Eligility for Participation
- If you were part of a team that placed 1st, 2nd, or 3rd during any of the previous challenges, you cannot participate as a team member in the 2020 Cyber Security Challenge.
- Previous winners will be allowed to participate as a team mentor for the 2020 Cyber Security Challenge.
- Team members must be made up exclusively of students from SADC tertiary educational institutions and be registered for tertiary studies for 2020.
Rules for the Training Challenges
- Teams are restricted to 3 members if all member are of the same gender, otherwise the teams can be up to 4 members.
- The team leader is a member of the team that has been designated as the Point of Contact (PoC) for that team.
- The organisers will interact with the team leader regarding all correspondence related to the competition.
- Teams must compete without any outside aid from non-team members.
- Team members must be made up exclusively of students from SADC tertiary educational institutions.
Additional Rules for the Qualifier Round
- Each team is expected to participate in the qualifier round remotely.
- Hackinglab sytems will be used for the challanges and scoring.
- Each tertiary educational institution will have their own unique first round competition.
- The organisers will invite the winners to attend the second round at the CHPC conference.
- Please note, teams will have to achieve a minimum in the qualifier round to be invited to the finals.
- At the discretion of the organisers, more than one team from an institution may be invited.
Additional Rules for the Final
- All team members should be present at the event.
- All team members will wear badges identifying team affiliation at all times during competition.
- If the member of a team advancing to the second round competition is unable to attend that competition, that team may substitute a person in their place, as long as that person qualifies under the eligibilityrule.
- Teams may not modify the hardware configurations of competition systems.
- Teams must not open the case of any system such as, PC, monitor, router, switch, firewall, or any other piece of equipment used during the competition.
- Teams may not remove their assigned laptops from the competition area unless specifically authorised to do so by organisations members.
- All network activity that takes place on the competition network will be logged and subject to anonymised release.
- Teams will be supplied with laptops for the competition.
- This is to ensure a fair base for the games.
- These laptops are not allowed to be moved from the booths.
- All team members are expected to attend morning briefings, plenary speakers sessions and the prize ceremony and dinner.
- In addition to published rules, new policies and rules may apply throughout the games.
- These rules will be communicated to each team leader.
- Social Engineering is allowed at the competition, but strictly limited to Cyber Security Challenge participants.
- Sabotage is not allowed.
- If unsure ask the organisers.
Challenges for the Final Round
- Hacking Lab Challenges – The Main Competition
- This competition will use the hacking lab scoring mechanism. The qualifier round will only be a hacking lab challenge.
- Social Engineering
- If a team has successfully accomplished a social engineering hack, they should inform the organisers who at their discretion will award a prize.
- Hash Challenge
- The team that is able to decode the most hashed passwords will be awarded the hash challenge prize.
- Attack Defend Challenge
- The last day of the competition, teams will be required to defend a system, and attack the other teams’ systems.