smith likened the SolarWinds attack to tampering with a blood supply to harm recipients.
A webinar in June hosted by the Stimson Center heard that a cybersecurity framework between countries is key to combatting cyberattacks.
Information sharing with private companies
In addition to reaffirming a commitment to not cause civilian harm, Smith also called for improving coordination and information sharing between private companies and stated that these efforts are enhanced by government leadership.
“I think any day when we’re sitting down and talking about how we can collaborate more closely among companies, that’s probably a good day.” Smith lauded efforts by the Biden Administration to facilitate information sharing between tech companies to prevent further attacks like the one SolarWinds suffered, “We are going to need a government that can work as a single well-coordinated team and the team is going to need to include participants in an appropriate way from the private sector as well. I’m hopeful, encouraged and I would dare say even optimistic.”
Last month, Comcast Cable’s chief product and information officer Noopur Davis said the private sector is falling behind on information sharing during cyberattacks, and that companies in the tech industry are reevaluating their strategies and how they share information to prevent such acts. Some have noted that companies are still not prioritizing cybersecurity.
Senator Angus King, I-Maine, has even called for new rules requiring companies to disclose when they’ve been breached in a hack.
Shortage of cybersecurity workforce
Smith noted, however, that there is still a lot of work that needs to be done. He described a “substantial shortage” of cybersecurity professionals, which he stated is one of the reasons organizations are not able to move quickly enough to keep pace with bad actors and implement best practices.
“There is a real opportunity for us to work together for community colleges to do more [and] for businesses to do more to train their people,” he said.
Overall, Smith stated that things are moving in the right direction but emphasized that the international community—governments and otherwise—need to establish better methods of federating data that is secure from bad actors but accessible to the necessary parties.
Private Sector Falling Behind on Information Sharing During Cyberattacks, Says Comcast Rep
Comcast’s Noopur Davis says cyber attackers share information better than the private sector.
ASPEN, Colorado, August 23 — In the wake of an influx of ransomware attacks on critical infrastructure and cyberattacks on private carriers, entities across the technology industry are revaluating their strategies and how they share information to prevent such acts.
T-Mobile announced on August 15 that as many as 50 million consumers had their private data compromised during a data breach. Days later, on August 17, as part of Technology Policy Institute’s 2021 Aspen Forum, Noopur Davis, Chief Product and Information Officer at Comcast Cable, sat down for a fireside chat to discuss what the industry was doing to address this event and events like it.
Join in Broadband Breakfast Live Online’s Discussion on “Cybersecurity: Reviewing the Biden Administration’s Executive Order,” on Wednesday, August 25, 2021, at 12 Noon ET.
When Davis was asked how she felt about the current state of cybersecurity, she said it was okay, but that the telecom community at large would have to do more.
She referenced the mean time of comfort—that is, the average duration between the time that a service becomes connected to the internet and when it is targeted by bad actors. While in the early days of the internet cybersecurity experts could expect to have significant mean times of comfort, she stated that this is no longer the case.
“The second you connect [to the internet] you are attacked,” she said.
As soon as a successful breach is recognized, Davis explained that the target companies begin to revaluate their “TTP,” or tactics, techniques, and procedures.
Information sharing is crucial
Though one company may find a remedy to their breach, other companies may remain vulnerable. To combat this, Davis said that it is critical for companies to share information quickly with their counterparts, but she indicated that this is a race that the private sector is currently losing.
“[Attackers] share information better than [the private industry does].”
She went further, revealing that there is now a sophisticated market for malware as a service, where various platforms publish reviews for their products and services and even offer tech support to those struggling to get the most out of their purchases.
Growing market for hacking tools
She pointed to the Colonial Pipeline attack as an example where hackers did not even create the malware themselves—they just purchased it from a provider online. She explained that this marketplace has significantly lowered the barriers of entry and deskilled the activity for would be attackers, and that theoretically anyone could engage in such nefarious acts today.
Though Davis was in favor of collaboration between companies to address these attacks, she made it clear that this would not mean that responses and capabilities would become standardized, and that every company would maintain their own unique strategies to ensure that their services and data remain uncompromised.
DOJ Official Supports Mandatory Breach Reporting
Proposed legislation would make it mandatory for companies to report cyberattacks.
August 2, 2021—An official from the Department of Justice urged members of the Senate judiciary committee last week to proceed with legislation requiring companies to report ransomware attacks to federal agencies.
Richard Downing, deputy assistant attorney general of the criminal division within the department, told the committee studying cybersecurity during a hearing that such mandatory breach reporting legislation would aid in its defense against cyberattacks.
There is currently no federal law requiring such disclosures, but bipartisan Senate legislation co-sponsored by Senator Angus King, I-Maine, would change that. Titled Cyber Incident Notification Act of 2021, the bill was introduced last month.
This legislation would require all contractors, federal agencies, companies, and organizations critical to U.S national security to report all breaches of data to the Department of Homeland Securities’ Cybersecurity and Infrastructure Security Agency (CISA) within 24 hours.
The bill and discussions about it come in light of high-profile cyberattacks that have targeted software company SolarWinds and oil transport company Colonial Pipeline in the last several months. And the discussion isn’t expected to slowdown as more critical infrastructure is hooked up to the internet.
The Last week, the House energy committee approved a series of cyber bills that would improve telecom network security.
Cyber threats becoming more bold
Downing noted that threat actors are becoming bolder and more sophisticated, and that the government must hasten efforts to thwart attacks and stay ahead of such malicious acts.
“Many actors now research their victims—identifying the victim’s net worth, the cost of a business interruption, and even the value of their cyber insurance policy—to extort as much money as possible,” Downing said during the hearing.
- Federal Trade Commission Will Likely Not Be Able to Implement Competition Rules, Panelists Say
- House Passes Ban on Chinese Equipment, 3.45 GHz Auction Reaches Reserve Price, Against a ‘Wi-Fi Tax’
- LEO Satellite Technology Should Be in All Schools, Gigabit Libraries Network Says
- Housing, Public Interest Groups Oppose Multitenant Exclusivity Agreements
- Broadband Breakfast on October 27, 2021 — When ‘Greenfield’ Fiber Meets ‘Brownfield’ Multiple Dwelling Units
- Federal Communications Commission Dispenses $544 Million in Rural Broadband Funds
Signup for Broadband Breakfast
Antitrust4 months ago
Experts Disagree Over Need, Feasibility of Global Standards for Antitrust Rules
Broadband Roundup2 months ago
Senators Intro App Bill, Groups Drop TracFone Buy Complaint, States Want Shorter Robocall Deadline
Infrastructure3 months ago
Lumen Responds to Allegations it Underbuilds While Collecting Public Funds
Broadband Roundup2 months ago
Mapping Comment Deadline Extended, AT&T Gets Federal Contract, 5G and LTE Drive Microwave Demand
Antitrust4 months ago
House Judiciary Committee Clears Six Antitrust Bills Targeting Big Tech Companies
Antitrust3 months ago
Daniel Hanley: Federal Communications Commission Must Block Verizon’s Acquisition of TracFone
#broadbandlive2 months ago
Broadband Breakfast on September 1, 2021 — What’s Next for Broadband Infrastructure Legislation?
Section 2303 months ago
Facebook, Google, Twitter Register to Lobby Congress on Section 230