Cyber Security Grand Challenge - Scholastic World - Contests for Indian Students

Saturday, 8 February 2020

Cyber Security Grand Challenge


With more than half a billion internet subscribers, India is riding high on the digital front. All facets of the economy are leveraging technology for wider reach, convenience and effectiveness. Quick technology adoption by enterprises has made mobile-banking, on-line shopping, on-line trading and social networking possible. The base of these efforts lies in government's emphasis on developing infrastructure to enable affordable internet access for every Indian.

However, as this digital transformation unfolds, it has potential to create significant cyber security challenges. At the same time, India is well poised to be a cybersecurity industry hub, catering to both global and domestic Indian markets.

With an ecosystem of 175+ product companies, Indian cybersecurity product landscape has already begun to create a promising story. More than 70% of these companies have been incorporated in last decade with 60%+ Y-O-Y growth rate of several new age startups.

In light of these developments, Grand Challenge for Cyber Security has been announced by the Hon'ble Minister of Electronics & Information Technology. This initiative provides impetus to the growth of Indian cyber security industry and seeks to nurture start-ups that diversify the industry and boost the development of niche and advanced solutions.

The Grand Challenge for Cyber Security is designed to promote a culture of innovation and entrepreneurship by building key cybersecurity capabilities in the country. Participants will compete in teams at 3 stages: Idea, Minimal Viable Product (MVP) and Final Product Building. In the first stage, teams will propose implementable ideas to solve identified Cyber Security Problem statement(s). During the course of the event, participating teams would be provided with award money and mentorship. Top 3 teams would be awarded with a total prize money of INR 2 Cr.

Budding entrepreneurs are invited to submit their ideas in a chance to fast track their growth, be mentored by the best and win remarkable prizes. Industry experts are invited to contribute to the national cybersecurity building initiative and explore an opportunity to mentor the best talent in the country.

PROBLEM STATEMENTS
Developing System That Heals Itself In Case Of A Security Compromise
Devices, things, and mobility options demanding access have been increasing significantly. Their surface to the external world is expanding, exposing their assets to a variety of attack possibilities. The IT system goes through millions of operating situations. One out of these situations may compromise security.

Assurance Of Security Of Hardware Devices, Products And Components
Exploitable flaws and vulnerabilities are often discussed in the context of software. Hardware carries similar risks, but its ramifications could be quite significant. The threat landscape is moving from software stack to lower levels. The rapid growth of accessible devices, fueled by the pervasive mobile technologies and an aggressive drive for digital innovation..

Defending Against Advanced Attack Vectors On Biometric Identification And Authentication Systems
Biometric authentication in the current age mostly relies on fingerprint authentication, facial authentication, voice & video recognition, and behavioral contexts. The attack ecosystem has evolved to adopt capabilities to circumvent the authentication system using fake video, audio, and even by playing with behavioral attributes.

Securing Microservices And Services Mesh Architecture
In a microservice architecture, an application is decomposed into multiple services.  Many organizations are adopting microservices architecture to become agile, scalable, and resilient. However, microservices architecture is likely to expose a lot more of your system’s functionality directly to the network.

Securing Against IoT Edge Device Threats Through Programmable Network Elements
The convergence of devices, IoTs with evolving edge computing, opens up newer opportunities to devise an intelligent network environment. Deployment of IoTs/IIoTs sensors and various devices for various purposes like smart cities, and intelligent transportation, is gaining more momentum on the one hand.

Development Of Automated System To Enable Privacy Preserving Analytics/Forensics
Modern-day innovations are increasingly relying on data. The quantum of innovation with data generated by proliferating digital applications, products, and services gives rise to many new ideas of making use of data. Without providing access to the data and sharing, it would be challenging to realize the true potential of digitization.

Last Date for Registration of Team 14 February, 2020

No comments:

Post a Comment

Thank you for leaving your comment. Your comment will appear here after moderated by the administrator. Only comments having proper names of the person with a genuine content will be considered for publishing.