X

News & Events

News Events
...

Events

Notice on the Organization of the Ninth "C1CTF Digital Qi An Cup" Cybersecurity Competition

Release time:2024-03-27 clicks:

To widely promote cybersecurity knowledge, enhance students' awareness and skills in network security protection, and stimulate their enthusiasm for learning about network and information security, we are organizing the ninth "C1CTF" cybersecurity competition. The relevant matters are notified as follows:

I. Background of the Event

CTF (Capture The Flag), commonly translated as Capture the Flag competition in Chinese, refers to a type of technical contest among cybersecurity professionals. Its purpose is to popularize knowledge of network information security and guide information security enthusiasts into the field. CTF originated from the DEFCON Global Hacker Conference in 1996, replacing the previous method of hackers competing by launching actual attacks against each other. It has become a popular form of competition within the global cybersecurity community, with more than fifty international CTF events held worldwide in 2013. By hosting an intramural CTF competition, we aim to improve students' professional skills, cultivate high-quality skilled and applied talents that meet societal needs, enhance students' employability, and contribute to the training of high-quality information security confrontation professionals.

II. Event Organization

Hosted by: Undergraduate College Office of Innovation and Entrepreneurship Education

Organized by: School of Computer and Information Science

Co-organized by: C1Sec Cybersecurity Society

Technical Support by: Digital Qi An Technology Research Institute

III. Theme of the Event

"Cultivating Awareness of Cybersecurity, Unearthing Information Security Talents"

IV. Participants

All current students at our university

V. Competition Content

The competition content includes various knowledge points and techniques such as basic information security, network protocols, operating system security, cryptography and information encryption, firewall and intrusion detection, IP security, and Web security. It covers information discovery, reverse engineering, cryptography, Web vulnerabilities, binary overflow, forensics, SQL, scripting languages, assembly, script injection, deception and cross-site scripting, steganography in images, and other aspects of information security.

VI. Competition Date

March 30, 2024

VII. Registration Method

This competition adopts an online registration method. Please scan the QR code below for online registration:

For competition-related notices, see the QQ group.

VIII. Competition Format

Individual participation. Contestants may answer questions independently within the specified competition time.

IX. Prizes

The competition will award one first prize, two second prizes, three third prizes, and several excellence awards. The organizing committee will present certificates and prizes to the winners.

X. Notes

During the competition, exchanging answers or solution ideas is prohibited.

Attacking the competition platform during the event is not allowed. If discovered, participants will be disqualified.

The right to interpret this event belongs to the organizing committee. Any unaddressed issues will be announced separately!

TOP