High School Cyber Defense

High School Due Dates

 

General Information

Requirement For Each Group.

  • A team comprised of 3-6 members registered by the HyperStream Teacher Champion/Advisor in 9th-12th grade
  • Medical Form (All students under the age of 18 as of April 30th)
  • Photo Release Form (All students under the age of 18 as of April 30th)
  • Community Service
  • Team Competition Summaries

Optional participation

  • Best Team Name
  • Best Team Logo

IT Olympic competition components

Each venue will have three components that the teams will be judged on as described in the pages that follow. The three components are:

  • Community Service
  • Primary Competition
  • Real-time Competition

The goals of the competition are to promote interest and exploration of information technology through a fun, unrestricted learning environment that encourages collaboration and experiential learning.

Primary Competition

The primary competition is designed to show the technical abilities of the team. The project that the team has worked on and brought to the competition is what will comprise this portion of the score. Each venue will have different scoring methods and judging criteria which are generally enumerated later in this document.

Real-time Competition

During the IT-Olympics, teams will be asked to solve problems in real-time based on the venue. Because these are real-time problems, the actual challenges and details are not known ahead of time. The problems and the judging criteria are given out during the course of the two-day competition.

Please Make Special Note: Advisors, Mentors, chaperones and visitors will be allowed to watch the competition from the patron seats in Hilton Coliseum during IT-Olympics (only judges and students are allowed in the venue areas and on the floor). The only exception to this is on Friday for the Cyber Defense teams – teachers/mentors can be on the floor on Friday in the cyber venue area only to assist with their cyber teams.

Please be respectful; this is a student event. For all teams to have the same advantage, communications with your teams is not allowed unless cleared by IT-O director or venue director. Any such help or hints will result in a significant point deduction and potentially a disqualification from the competition. This applies to all venues.

High School Cyber Defense Competition

Brought to you by Iowa State University & the Technology Association of Iowa

 **IT Olympics is for 9 – 12 Graders Only**

Cyber Defense requirements:

In a cyber defense competition, the high school teams (the Blue Teams) play the role of IT staff at a company. They configure a network of computers/servers and provide services to the end users of their network (the Green Team) throughout the event. They also must defend their network for an extended period of time from hackers (the Red Team). In addition to configuring and protecting their network, the Blue Team will be asked to participate in anomalies introduced by the Green Team. Successfully completing each of the tasks will better their score for the competition. The Green Team anomalies, defending from the Red Team attacks, and writing reports comprise the real-time portion of the competition.

The high school teams are provided a scenario of a company and the types of services they are required to run on their networks in a separate document. Generally, they are required to provide a set of services this can include but in not limited to email (SMTP and POP/IMAP), remote desktop (RDP), remote programming and web services. It generally behooves a team to also install a firewall in their network. A complete scenario with full details of the requirements for this year’s competition will be available at noon on April 3rd .

Approximately one month prior to coming to campus for this weekend event, the students are given instructions on how to remotely access our research environment to configure their competition network. The team members spend nearly a month installing and configuring operating systems on their servers. They can choose from a variety of operating systems including Windows and unix/Linux flavors. Each team is given remote access to virtual computers to be configured as servers, firewalls and/or routers for their network and allowed free reign in their installation. They also are given an IP range/ranges that they can use in our virtual Internet environment. A special chat program will also be in place during the remote setup that is specifically for questions and help from the ISU students who are supporting the competition.

Judging

The cyber defense competition uses primarily positive scoring. Each team begins with a balance based on flags that the Red Team is trying to plant/capture. If flags are captured the points for that flag will be subtracted from the teams total. Otherwise, Teams earn points for positive things like having services up and good documentation on your network. You also earn points for good reports about attacks that occurred and the steps you took to protect your network.

Points are deducted for problems such as services being down, vulnerabilities being exploited, non-completion of an anomaly, loss of flags and non-submittal of documentation.

More details about scoring is in the rules document that will be available when the scenario is distributed. The team with the highest score at the end of the competition is the winner.

EQUIPMENT NOTES: Each team will need to bring at least one laptop to access their systems they are defending. It is highly recommended that teams bring one laptop per student for the cyber event.

*Each school is responsible to do background checks on anyone 18 or older that will be attending IT-Olympics associated with their students/teams.