[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

SibEDGE: An information system for competitions in cyber security

Product
Developers: SibEDGE (Sibedzh)
Last Release Date: 2018/12/19
Branches: Internet services
Technology: Cybersecurity - Means of enciphering

2018: Testing and trial operation

On December 19, 2018 the SibEDGE company reported that it develops an information system for the international competitions in cyber security. The project includes creation of an informational portal, setup of automated systems and development of mobile application.

File:Aquote1.png
Our project is rather large information system. One of its principal components — the portal where there will be an opportunity to attend actions within the competitions, to read news, to watch videos, broadcastings, to see automatically renewed results of participants and many other things. Automated systems which will watch competitions will be connected to the portal, to fix results and to display them in real time. Data will arrive from sensors, but if necessary the administrator can make corrections. For the portal we will enter enciphering which will provide the maximum protection because competitions in cyber security will inevitably attract persons interested to crack a system.

Stanislav Turchanovsky, SibEDGE project manager
File:Aquote2.png

In addition to a system two mobile applications duplicating everything functions of the portal will be created. The application allows to monitor for with competition news, the schedule, to watch results, to comment on photos and news and also to monitor competitions in the online mode. The module of registration of visitors will help to register in real time participants and automates a part of work of administrators: creates lists of guests, will prepare for printing badges.

As specified in the company, for December, 2018 the portal passes test and trial operation, administrators study work with a system. The customer is going to hold competitions in cyber security several times a year. Several commands which are divided into attacking and protected participate in battles. Attacking should crack a system, protecting respectively try not to allow it. Points are appropriated to both the first, and the second, depending on that what task was set for players.