Sunteți pe pagina 1din 3

The Use of a Collegiate Cyber Defense Competition in

Information Security Education


Art Conklin
The University of Texas at San Antonio
6900 N. Loop 1604 West
San Antonio, TX 78249
210-4-6309
art.conklin@utsa.edu

ABSTRACT a ubiquitous information technology landscape. This ever


A Collegiate Cyber Defense Competition was conducted this increasing IT environment is driving a need for more college
spring with five universities fielding teams. This event was graduates with significant information technology backgrounds.
designed to provide student led teams a simulated operational Colleges turn out graduates with many different levels of specific
business environment in which they could test their skills at skills related to the proper application of information technology.
information security and system operation. This three day event Computer science programs are developing the next generation of
included external hackers attacking the student networks, as well professionals that will develop the technical aspects of the IT
as business users placing operational and administrative demands systems that will drive our future. Information systems
on the teams. Teams were scored based on their ability to departments in colleges of business specialize in the business use
maintain mandated business services, keeping hackers out and of technology to achieve business goals. Between these two
answering business scenario injects. The objective was to provide views, there is a continuum of students and skills to support
an environment where the teams could exercise their information society’s need for ever increasing technological solutions.
technology abilities and do so in an operational mode where most Computer security is one of those areas that have dependencies on
information was not freely provided, but must be uncovered and both technical and implementation foundations. Educating
discovered by the students in real time. Issues such as college students to become effective computer security
prioritization, resource allocation and technical skill application professionals is a daunting task as the breadth of knowledge
were tested using real world examples on a known instrumented required is immense. Theoretical and technical elements are
network. The objective of providing feedback to each team as to typically covered in computer science curriculums. The practical
its skill level and abilities was achieved and then some over the application of security principles is covered in many CS and IS
course of this successful event. Lessons were learned which are programs. However, these two foundational elements have not
being used to move this local event to a national level event. proven to be sufficient to produce the professionals desired by
industry today.

Categories and Subject Descriptors Recently, a Collegiate Cyber Defense Competition was conducted
with participants from five colleges. The competition was
K.3.2 Computer and Information Science Education, Computer designed to challenge the teams in a simulated operational
science education, Curriculum, Information systems education business environment, to provide basic business related services
and do so in a secure fashion. To test their abilities, a separate
General Terms team was used to simulate a series of hacker attacks against their
Security. networks. Additionally, a series of business related challenges
relating to standard system administration were presented, forcing
Keywords the teams to react to business requests as well as the external
Information Security, Education, Competition. threat environment. This competition was held at The University
of Texas at San Antonio this spring with interesting results. All
of the teams performed well, with each team eventually securing
1. INTRODUCTION their environment from the outside attacks. The teams took
Computer security is an important issue in today’s environment of differing approaches in team organization and operational
approach to the problems. There was not a single optimal method
Permission to make digital or hard copies of all or part of this work for demonstrated, each had advantages and disadvantages. At the
personal or classroom use is granted without fee provided that copies conclusion of the competition, all participants were surveyed as to
are not made or distributed for profit or commercial advantage and that the state of their preparedness for the competition.
copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists, The answers to the preparedness questions led to some interesting
requires prior specific permission and/or a fee. revelations. The vast majority of participants stated that their
Information Security Curriculum Development (InfoSecCD)
curriculum did not adequately prepare them for the competition.
Conference '05, September 23-24, 2005, Kennesaw, GA, USA. The reasons were varied, from specific, i.e. no practical
Copyright 2005 ACM 1-59593-261-5/05/0009…$5.00.

16
experience setting up a Cisco VPN router and firewall, to general, penetration tests against each network. This activity was to
i.e. poor preparation to prioritize multiple simultaneous issues. simulate an external hacker attempting to disrupt the companies
Technical issues plagued some teams, procedural and network operations. The red team had no inside knowledge of
implementation issues challenged others. Over the course of the individual systems, or account passwords, nor were any specific
three day event, each team had faced numerous challenges of backdoors placed in the systems to facilitate red team actions.
differing natures. The wide range of these challenges was a Some limitations were placed on the red team, such as no denial
significant contributor to students’ concern over preparation. of service attacks or system destructions to keep the competition
on a positive base. Red teams were also not permitted to use
The purpose of the competition was to provide an educational
zero-day or classified exploits or tools against the competing team
environment for students to critically examine their abilities. This
systems. In addition to the attacks by the red team, a series of
opportunity is different from a standard examination in a couple
timed business related injects were periodically presented to the
of ways. It is team based; allowing students to work in teams and
teams. These injects were designed to act as typical business
capitalize on different team members strengths. It was conducted
related activity and involved items such as equipment changes,
over three days with continuous feedback to the teams, enabling
personnel changes and system functionality changes. Lastly, a
them to make changes in their approaches and activities in
scoring engine was used to measure the availability of a series of
response to the measured effectiveness. The result of the exercise
business functionality to ensure systems were up and responding
was that the teams, both students and faculty members, felt that
in an appropriate manner.
the event served to increase their education in computer security
and the operational aspects of employing information technology Each team’s score was a combination of how well they kept their
in a business environment. Based on this result, the expansion of systems up and functioning as reflected by the scoring engine,
the competition to a national level event is being planned and how well they handled the injects, as each inject was scored, and
pursued by the initiators of this first regional event.. how well they kept the external hackers at bay. Injects were
multi-level items with a range of points based on the level of
completion. Red team activities were scored based on both
2. COLLEGIATE CYBER DEFENSE
keeping them out, and on reactions to penetrations. The scoring
COMPETITION engine kept a running total of how much time each mandated
The genesis of the idea to conduct a collegiate cyber defense system was operational. During the second and third day, service
competition was rooted in two events. First is the annual cyber level agreements were used in conjunction with the scoring
defense exercise (CDX) conducted by the United States Military engine. Judges were deployed to each team to assist in the
Service Academies. [1] Second was the NSF sponsored workshop monitoring of the event and to handle questions and issues.
on developing a national cyber defense exercise. [2] After the
workshop, two faculty members of The University of Texas at
San Antonio initiated actions to field a regional competition. 3. RESULTS OF THE COMPETITION
With the assistance of faculty members from The University of The University of Texas at San Antonio hosted the
Texas at Austin and Texas A&M University the regional competition on April 15-17, 2005. Teams from five schools
collegiate cyber defense exercise was designed. Examining attended the event, representing the University of North Texas,
previous exercise based competitions [3-5], the operational Delmar College, Texas A&M University, The University of
business environment was chosen to provide a realistic basis for Texas at Austin and The University of Texas at San Antonio
the event. The use of an operational environment was purposely (UTSA). The participants were two-year college students from
chosen, as that is they type of environment the majority of Delmar College and a mix of undergraduate and graduate students
students will later be involved with in some capacity. from the other institutions. The only real requirement was that
their institution recognized the student competitors as full-time
The competition was designed to be defensive only from the students. The student curriculums were a mix of Computer
aspect of the student led teams. Each team was given identical Science and Information Systems. The competition was hosted
hardware and software, preconfigured into a working business by the Center for Infrastructure Assurance and Security at UTSA
environment. The systems included web site, e-commerce (CIAS) by a team completely separate from the UTSA competing
activity, email, file servers, database servers and various business team. The red team was composed of members from red teams in
functionalities such as FTP, and user account maintenance. The industry and government as well as members of the CIAS. White
systems were built to simulate a working business environment team members (judges) came from all of the participating schools
into which the team was hired to replace an existing IT member. and were separate from the competing teams and their faculty
This was a small business environment, one with a small, couple sponsors.
person IT staff, and the team was acting in lieu of this small staff.
[6] At the beginning of the competition, each team was given
identical equipment, in fully functioning form, but with known
The competition involved several taskings for each team. First security holes. Each team was free to address the security issues
was the issue of understanding and securing the existing systems. and equipment as they saw fit, the requirement being to keep the
Each box in the system had to be examined and brought up to an mandated services up and running. Once the red team began
appropriate patch level to provide desired functionality and operation, it was only a matter of time until they had established
security. An identical mixture of Microsoft Windows and Linux root level penetrations against all of the teams. As the teams
based boxes was deployed to simulate a mixed operating system learned of the penetrations they all were eventually successful in
environment. After a quiet period designed to let each team get securing their systems and keeping the external hackers out, while
their system under control, a red team was used to conduct maintaining the majority of the required services. Time was

17
compressed across the three days, with numerous injects 5. CONCLUSION
occurring in sequences that would normally occur over months. Developing the information security professionals of tomorrow is
For the majority of the injects, adequate time was allocated and not simple work. There is a myriad of technical and
all teams were treated identically, same injects, same time, same implementation information that has to be mastered. Multiple
scoring criteria. As many injects were part of long running disciplines are needed working together as a team to solve the
sequences, failures in earlier injects that were never corrected by business related information security tasks of a modern e-business
a team did come back to haunt them later. Each day a list of the environment, with a mix of technical and non-technical issues.
number one and number two team was posted before the Finding ways to educate and motivate students to pursue this
following day began. Points were cumulative and in the end, the demanding set of requirements is challenging. Currently most
Team from Texas A&M University finished in first place. curriculums are broken into technical and non-technical tracks
The results of the competition were much further reaching than with little overlap or interfacing between them. This competition
just crowning of the first winner. One school formed a student was designed to breakdown that academic separation and simulate
chapter of the ISSA (Information Systems Security Association) the environment the students will find themselves in after
in an effort to improve their computer security related skills and graduation. The inclusion of industry representation, both from
to connect to industry activity and leadership. Each school went the red team side and through team sponsorship helped increase
away with a critical self assessment of their strengths and awareness among the students of the multi-disciplinary and team
weaknesses and a desire to improve their performance. Exit related challenges that lie ahead of them in their future work
surveys showed that the event was considered fair, realistic and environments. Our objective as the implementers of this
valuable to students and sponsoring faculty members. This was competition was to build a better, more realistic learning
an important finding as the objective was to provide a fair and environment for students to take an active role in their education.
realistic test-bed environment where the teams could evaluate and Based on our success at this first competition, we felt we met our
test their skills in a competitive environment, not unlike a modern initial objectives. We felt we came a long way in this inaugural
small business environment. One of the take-away items endeavor and plan to take this event to a national level scale in the
provided to each team was a tcpdump of all packets for all teams next year.
over the course of the competition, so they could go back and
analyze specific events, activities and responses. 6. REFERENCES
[1] Ragsdale, D., Welch, D., and Dodge, R. Information
4. BENEFITS OF THE COMPETITION Assurance the West Point Way, IEEE Security and Privacy,
There are a number of benefits in providing a competition vol. 1, no. 5, Sept/Oct 2003, pp. 64-67.
associated with cyber defense. Computer security is a very [2] Hoffman, L. J. and Ragsdale, D. Exploring a National Cyber
current issue in the eyes of many corporations and government Security Exercise for Colleges and Universities, Report No.
agencies and jobs exist in this career field. Practical experience is CSPRI-2004-08 The George Washington University Cyber
always an important element in anyone’s education and this event Security and Policy Research Institute Report No. ITOC-TR-
was built with that in mind. Today’s business environment is a 04001 United States Military Academy Information
team based endeavor, and this competition was designed to Technology and Operations Center August 24, 2004
require a team based approach. Using student teams to achieve
[3] Schepens, W. J., Ragsdale, D. J. and Surdu, J. R. The Cyber
the results added the issues of team formation and interpersonal
Defense Exercise: An Evaluation of the Effectiveness of
dynamics to the event, something the judges all got a chance to
Information Assurance Education, The Journal of
see as the hours drew on and tempers got short. Ultimately all of
Information Security, Volume 1, Number 2. July, 2002.
the teams achieved the true desired goal, which was to learn what
they knew, what they didn’t and where they felt they needed to [4] Vigna, G. Teaching Hands-On Network Security: Testbeds
improve. They use of a competition over three days as a team and Live Exercises, Journal of Information Warfare, vol. 3,
based laboratory exercise worked well to produce an environment no. 2, pp. 8-25, 2003.
that tested each team’s knowledge and ability to employ that [5] Welch, D.W. Ragsdale, D.J. and Schepens, W.J. Training for
knowledge in an operational environment. They had to use the Information Assurance, IEEE Computer, March 2002.
knowledge they had garnered in classes and previous experience
to operate the systems, determine the weaknesses and determine [6] White, G.B. and D. Williams. The Collegiate Cyber Defense
when things went wrong. They were not told when they were Competition. in Proceedings of the 9th Colloquium for
penetrated, they had to find the clues and discover it, all the while Information Systems Security Education. June 2005. Atlanta,
answering executive requests in the form of injects. This opened GA.
many team members’ eyes to the less than perfect information
environment of an operational environment as opposed to an
academic exam where all the relevant facts are typically
enumerated.

18

S-ar putea să vă placă și