Cadets Trade the Trenches for Firewalls

Discussion in 'Gaming and Software' started by msr, May 11, 2009.

Welcome to the Army Rumour Service, ARRSE

The UK's largest and busiest UNofficial military website.

The heart of the site is the forum area, including:

  1. msr

    msr LE

    A team of Army cadets spent four days at West Point last week struggling around the clock to keep a computer network operating while hackers from the National Security Agency tried to infiltrate it with methods that an enemy might use. The NSA made the cadets' task more difficult by planting viruses on some of the equipment, just as real-world hackers have done on millions of computers around the world. The competition was a final exam for computer science and information technology majors, who competed against teams from the Navy, Air Force, Coast Guard and Merchant Marine as well as the Naval Postgraduate Academy and the Air Force Institute of Technology. Ideally, the teams would be allowed to attack other schools' networks while also defending their own but only the NSA, with its arsenal of waivers, loopholes, special authorizations is allowed to take down a US network. NSA tailored its attacks to be just 'a little too hard for the strongest undergraduate team to deal with, so that we could distinguish the strongest teams from the weaker ones.' The winning West Point team used Linux, instead of relying on proprietary products from big-name companies like Microsoft or Sun Microsystems."
  2. FTFA:

    Lets hope they don't actually believe that, PR puffing aside.
  3. msr

    msr LE

    In what way?
  4. In the way of "Operating system X is more secure because of Y".
    It's much more a case of understanding both the operating system and what you are doing than any specific OS; they are all vulnerable in some way or another and to suggest otherwise will just result in pain further down the line.

    I've broken into a wide variety of networks that used all sorts of OS's and technologies. What type they are doesn't really matter to me, how they have been designed and implemented, very much does.

    Edit: And that phrase "not as many ways known to attack it" is painfully naive. :twisted: