Results from a SCADA-Based Cyber Security Competition

ABSTRACT

On April 1 2011, Regis University hosted the 7th Computer and Network Vulnerability Assessment Simulation (CANVAS) competition with a turnout of 68 event competitors and at least two dozen faculty and spectators. The event was a major success. The competition sought primarily to introduce a Critical Infrastructure Protection (CIP) theme to a cyber competition to raise awareness of these types of attacks. This paper will discuss the goals and intricacies of developing the CANVAS cyber competition, including technical details, extensibility of CIP-focused cyber competitions, as well as the continued development and value of CIP simulation infrastructure.


AUTHORS

Regis University,
Denver CO, USA

Heath Novak is Senior Security Engineer for Trustwave. He holds an MS in information assurance and a BS in computer science, both from Regis University. He is an ISC2 Certified Information Systems Security Professional (CISSP) and certified in CompTIA Security+. His current professional interests are focused on security research, specifically in web application, cloud security, penetration testing, and business continuity and on developing cyber competition infrastructure (with experience developing CANVAS 2011, Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) in 2012 and 2013 and to a lesser extent SnowFROC 2013). His academic research continues through development of evolutionary cyber competition infrastructures that take into account emerging attack scenarios in order to augment research artifacts and national workforce capabilities.

Regis University, Denver CO
USA

Professor Likarish holds a master’s of science degree in geophysics from the University of Washington, Seattle, and is an assistant professor in the School of Computing and Information Sciences with responsibility for Information Assurance program coordination, students and research. As director of the CIAS research, his teaching interests are in the design and implementation of student cyber-security competitions and security of critical SCADA infrastructure and virtualization of student lab exercises. He is CTO for the Academic Research Network (ARN, the SCIS cloud provides experiential learning opportunities with various virtualization hardware, infrastructure and operating systems. He is regional Director of the RMCCDC (Rocky Mountain Collegiate Cyber Defense Competition). He is a board member for the CISSE, Colloquium. He is on the board of directors for the National CCDC, the American African Higher Education Project; locally he serves on the Community College of Aurora Computer Science Advisor.

His faculty webpage can be accessed at: http://informationassurance.regis.edu/ia-programs/ms-ia/faculty#Dan

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com