InvestorsHub Logo
Followers 2
Posts 300
Boards Moderated 0
Alias Born 10/23/2003

Re: None

Friday, 08/19/2005 12:51:42 AM

Friday, August 19, 2005 12:51:42 AM

Post# of 249238
Wave Systems and campus security

Colleges struggle to combat identity theft
Universities a target-rich environment for ID thieves

http://www.msnbc.msn.com/id/8986162/

reminds me of this Wave bit:
Project Name: Building a Trusted Infrastructure: opportunities and issues of digital security on campus


http://www.oit.ucsb.edu/committees/ITPG/2003_proposals/trusted_infrastructure.pdf

Page 6 describes Wave System products/features (although Wave is not mentioned by name or even listed in the sources at the end of the document; must be Stealth mode).

Page 11 - dates mentioned (although I don't know the status of this project or if it is even still active)
UCSB Feasibility study - by end of winter 2004
Beta Test - Spring 2005
Eval and Decision - Summer 2005
Implementation in 3 stages:
Secure Infrastructure Deployment - Summer 2005
Transaction Execution - Winter 2005
Application Development - Summer 2006


These UCSB dudes are smart....

They won this year's capture the flag:
http://www.cs.ucsb.edu/~vigna/CTF/

Univ of Calif - Capture the Flag.
http://www.cs.ucsb.edu/~vigna/CTF/


History and Background
The UCSB CTF evolved from a number of previous security "live exercises" that were carried out locally at UCSB. The first wide-area edition of the UCSB CTF was carried out in December 2003. In that CTF, fourteen teams from around the United States competed in a contest to compromise other teams' network services while trying to protect their own services from attacks. The contest included teams from UCSB, North Carolina State University, the Naval Postgraduate School in Monterey, the West Point Academy, Georgia Tech, University of Texas at Austin, and University of Illinois, Urbana-Champaign.

In 2004 the UCSB CTF evolved into an international exercise, which included teams from the United States and Austria, Germany, Italy, and Norway. This was never be attempted before on such a large scale.

The exercise is loosely based on the DEFCON Capture the Flag contest. Acknowledgments go to the Ghetto Hackers that did such a wonderful (and inspiring) job in organizing the CTF contest at DEFCON. Many of the ideas of our CTF are derived from the DEFCON CTF and the lessons learned by participating to the DEFCON contest. The contest is now organized by Kenshoto.

This exercise is different from the DEFCON contest because it involves several educational institutions spread across the different continents. The DEFCON contest includes locally connected teams only.

In addition, the DEFCON contest has always involved a limited number of teams. We developed a new network solution that allows a large number of teams to participate.

Finally, we use a novel technique to route traffic among the teams that allows for a more realistic experience.




Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.