Posted September 3, 2010 Atlanta, GA
GTISC, GT ACM, and GTRI host day-long hacking competition for Georgia Tech’s brightest
The Georgia Tech Information Security Center (GTISC), the Georgia Tech Association for Computing Machinery (GT ACM) and Georgia Tech Research Institute’s (GTRI) Cyber Technology Group host the inaugural cyber security competition, Hungry, Hungry Hackers (aka H3).
The “Hungriest Hacker at Georgia Tech” will receive $750 cash and an opportunity to interview for a position at GTRI. Organizers also plan to provide runners-up with some geeky gift cards and possible interview slots.
Open to all current Georgia Tech students, the competition will be held at the GTRI Conference Center October 23, from 10 a.m. to midnight. Registration is available on the event website, www.hungryhungryhackers.org. Students are encouraged to register early. Morning-of registrants will be assigned available space on a first-come, first-served basis.
“A systematic vulnerability assessment is an important way to discover weaknesses that must be addressed to increase the robustness of systems against such attacks,” said GTISC Director Mustaque Ahamad. “This competition will be a great opportunity for our students to experience how to not only analyze IT systems for vulnerabilities, but also experience how to defend them against attacks that may exploit the discovered vulnerabilities.”
In keeping with the H3 title, food and drinks will be provided throughout the event. Phase I of the competition is scheduled to begin at 10 a.m. After lunch, the top performers will advance to Phase II, scheduled to end around 10 p.m. Dinner and snacks will be served during this time. The winner and runners up will be announced shortly after.
“In cyber security research, the key to developing effective defenses is in understanding the threat,” said Electronic Systems Lab Chief Engineer Fred Wright. “This event will provide an opportunity for students to apply their knowledge of computers and networks and to build cyberspace exploitation techniques. In this way, they will gain valuable insights into needed security technologies and strategies.”