NCAC

National Cyber Analyst Challenge

  • Home
  • NCAC
    • News
    • Challenge
    • Conference
    • Venue and Hotel
    • Student and faculty benefits
    • Student focused
    • FAQ
  • About
    • Goals
    • NCAC Committee
    • Sponsorship Opportunities
    • Contact

Phase I Q&A

August 20, 2015 By Munir Mandviwalla

Please submit questions and comments about Phase I of the National Cyber Analyst Challenge as a response to this post. We are looking forward to your Phase I submissions and the NCAC team is ready to help.

Share:

  • Click to email this to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • More
  • Click to share on Reddit (Opens in new window)

Filed Under: NCACDiscussion

Comments

  1. Keith M. Hoodlet says

    August 20, 2015 at 10:05 am

    Hi Munir,

    How much detail are you folks expecting within the PowerPoint slides?

    Cheers,
    Keith

  2. Larry Brandolph says

    August 20, 2015 at 11:34 am

    Keith,

    It’s going to have to be detailed. The overall exercise is asking for a report to the CEO for a cyber security event/incident. You have to show what you found in all the data and that will be specific. Show how you found it and provide recommendations.

    Thanks
    –Larry

    • Alex Lynch says

      August 28, 2015 at 7:05 pm

      Larry,

      Have you considered that ten slides (of which ~four are reserved for information not directly related to the attack) is simply not enough to provide a detailed deliverable? I would assume that for a cyber security “incident” such as this, a CEO may expect more information. In my experience, a powerpoint slide deck is designed to be a visual aid for an actual presentation. I do not believe that a ten slide powerpoint is an appropriate medium for breaking down an attack like this. This could easily be a ten page report.

      Any input on this? Advice for creating an appropriate deliverable?

      Thanks,

      Alex

  3. Keith M. Hoodlet says

    August 22, 2015 at 3:18 pm

    Hi Folks,

    Do you have a recommended Open Source tool for performing malware analysis? Preferably something that is able to run on OS X.

    Thanks!

    Cheers,
    Keith

  4. Ravi Patnayakuni says

    September 2, 2015 at 11:02 am

    Where can we find information on how to submit the presentation for this phase?

  5. Keith M. Hoodlet says

    September 9, 2015 at 7:42 am

    Hello again!

    Our team is curious to know if there is a cut-off between each phase of the challenge (from Phase I to Phase II, and Phase II to Phase III)? If so, how many teams are intended to pass into each successive phase?

    For example, Phase I included 11 teams, Phase II will include “X” teams, and Phase III will include “Y” teams – where “X” and “Y” are the number of teams intended to participate in each phase.

    Many thanks!

    Cheers,
    Keith

NEWS AND DISCUSSION

  • NCAC 2018 Pictures April 18, 2018
  • Finalists selected for the 2018 National Cyber Analyst Challenge and Conference March 9, 2018
  • NCAC 2016 Pictures November 14, 2016
  • Carnegie Mellon Wins 2016 National Cyber Analyst Challenge November 14, 2016
  • 2016 National Cyber Analyst Challenge announces 10 university finalists October 5, 2016
  • NCAC 2016 March 25, 2016
  • NCAC Finals November 20, 2015
  • Iowa State University wins National Cyber Analyst Challenge November 17, 2015
  • How is the Cyber Analyst Challenge going? August 25, 2015
  • Phase I Q&A August 20, 2015

ABOUT

  • NCAC
  • IBIT

PARTICIPATE

  • Phases
  • Student focused
  • Student and faculty benefits
  • Conference

RESOURCES

  • FAQ
  • Contact us

Copyright © 2021 · National Cyber Analyst Challenge · Institute for Business and Information Technology · Temple University

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.