top of page
Archery.jpg

CYBER COMPETITION 

Optional  Competition  
Registration Deadline February 14, 2025.

AIHEC Cyber Competition Objectives: 

AIHEC Cyber Competition introduces and encourages students to explore computer science and cybersecurity education disciplines and careers. Students will explore cybersecurity concepts, attack vectors, coding principles, ethics, and more through a series of cybersecurity challenges. This competition will include but is not limited to Capture the Flag (CTF), Jeopardy style, and other educational toolsets as determined by the host committee and lead coordinator. 

This form shall be submitted by February 14, 2025.

Contact:

TBD

Official AIHEC Cybersecurity Competition Registration Form 

This form shall be submitted by February 14, 2024.

Cybersecurity Judging Form 

Click to download the Judging Form.

Cyber Rules

AIHEC Cybersecurity Competition Rules:

  • Teams shall have at least one (1) member, but no more than five (5) members. A Tribal College may enter more than one team. A team must represent no more than one Tribal College or University. 

  • Every team must have an adult who is employed by the team’s academic institution, following the same exceptions outlined in the “Team/Institution relationship” section, who will act as the institution’s official liaison. They may solicit assistance or volunteers from their community as needed, but only the official school liaison is recognized by AIHEC Cyber Competition for the purposes of communication, discipline, and transmission of student data. 

  • Teams will be supplied with:

    • Logins to the game engine for all eligible participants 

    • Network access sufficient to complete the challenges and engage with the game engine. 

    • A scoreboard identifying current team scores and rankings. 

    • A table of approximately 24”x96” which must contain all team equipment within the vertical area bounded by the surface of the table, up to a height of no more than 30” above the surface of the table. 

    • One power strip with at least five grounded 110v plugins. laptops containing tools needed for the competition. 

  • Participants will need to supply all computing equipment including laptops, monitors, keyboards, mice, or other input devices, and associated cables they wish to have for the competition. 

    • Note: The team is responsible for ensuring their computing resources can connect to/ function within the AIHEC Cyber Competition event network. 

  • Teams will gather information and attempt to breach a live system hosted at the competition. 

  • Points will be granted based on the following categories:

    • Reconnaissance 

    • Scanning 

    • Gaining Access 

    • Maintaining Access 

    • Clearing Tracks 

    • Data Exfiltration 

  • Teams must be able to demonstrate to judges how each category was accomplished. 

  • Teams are not allowed to sabotage each other during this competition. 

  • Three (3) independent judges will evaluate each teams’ efforts. 

Cyber Guidelines

AIHEC Cybersecurity Competition Guidelines & Procedures:

  • The Cybersecurity coordinator is chosen by the host committee. The Cybersecurity coordinator will reserve an appropriately sized Cybersecurity lab location. If an audience larger than the three (3) judges will be permitted to attend, then a large conference room will be required; if no audience will be permitted then the coordinator can reserve a classroom-sized room. 

  • The Cybersecurity coordinator will provide periodic updates to the host committee concerning registration numbers. 

  • The Cybersecurity coordinator may use the proven rules from above and adjust as the need arises to adapt to the specific host location, participant-entry size, budget limitations, etc. 

  • The Cybersecurity coordinator needs to recruit ~ three (3) people (faculty or staff) to assist with judging. 

  • All equipment must be contained within the area defined by the table boundaries. 

  • No material may encroach within the walkways and common areas of the competition. 

  • No extension cords, power strips, adapters, generators, batteries, or similar items may be used to extend or expand the provided power. 

  • No high amperage items such as refrigerators, microwave ovens, or the like may be used 

  • Suggested Checklist of Materials to bring to the conference: master spreadsheet of the registered students, judging scorecards, projector screen, laptops, server, and projector. 

  • Have a firm registration deadline. 

  • If desired, a coordinator may host an orientation and training day on day one of the conference and move the entire competition to the second day of the conference. 

  • Enter registered students into a master spreadsheet by college/team to ease the checking in process at the conference. 

  • The coordinator arrives at the conference at least one (1) day before the competition to set up the room reserved for the Cybersecurity lab with at least one (1) judges’ table and to confirm the screen, projector, and equipment work properly. 

  • The Cybersecurity coordinator is responsible for reporting the winning team to the awards’ banquet coordinator. 

bottom of page