The technical level of Juli Internet British Exhibition -The Fourth "Fifth Space" Cyber Security Competition opened

Author:Internet information Tianjin Time:2022.09.13

The National Cyber ​​Security Publicity Week in 2022 has been held from September 5th to September 11th, and the Tianjin series activities have also been launched simultaneously at the same time. This year's propaganda week is based on the theme of "network security as the people, and network security depends on the people", creating a strong atmosphere of building a network security defense line in the whole society.

As one of the important activities of Tianjin Cyber ​​Security Week, the fourth "Fifth Space" Cyber ​​Security Competition is in the hot registration, and the preliminary round will be held on September 19. Cultivate high -end talents in network security, forging to create an industry guardian army, cultivate a benign ecology of network security education, technology, and industrial integration and development, and provide strong network security support guarantee for the development of Tianjin's digital development ... In just three years, "Fifth Space for the Fifth Space "Cyber ​​Security Competition has become a characteristic event with outstanding domestic influence and has received widespread attention from society. What are the characteristics of this year's competition? What tests will players face? To this end, Zhang Jian, the chairman of the Tianjin Network Space Security Association and a professor at the School of Network Space Security, Nankai University.

For the first time in China

Without network security, there is no national security. The cultivation of network security talents is the cornerstone of forging "the heavy weapon of the country". This year, the 4th "Fifth Space" network security contest was led by the China Network Space Security Association, the Tianjin Municipal Party Committee Network Information Office, the Tianjin Federation of Trade Unions, the Tianjin Network Space Security Association, and the three -six -zero digital security technology group Co., Ltd. Based on the CTF match, the online threat hunting challenge was added. The content of the competition includes two parts: the CTF competition and the network threat hunting challenge. The CTF preliminary competition uses the problem of solving the problem. The main question types include the routine network security direction (Web, PWN, Reverse, MISC, Crypto, Mobile), covering "PK". Systems, artificial intelligence, data security and personal information protection, cloud security and other fields, examine the comprehensive practical ability of contestants from multiple dimensions. The finals are performed in two ways: problem -solving and security vulnerabilities. As the organizer of the competition, 360 Digital Security Group will provide professional visual presentation platforms and autonomous, safe and controllable competition environment based on the 360 ​​network offensive and defensive competition platform to ensure the successful and smooth progress of the CTF competition.

"With the rapid development of the network security industry, various types of CTF events have sprung up. In order to better innovate, increase the participation and visibility of the competition, tap more high -end network security talents, and the first online threat hunting challenges carried out for the first time. Relying on the online shooting range of the network, the game adopts the method of completing the module task online, and inspect the players' cognitive ability to threaten network security in different scenarios, and the degree of understanding of offensive and defensive confrontation. Communication and other multi -dimensional inspections of the comprehensive practical ability of the participating teams. "Zhang Jian said," Conventional CTF events are players to attack themselves. Attack, the defensive team of a security enterprise or manufacturer recognizes the attack and defense. In this way, it can not only find the vulnerabilities and defects in the network system, but also improve the network information from the network to the reality, from the competition to the society. Safety event emergency plans to solve the problem of social governance. "

2021 "Fifth Space" Cyber ​​Security Competition scene grand occasion

"Offensive and defensive" actual combat gathered talent

Peak confrontation, wise wins. The most attractive contestant is the generous bonus pool with a total amount of 800,000 yuan. According to reports, the CTF competition student group and the industry group will set up 1 first prize, 2 second prizes, 5 third prizes, and the online threat hunting challenge to set up 1 first prize, 2 second prizes, 4 In the third prize, 23 teams will be divided into huge bonuses together.

"Of course, such a heavyweight competition is not just as simple as winning the bonus." In Zhang Jian's view, this "Fifth Space" Network Security Competition relies on national networks such as Pengcheng Lab and 360 Digital Security Group The platform has constructed high -level competition conditions and autonomous, safe, and controllable competition environments. It also specially increases the network threat hunting challenge. This model is the first time in China. On the one hand, I hope to support information security professional practice through experimental platforms such as network space security comprehensive training platform, competitive platform, and network shooting field; on the other hand, I hope to integrate the existing enterprise ecosystem Training opportunities. "Among the registered crowds, there are many players with very outstanding personal technical capabilities. I hope that through the competition, more network security talents can be brought together, including high -end network security talents and some major artisans to further improve the evaluation system of Tianjin Internet letter talent titles. Later It will also establish the Tianjin Internet Information Talent Talent, which will be further excavated, cultivated, and used for network security talents, so as to better help Tianjin network security construction and high -quality development of economy and society. "

wx_fmt = png "data-nickname =" Internet information Tianjin "data-alias =" wangxintianjin "data-signature =" Transfer the positive energy of the fingertips, sing the sound of Tianjin "data-from =" 0 "data-is_biz_ban =" 0" /> Source: China Well -off

not

Review: Wang Shaoyun

Editor: Li Pei

Material arrangement: Chen Zhuo, Shi Jiaojiao

- END -

Two agricultural scientific research projects were selected as the research and development results of the top ten major strategic technology in Henan items

On August 28, the theme press conference of the Ten Years of China · Henan of the Henan Provincial Party Committee of the Communist Party of China was held in Zhengzhou. At the press conference, Lo

Chinese and foreign scientists have discovered rare "fog around the two -star" star system

The international team led by Professor Zhu Wei's Department of Astronomy of Tsing...