Capture The Flag - Computer Security

Computer Security

In computer security, Capture the Flag (CTF) is a computer security wargame. Each team is given a machine (or small network) to defend on an isolated network. Teams are scored on both their success in defending their assigned machine and on their success in attacking other team's machines. Depending on the nature of the particular CTF game, teams may either be attempting to take an opponent's flag from their machine or teams may be attempting to plant their own flag on their opponent's machine. CTF was popularized by the hacker conference DEF CON. Currently, the DEF CON CTF competitions are run by Diutinus Defense Technologies Corp.

Contests are generally executed in a hotel ballroom or meeting room. A typical contest will have an area for each team playing, arranged around a central area reserved for the contest administrators. Projectors will display a scoreboard on the wall, which will be intermittently interrupted by witty or humorous video clips. Music is usually provided by a PA system during the contest.

CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world. Reverse-engineering, network sniffing, protocol analysis, system administration, programming, and cryptanalysis are all skills which have been required by prior CTF contests at DEF CON.

CTF games often touch on many other aspects of information security, such as physical security, regulatory compliance, and software licensing. Successful teams generally have extensive industry experience and are capable of addressing these issues, even when raised by surprise in the middle of the contest.

An international, academic CTF was created by University of California, Santa Barbara in 2004. There have been eight iCTF exercises since then, one per year. The 2011 edition occurred on December 4, 2011 and involved 89 teams from across the world, making it the largest live security competition ever performed.

Read more about this topic:  Capture The Flag

Famous quotes containing the words computer and/or security:

    The analogy between the mind and a computer fails for many reasons. The brain is constructed by principles that assure diversity and degeneracy. Unlike a computer, it has no replicative memory. It is historical and value driven. It forms categories by internal criteria and by constraints acting at many scales, not by means of a syntactically constructed program. The world with which the brain interacts is not unequivocally made up of classical categories.
    Gerald M. Edelman (b. 1928)

    There is something that Governments care for far more than human life, and that is the security of property, and so it is through property that we shall strike the enemy.... Be militant each in your own way.... I incite this meeting to rebellion.
    Emmeline Pankhurst (1858–1928)