GLOBAL CYBER CHALLENGE 2017

Global Cyber Challenge – Shortlisted Entries for Grand Finale

Global Cyber Challenge is an important part of Global Conference on Cyber Space (GCCS), 2017 being inaugurated by the Hon’ble Prime Minister of India and being attended by nearly 120 countries. The Grand Finale will be organized at GCCS 2017, New Delhi on 20 & 21 November 2017. Global Cyber Challenge comprises of two contests namely Capture the Flag Event and Peace-a-thon. The contest is open to participants from India and abroad. The participation can take place in either or both the contests.

Capture the Flag Contest

A competition on finding the system vulnerabilities e.g. Web Application Security, Network Security and Operational Technology (ICS/ SCADA).

Peace-a-thon Contest

A competition on software development on 14 global problem statements. Date and time has now been extended. A team can submit solutions for all 14 Problem Statements, don’t stop at only one, submit solutions for other problem-statements by November 16, 2017 by 08:30 HRS IST.

Peace-a-thon

Are you a Winner of an International Hackathon Contest in last 3 years

If you are one of the top three in any of the International Hackathons during last 3 years, you can directly participate in this Challenge. Share your profile and brief details of the winning solution along with supporting documents (maximum thr .....

Digital Awareness

The last couple of years have seen most of the critical infrastructures such as banking, energy, telecommunication, defence etc. has seen implementation of information and ICT tools for its effective and efficient use across the globe. But these .....

Mobile Security

Context: As per the GSMA Mobile economy, there were 4.8 billion unique mobile subscribers, 1.9 billion smart phones and 7.9 billion SIM connections globally in December 2016. The mobile traffic data is expected to grow globally by a CAGR of 47% .....

Integrated Recourse for Digital Fraud Victims

Technology has played an important role in transforming the lives by providing digital authentication, facilitating digital payments and extending the service to citizens through Digital means. Banking, communication, government services, ecomme .....

Security of Women Online

One of the biggest issues women face online is trolling. Can a system be developed where this can be controlled as well as there is a data intelligence to collect information about trollers and report them accordingly. The problem isto identi .....

Fake News

Fake news also referred to hoax news occupies large sphere of cyber space today world-wide.Cyber technology’s wide reach and fast spread contributes to its menace. Publicity through such fake news on cyber spacetoday has been adopted by States .....

Honeypots

The internet houses millions of bots and humans waiting attack open systems and it is important to enable proactive protection controls to safeguard our systems, networks and data assets. A honeypot can help to identify and observe attack techni .....

Driving Innovation to Monitor Online Sexual Abuse Against Children

“Across the world the production and distribution of images and video depicting the sexual abuse of children has reached a level that is exceeding the capabilities of law enforcement to investigate and prosecute. The projected growth in mobile .....

Technology as a Resolve to Cyber Risks to Child

Children need to acquire digital intelligence to use technology appropriately and responsibly. Digital intelligence is generally understood as having the necessary knowledge, skills and ability to adapt one’s emotions and behaviour to deal wit .....

Customer Empowerment for Digital Banking Security

Lack of awareness and redressal mechanism for digital payments. In spite of rigorous campaign on cyber security awareness though print media/ digital & social media, trainings / workshops being undertaken by banks and financial institu .....

Security of CII and Digital Payments

India is leading towards digital economy and critical Infrastructures are more dependent onInternet mostly dominated by devices, standards and implementations developed and manufactured by other countries.We need to work on varied areas of impor .....

Security of Internet of Things

Internet of Things (IoT) is considered to be the next industrial revolution and often referred to as Industry 4.0. Many applications are getting developed in IoT by interconnecting smart sensors, smart actuators with cloud computing platform for .....

Mitigating Public Sector Cyber Cascades

Stuxnet and recent cyber-attacks on Ukrainian power grid has explored vulnerability of critical infrastructures like power network, water network, oil & gas network. With such borderless-wars becoming more lucrative and nation-states getting inv .....

Protection of Navigation Technology Infrastructure

Global positioning system (GPS) or more generically called Global global navigation satellite system (GNSS) is extensively used for navigation of aeroplanes, surface vehicles (road as well as water) by providing ephemeris data. They are also bec .....