Bei, Y., Kesterson, R., Gwinnup, K., & Taylor, C. (2011, October). Cyber defense competition: A tale of two teams. Journal of Computing Sciences in Colleges, 27(1), 171-177. Retrieved from http://ac-support.europe.umuc.edu/~meinkej/ccsc/JCSC27_1.pdf#page=182
Collegiate Cyber Defense Competitions have recently grown in popularity as a means of providing real-world experiences to students learning computer security at the college level. Preparation and training for these competitions focuses students on essential skills needed to defend networks against real threats and better prepares them for the problems and conditions they may encounter outside the protection of university run labs. This paper highlights the benefits of Cyber Defense Competitions and documents the experiences of two teams that trained and competed in the Northwest regional cyber defense competition. Both teams benefited from participating in the competition with students expressing positive learning experiences. Recommendations for other schools that may be interested in competing or setting up in-house cyber defense exercises will be presented.
Lewis, J. A., & Timlin, K. (2011, October). Cybersecurity and cyberwarfare: Preliminary assessment of national doctrine and organization. Retrieved from http://www.unidir.org/pdf/ouvrages/pdf-1-92-9045-011-J-en.pdf
Overview of cybersecurity policies and organizations in 133 countries, including military command (with an assessment of offensive capabilities) from the Center for Strategic and International Studies.
Rogers, M. (2011, October 4). [Video of comments before the House Intelligence Committee RE: Chinese "cyberespionage".] Retrieved from http://intelligence.house.gov/video/rogers-opening-statement-october-4-2011-hearing-cyber-threats-and-ongoing-efforts-protect [Related NextGov article / Rogers speaking RE: China on CNN.]
The United States and its allies in Europe and Asia need to band
together and confront China's campaign of cyberespionage, House
Intelligence Committee Chairman Mike Rogers , R-Mich., said on Tuesday. Although governments have long spied on each other, China has gone
beyond that by engaging in "brazen and wide-scale theft" of intellectual
property from commercial competitors around the world, Rogers said.
United States. Government Accountability Office. (2011, October). Information security: Weaknesses continue amid new federal efforts to implement requirements. GAO-12-137. Retrieved from http://www.gao.gov/new.items/d12137.pdf
Weaknesses in information security policies and practices at 24 major federal agencies continue to place the confidentiality, integrity, and availability of sensitive information and information systems at risk. Consistent with this risk, reports of security incidents from federal agencies are on the rise, increasing over 650 percent over the past 5 years. Each of the 24 agencies reviewed had weaknesses in information security controls. An underlying reason for these weaknesses is that agencies have not fully implemented their information security programs. As a result, they have limited assurance that controls are in place and operating as intended to protect their information resources, thereby leaving them vulnerable to attack or compromise. In reports for fiscal years 2010 and 2011, GAO and agency inspectors general have made hundreds of recommendations to agencies for actions necessary to resolve control deficiencies and information security program shortfalls. Agencies generally agreed with most of GAO’s recommendations and indicated that they would implement them.