0% found this document useful (0 votes)
50 views

Unit One - Introduction To CyberPatriot and Cyber Security

Uploaded by

Jonathan Lillie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Unit One - Introduction To CyberPatriot and Cyber Security

Uploaded by

Jonathan Lillie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

AIR FORCE ASSOCIATION’S

CYBERPATRIOT
NATIONAL YOUTH CYBER EDUCATION PROGRAM

UNIT ONE
Introduction to CyberPatriot and
Cybersecurity

www.uscyberpatriot.org
AIR FORCE ASSOCIATION’S

CYBERPATRIOT
NATIONAL YOUTH CYBER EDUCATION PROGRAM

SECTION ONE
Introduction to CyberPatriot

www.uscyberpatriot.org

1
What Is CyberPatriot?

• The National Youth Cyber


Education Program
‐ AFA CyberCamps
‐ Elementary School Initiative
‐ National Youth Cyber Defense
Competition
• Not hacker training
‐ Offensive behavior is not
tolerated
• Fun way to learn skills that
will be useful in the future
‐ Technical skills
‐ Teamwork
‐ Critical thinking

© Air Force Association 2


The National Youth Cyber Defense Competition

• Teams consist of 2 to 6 Competitors, a Coach, an optional


Technical Mentor, and an optional Team Assistant
• Teams compete in online qualifying rounds
• Points are earned by identifying and correcting weaknesses
in a simulated computer system

© Air Force Association 3


The National Finals Competition

• Top teams earn all-expenses-paid trips to Washington D.C.


• More than just competing in front of a computer: Digital Crime Scene
Challenge, Cisco Networking Challenge, and other additional components
• Opportunity to win scholarships, network with industry leaders, and enjoy
media recognition

© Air Force Association 4


What is CyberPatriot?

Click here to play the CyberPatriot recruitment video:


http://www.youtube.com/watch?v=Q_TbXri0XQ0

© Air Force Association 5


How CyberPatriot Works: Team Structure

• Coaches act as administrative lead of the team


‐ Supervise students
‐ Act as main point of contact for CyberPatriot Program Office
‐ Ensure integrity of the competition
‐ If technically savvy, train teams for competition
• Technical Mentors volunteer to help Coaches train teams
‐ Use industry expertise to teach students about cybersecurity
‐ Guest lecture or work with team(s) on a regular basis
• Team Assistants volunteer to provide non-technical support and
encouragement to the team
• Competitors work together to find and fix vulnerabilities in a
simulated computer system
Click here for more information:
http://www.uscyberpatriot.org/competition/how-it-works/team-organization
© Air Force Association 6
How CyberPatriot Works: Scoring

• Earn points by fixing vulnerabilities in a virtual machine (VM)*


‐ Virtual machines (aka “images”) are software programs that simulate
computer systems
• Lose points for making the system less secure
• Harden your system and defend against outside attacks by
starting with hints and the scenario in the ReadMe file on the
desktop
• Not all vulnerabilities are scored or hinted at in the ReadMe
‐ You might do something that improves the system, but does not earn
your team points
‐ The goal of the competition is to harden the system as completely as
possible in the provided time

*More information on VMs is available in Unit Three of these training materials

© Air Force Association 7


How CyberPatriot Works: CCS

• The CyberPatriot Competition System (CCS) automatically transmits your team’s


progress in the competition image (VM) to the CyberPatriot scoring server
• Use the CyberPatriot Scoring Report to check your score and your connection status
and score
• A chime will play when you gain points and a buzzer will sound when you lose points
• Do not open, modify, or delete anything in the “CyberPatriot” folder of any image
‐ Doing so could cause you to lose your progress in the image

© Air Force Association 8


How CyberPatriot Works: Competition Deployment

SAMPLE SCHEDULE:
Sunday Monday Tuesday Wednesday Thursday Friday Saturday
1 2 3 4 5
Competition Round
Preparation Email sent
6 7 8 9 10 11 12

13 14 15 16 17 18 19
Image Download and StartEx Email sent
Instructions Email sent COMPETITION
20 21 22 23 24 25 26
Round Results
ROUND Email sent

27 28 29 30 1 2 3

• Competition emails are only sent to registered Coaches


• Preparation Email contains information on types of images in the round and competition updates
• Image Download and Instructions email includes download links and thorough instructions for the round
• StartEx contains password to unzip images and log into user account
• Teams choose a six-consecutive-hour window during the competition weekend to compete. Six-hours
must fall between support times posted by CPOC.

© Air Force Association 9


CyberPatriot VIII Timeline

Click here for more information:


http://www.uscyberpatriot.org/competition/competition-timeline
© Air Force Association 10
Important Resources

• The CyberPatriot VII Rules Book


‐ Click here: http://www.uscyberpatriot.org/competition/rules-book

• Training Modules available on your team’s Coach’s Dashboard


• Additional Windows resources
‐ Click here: http://www.uscyberpatriot.org/competition/training-materials/windows

• Additional Linux resources


‐ Click here: http://www.uscyberpatriot.org/competition/training-materials/linux

• Additional Cisco resources


‐ Click here: http://www.uscyberpatriot.org/competition/training-materials/cisco

• Ubuntu practice images and Windows scoring engine provided by Texas


A&M Corpus Christi
‐ Click here: http://www.uscyberpatriot.org/competition/training-materials/practice-images

© Air Force Association 11


AIR FORCE ASSOCIATION’S

CYBERPATRIOT
NATIONAL YOUTH CYBER EDUCATION PROGRAM

SECTION TWO
Introduction to Cybersecurity

www.uscyberpatriot.org

12
What is Cybersecurity?

All the tools we use and actions we


take to keep computers, networks,
and information safe and available
for those who need it, and
unavailable for those who should
not have it.

That means protecting hardware and data from everything


from hacktivists to earthquakes

Source: www.UMUC.edu

© Air Force Association 13


Why is Cybersecurity Important?

Things that rely on computers:


• Banks
• Factories
• Schools
• Airlines and Railroads
• Stores
Source: US Department of Homeland Security
• Police and fire departments
7,200+ critical American industrial control systems
• Military and government systems are linked to the Internet, and therefore vulnerable
to attack
• Doctors’ offices

Answer: Cybersecurity isn’t just about protecting computers.


Almost everything relies on or could be affected by a computer.

© Air Force Association 14


Why is Cybersecurity Important?

• 2006: 26.5 million veterans’ personal information is compromised


after the theft of a Veteran Affairs employee’s laptop. The
employee thought it was safe to bring home VA records on an
unsecure drive.

• 2009: Coca-Cola executive clicks link in spoof email allowing


attackers to steal confidential files on $2.4 billion business deal
with Chinese juice company.

• 2011: DHS plants USB drives and CDs outside of government and
government contractor buildings. The majority are picked up by
employees and inserted directly into their organization’s
computers.
Answer: People make mistakes.
Cybersecurity is often about protecting organizations and individuals from themselves.
Sources: CSO magazine, www.csoonline.com, Bloomberg News, www.bloomberg.com, GCN Magazine, www.gcn.com

© Air Force Association 15


Why is Cybersecurity Important?

Case: RSA Security Services


• RSA: security firm that sells SecurID®
Source: blogs.rsa.com

• Lockheed Martin: a $46 billion defense contractor that


uses SecurID®

Attackers infiltrate
Criminals capture Criminals launch
RSA’s network
the algorithms used attack on Luckily, Lockheed’s
through malware
to generate Lockheed’s security team is able
deployed in spoof
Lockheed Martin’s networks using the to thwart the
emails sent to the
random SecurID® algorithms they stole attacks.
company’s
passwords from RSA
employees

Answer: We’re all connected


A weakness in one system can be exploited by attackers to target another system.
Source: InformationWeek, http://www.informationweek.com/security/risk-management/lockheed-martin-suffers-massive-cyberattack/d/d-id/1098013

© Air Force Association 16


Who’s Hiring?

• Nearly every organization needs cybersecurity professionals


• 300,000+ new information technology jobs were created in 2013
• Average salary for computer jobs in 2013 was ~$89,000, while
cybersecurity-specific jobs brought an average salary of $100,000+

Source: Computer World, http://www.computerworld.com/s/article/9237394/Demand_for_IT_security_experts_outstrips_supply?pageNumber=2

© Air Force Association 17


Cyber Career Opportunities

• Cyber workers
‐ Employees that maintain day-to-day
security and strengthen their
organization’s protection
• Cyber defenders
‐ Government or contractor employees
that protect American networks and
information from attacks
• Cyber sleuths
‐ Professionals that watch for espionage
and insider threats and perform digital
forensics for law enforcement
• Cyber leaders
‐ Industry veterans that decide company
security policies, train new employees,
and conduct R&D

© Air Force Association 18

You might also like