Unit 1 - Introduction To CyberPatriot and Cybersecurity 2021
Unit 1 - Introduction To CyberPatriot and Cybersecurity 2021
UNIT 1
Introduction to CyberPatriot and Cybersecurity
UNIT 1 - SECTION 1
The National Youth Cyber Defense Competition
• The CyberPatriot Competition System (CCS) automatically transmits your team’s progress
in the competition image (VM) to the CyberPatriot scoring server
• Use the CyberPatriot Scoring Report to check your score and your connection status
• A chime will play when you gain points and a buzzer will sound when you lose points
• Do not open, modify, or delete anything in the “CyberPatriot” folder of any image
– Doing so could cause you to lose your progress in the image
6 7 8 9 10 11 12
ROUND
27 28 29 30 1 2 3
Round Results
Email sent
• Top teams earn all-expenses-paid trips to the District of Columbia metropolitan area
• More than just competing in front of a computer
– National Finals includes the Network Security Master Challenge, Cisco Networking
Challenge, an AT&T Component and other additional components
• Opportunity to win scholarships, network with industry leaders, and enjoy media recognition
UNIT 1 - SECTION 2
Introduction to Cybersecurity
Source: www.UMUC.edu
• Banks
• Social Media
• Schools
• Airlines and Railroads
• Stores
Source: US Department of Homeland Security
• Police and fire departments
7,200+ critical American industrial control systems are
• Military and government systems linked to the Internet, and therefore vulnerable to attack
• Doctors’ offices
Source: https://www.cisa.gov/critical-infrastructure-sectors 19
© Air Force Association
Why is Cybersecurity Important?
• 2006: 26.5 million veterans’ personal information is compromised after the theft of a Veteran Affairs
employee’s laptop. The employee thought it was safe to bring home VA records on an unsecure drive.
• 2009: Coca-Cola executive clicks link in spoof email allowing attackers to steal confidential files on
$2.4 billion business deal with Chinese juice company.
• 2011: DHS plants USB drives and CDs outside of government and government contractor buildings.
The majority are picked up by employees and inserted directly into their organization’s computers.
• 2021: One of the United States Critical Infrastructures was compromised, the Colonial Pipeline
breach. The pipeline was used to carry gasoline and jet fuel to the Southeastern U.S. Colonial
Pipeline suffered from a ransomware attack that compromised computers and equipment that
managed the pipeline.
People make mistakes, as noted in the 2011 incident. Cyber education is the best way to combat such incidents.
Cybersecurity is often about protecting organizations and individuals from themselves.
Sources: CSO magazine, www.csoonline.com, Bloomberg News, www.bloomberg.com, GCN Magazine, www.gcn.com, NY
Times, nytimes.com
Case: Backoff Malware Attacks targeted cash registers and payment systems sold
by seven different companies
• Impacted major retail companies like Target, Dairy Queen, and UPS
Hackers use brute force Hackers are able to download Department of Homeland
password cracking to credit card information when Security announces that the
remotely access and infect shoppers swipe their cards at payment systems of more the
the networks of major cash cash registers purchased 1,000 American stores may
register system providers from the infected companies be infected
These training materials are only intended to provide basic training for the competition.
Coaches and Mentors can be great resources, but the below links may help as well: