The 2022 National Cybersecurity Publicity Week will be held from September 5th to September 11th, and a series of activities in Tianjin have also been carried out simultaneously across the city during the same period. The theme of this publicity week is "Network Security for the People, Network Security Depends on the People" to create a strong atmosphere for the whole society to build a network security line of defense.
As one of the important activities of Tianjin Cyber Security Week, the registration for the 4th "Fifth Space" Cyber Security Competition is in full swing, and the preliminary competition will be held on September 19. Cultivate high-end talents in network security, forge a guard army of Xinchuang industry, cultivate a benign ecology of network security education, technology, and industry integration and development, and provide strong network security support for promoting the digital development of Tianjin... In just three years, "Fifth Space" "The network security competition has become a special competition of Xinchuang with prominent domestic influence, and has attracted widespread attention from the society. What's special about this year's competition? What challenges will the players face? To this end, China Xiaokang.com interviewed Zhang Jian, chairman of the Tianjin Cyberspace Security Association and professor at the School of Cyberspace Security at Nankai University.
Formal innovation for the first time in China
There is no national security without network security, and the training of network security talents is the cornerstone of forging "the most important weapon of the country". This year, the 4th "Fifth Space" Cybersecurity Competition, sponsored by the China Cyberspace Security Association, the Tianjin Municipal Party Committee Network Information Office, and the Tianjin Federation of Trade Unions, hosted by the Tianjin Cyberspace Security Association and 360 Digital Security Technology Group Co., Ltd. The Cyber Threat Hunting Challenge was added for the first time on the basis of the CTF competition. The content of the competition includes two parts: the CTF competition and the cyber threat hunting challenge. The CTF preliminary competition is conducted in the form of a problem-solving competition. The main types of questions include the general direction of network security (web, pwn, reverse, misc, crypto, mobile), covering "PK" System, artificial intelligence, data security and personal information protection, cloud security and other fields, examine the comprehensive practical ability of contestants from multiple dimensions. The finals will be conducted in two ways: problem-solving competition and security vulnerability mining. As the organizer of the competition, 360 Digital Security Group will provide a professional visual presentation platform and an independent, safe and controllable competition environment for the competition based on the 360 network attack and defense competition platform, so as to ensure the successful and smooth progress of the CTF competition.
"With the rapid development of the network security industry, various CTF competitions have sprung up. In order to better innovate the form, increase the participation and visibility of the competition, and tap more high-end network security talents, the first cyber threat hunting was carried out. The challenge relies on the network shooting range to complete the module tasks online, and examines the players' ability to recognize network security threats in different scenarios, as well as their understanding of offensive and defensive confrontation, from penetration testing knowledge, vulnerability principles, data analysis, report writing, report writing, Coordination and communication and other multi-dimensional inspection of the comprehensive practical ability of the participating teams.” Zhang Jian said, “Regular CTF competitions are all players attacking and defending themselves, this time we set a specific target online, and invited participating attacker teams to target the target. Implement an attack, and the defense team of the security company or manufacturer will identify and defend against the attack. In this way, not only can the loopholes and defects in the network system be found, but also the emergent network from the network to reality, from competition to society can be improved. Information security incident contingency plan, so as to solve the problem of social governance.”
The grand scene of the 2021 “Fifth Space” cybersecurity competition
The “offensive and defensive” actual combat gathers talents
The peak duel, the wise one wins. The most attractive thing about this competition is the generous prize pool with a total amount of up to 800,000 yuan. According to reports, there will be 1 first prize, 2 second prizes, 5 third prizes for the student group and practitioner group of the CTF competition, and 1 first prize, 2 second prizes, and 4 third prizes for the Cyber Threat Hunting Challenge. In the end, 23 teams will share the huge prize money together.
"Of course, winning such a heavyweight competition is not as simple as winning the prize money." In Zhang Jian's view, this "Fifth Space" cybersecurity competition relies on national level such as Pengcheng Lab and 360 Digital Security Group. The online platform has constructed a high-level competition condition and an autonomous, safe and controllable competition environment, and has also added a cyber threat hunting challenge, which is the first time in China. On the one hand, it hopes to support the professional practice training of information security through the comprehensive training platform of cyberspace security, competition platform, network shooting range and other experimental platforms;The ecosystem is integrated to provide more and better training opportunities for partner institutions. "Among the applicants for this time, there are some players with outstanding personal technical abilities. I hope that through the competition, more cybersecurity talents, including high-end cybersecurity talents and craftsmen from some big countries, will be gathered to further improve the evaluation system of Tianjin cybersecurity talents. It will also establish a Tianjin network information talent pool to further excavate, cultivate and use network security talents, so as to better help Tianjin's network security construction and high-quality economic and social development."
Support report/Tianjin Cyberspace Security Association
source : China Well-off Network