Description : Context: As per the GSMA Mobile economy, there were 4.8 billion unique mobile subscribers, 1.9 billion smart phones and 7.9 billion SIM connections globally in December 2016. The mobile traffic data is expected to grow globally by a CAGR of 47% from 2016 to 2020. With ubiquitous presence of mobile in daily life, the mobile security has become paramount. There are multiple mobile security tools and apps, each having differential features but it is difficult to find single authentic app for all mobile security operations. The mobile phone has become an integral and essential part of our life and is critically necessary for us to be able to carry out our communication and connectivity for the operation of our personal or work activities. Billions of applications have been made available to enable communication, news, data sharing, time management,gaming and much more. While these apps contribute to making life easy, and available at one’s fingertips, many of theseapps have been identified as malicious. While the app hosting system, do carry out a technology check to ensure that theapp does not pose a security threat to the user, the behavior of the app may yet be uncertain. There have beennumerous instances where users have been enticed to use malicious apps, and as a result, possibly losing sensitive information. In the face of such risks, it is necessary to test apps for malicious behavior and to flag them for exclusion or deletion from hosting platforms. The challenge is to develop an app which provides risk rating to apps based on the malicious behavior and security threats. In addition, theapp is required with at least 15 features related to cyber security that consume up to 2 MB memory space and can be stored in external memory device. The preferable feature includes data leakage, access to personal information, location sharing, mobile locking, internet consumption when not in use, SMS to another mobile in case of change of SIM, identifying genuine application, etc. The solution developed using open source software will be added advantage.
Global Cyber Challenge is an important part of Global Conference on Cyber Space (GCCS), 2017 being inaugurated by the Hon’ble Prime Minister of India. The Grand Finale will be organized at GCCS, New Delhi on 20th & 21st November 2017.
The Cyber Challenge is a collaborative effort of Ministry of Electronics and Information Technology (MeitY), National Critical Information Infrastructure Protection Center (NCIIPC), MyGov, Cyber Peace Foundation (CPF) and Policy Perspectives Foundation (PPF).
The contest is open to participants from India and abroad.
The Global Cyber Challenge comprises of two contests namely Capture the Flag Event and Peace-a-Thon. One can participate in either or both the contests.
Peace-a-thon is to build ideas and technological solutions based on identified themes and is based on different problem statements to which participants will render an effective solution in the form of a Proof-of-Concept/App.
Cyber security enthusiasts and experts from educational institutes and industries across the world have been called upon to participate in this challenge. Participation in the Peace-a-thon will comprise of teams who will select a problem statement, present their ideas to come up with research and technological solutions for the specific problem. The problem statements resonates with industry experts, security observers, government officials and business stakeholders.
Initially the entry to a Peace-a-Thon was two stage process. The first stage involved submission of concept note based on which individuals/teams (of upto 3) were invited to participate for a 34 hour marathon coding contest. This preliminary round of the contest has been conducted in 9 different coordinating institutions of India which are all premier institutions of the country namely, Indian Institute of Science Bangalore (IISc Bangalore), Indian Institute of Technology(s) – Bombay, Delhi, Kanpur, Madras, Hyderabad, Patna, Guwahati and Punjab Engineering College (PEC) Chandigarh.The solutions that emerged have been uploaded on the OpenForge.
In view of examination at various technical institutions, it has been decided to open this contest without requiring the submission of the concept note and participation in coding at the host institute. Now any individual/team (of upto 3 members) can register at https://innovate.mygov.in/cyber-challenge/ to submit their code along with their brief presentation / description as to how code works. This can be done in a span of 36 hours till 08:00 hrs on November 16, 2017
As stated above w.e.f November 12, 2017 1800 hrs it has been decided to have open participation without any requirement of host institutions.
All the interested individuals and teams are also advised to complete their registrations https://gccs2017.in/preregistration as a ‘Hackathon Contestant’ so that travel and related arrangements for stay in New Delhi can be made conveniently for teams qualifying for the Grand Finale at New Delhi. The Grand finale will be held on Nov 20-21 in New Delhi as part of Global Conference on Cyber Space 2017.
Top shortlisted teams from India and abroad will compete in the grand finale which will be hosted in Room No: 3A, Marriott, Aerocity New Delhi on 20-21st November, 2017. Jury will select the winners based on a pre-decided evaluation framework.
Winners in Grand finale will be awarded by Hon’ble Prime Minister of India during inaugural on November 23, 2017.
Last date for the submission is 08:30 HRS IST November 16, 2017 and based on the submission jury will declare result by November 16, 2017 midnight. Selected teams/ participants will be invited for the Grand Finale on November 20, 2017 – November 21, 2017 at New Delhi.
Closing Date: November 16, 2017 08:30 hrs IST
Result Declaration: November 16, 2017 Midnight
Grand Finale: November 20, 2017 – November 21, 2017
NOTE: Travel expenses will be paid ONLY for Grand finale finalists
Key Deliverables:Product (App/Project) and 1 Presentation (Max 15 slides).
Please read these Terms and Conditions carefully as they apply for all the phases.