Their challenge? To uncover flaws in a fictitious company's IT systems.
Telstra chief information security officer Mike Burgess said "If I find 10 good people out of this exercise, I'm going to give all 10 of them a job because there is actually a big demand for these skills"
Telstra, along with other government agencies, held their "2013 Cyber Security Challenge" on Tuesday and Wednesday to try to uncover Australia's next top IT security minds. The students' mission was to find the most flaws in the fictitious company's IT systems in 24 hours.
Groups of four students from 20 universities and TAFE colleges across Australia participated and Telstra said the competition proved so popular that it had to cap the number of teams per institution to three.
They could also be offered Telstra or government jobs in IT security, depending on how good they are, according to Telstra's chief information security officer, Mike Burgess.
They scored 94 points.
Earlier this year Burnett and Julienne were involved in cracking the secret algorithm used on Sydney's public transport tickets for buses, trains and ferries, which could have allowed them to print their own tickets.
The second and third places went to "UNSW2" (68 points) and "UNSW3" (66 points), two other teams at UNSW, which will each be awarded either a new smartphone or tablet of their choice from Telstra.
"If I find 10 good people out of this exercise, I'm going to give all 10 of them a job because there is actually a big demand for these skills," Burgess said on Wednesday, just before the winners were announced.
As part of the challenge, the teams were required to conduct testing on a fictitious security company's product called "Very Secure Transfer Protocol".
In the scenario created, the company, "Computer Security Synergistic Cloud Computing", was supposedly concerned that its popular product could be hacked and required it to be tested. Burgess said it involved the students being engaged as consultants to the company to "undertake a range of security consultancy functions to test the company's security". They were required to conduct what's called penetration testing on the company's web apps, network and product, as well as give advice in easy-to-understand language.
Burgess said Telstra hosted the fake company's infrastructure while Defence created the challenge.
Just last month Telstra was awarded a $1.1 billion six-and-a-half year Defence telecommunications contract, which will require 230 new jobs in Canberra, some of which will require security expertise.
Because of this, Burgess said Telstra was looking for new talent.
No comments:
Post a Comment