Conroy opens undergrad pen test competition

Powered by SC Magazine
 

Seeks to entice with Black Hat conference ticket.

The Federal Government has invited Australian undergraduate students to participate in a national penetration testing competition early next month.

It expects to attract 15 to 20 teams from each university to the 24-hour, 2012 Cyber Defence University Challenge, which commences at noon on April 3.

Each team will comprise up to four university students and be judged on how quickly and how well it achieves six hacking goals and three other tasks on a fictitious business network.

According to the Government’s information for participating universities, teams will also be asked to develop a “secure network design for long-term implementation”.

The winning team will be announced by April 6 and be sponsored by Telstra to attend the July 2012 Black Hat Security Conference in Las Vegas.

Second and third prizes include tablets and smartphones from Telstra. The Government noted that contestants may also be offered secondments or work experience placements at Telstra and government agencies.

Communications Minister Stephen Conroy last week said that the competition stemmed from issues that arose in the Government’s Cyber White Paper, due for release later this year.

“The need for greater awareness of cyber security issues and for more high-skilled ICT graduates were two of the key themes to emerge from the public engagement process,” he stated.

“The challenge will raise awareness of the importance of cyber security, particularly in the university and business sectors, while also showcasing the diverse career opportunities for ICT graduates.”

Teams are required to register for the challenge by March 27.

Copyright © iTnews.com.au . All rights reserved.


Conroy opens undergrad pen test competition
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 313

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote