{"id":78593,"date":"2021-08-19T09:28:14","date_gmt":"2021-08-19T13:28:14","guid":{"rendered":"https:\/\/newsroom.carleton.ca\/?post_type=cu_story&#038;p=78593"},"modified":"2025-10-10T13:34:42","modified_gmt":"2025-10-10T17:34:42","slug":"cybersci-cyber-security-challenge","status":"publish","type":"cu_story","link":"https:\/\/carleton.ca\/news\/story\/cybersci-cyber-security-challenge\/","title":{"rendered":"Carleton Takes Second at National CyberSCI Cyber Security Challenge After Sweeping Regional Competition"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-max  md:space-y-10 cu-prose-first-last\">\n\n        \n                    \n                    \n            \n    <div class=\"cu-wideimage relative flex items-center justify-center mx-auto px-8 overflow-hidden md:px-16 rounded-xl not-prose  my-6 md:my-12 first:mt-0 bg-opacity-50 bg-cover bg-cu-black-50 pt-24 pb-32 md:pt-28 md:pb-44 lg:pt-36 lg:pb-60 xl:pt-48 xl:pb-72\" style=\"background-image: url(https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-1.jpg); background-position: 50% 50%;\">\n\n                    <div class=\"absolute top-0 w-full h-screen\" style=\"background-color:rgba(0,0,0,0.600);\"><\/div>\n        \n        <div class=\"relative z-[2] max-w-4xl w-full flex flex-col items-center gap-2 cu-wideimage-image cu-zero-first-last\">\n            <header class=\"mx-auto mb-6 text-center text-white cu-pageheader cu-component-updated cu-pageheader--center md:mb-12\">\n\n                                    <h1 class=\"cu-prose-first-last font-semibold mb-2 text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] cu-pageheader--center text-center mx-auto after:left-px\">\n                        Carleton Takes Second at National CyberSCI Cyber Security Challenge After Sweeping Regional Competition\n                    <\/h1>\n                \n                            <\/header>\n        <\/div>\n\n                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"absolute bottom-0 w-full z-[1]\" fill=\"none\" viewbox=\"0 0 1280 312\">\n                <path fill=\"#fff\" d=\"M26.412 315.608c-.602-.268-6.655-2.412-13.524-4.769a1943.84 1943.84 0 0 1-14.682-5.144l-2.276-.858v-5.358c0-4.876.086-5.358.773-5.09 1.674.643 21.38 5.84 34.646 9.109 14.682 3.59 28.935 6.858 45.936 10.449l9.874 2.089H57.322c-16.4 0-30.31-.16-30.91-.428ZM460.019 315.233c42.974-10.074 75.602-19.88 132.443-39.867 76.16-26.791 152.063-57.709 222.385-90.663 16.7-7.823 21.336-10.074 44.262-21.273 85.004-41.688 134.719-64.193 195.291-88.413 66.55-26.577 145.2-53.584 194.27-66.765C1258.5 5.626 1281.34 0 1282.24 0c.17 0 .34 27.596.34 61.3v61.299l-2.23.375c-84.7 13.718-165.93 35.955-310.736 84.931-46.494 15.753-65.427 22.076-96.166 32.15-9.102 3-24.814 8.198-34.989 11.574-107.543 35.954-153.008 50.422-196.626 62.639l-6.74 1.876-89.126-.054c-78.135-.054-88.782-.161-85.948-.857ZM729.628 312.875c33.229-10.985 69.248-23.523 127.506-44.207 118.705-42.223 164.596-57.709 217.446-73.302 2.62-.75 8.29-2.465 12.67-3.751 56.19-16.772 126.94-33.597 184.17-43.671 5.07-.91 9.66-1.768 10.22-1.875l.94-.161v170.236l-281.28-.054H719.968l9.66-3.215ZM246.864 313.411c-65.041-2.251-143.047-12.11-208.432-26.256-18.375-3.965-41.73-9.538-42.202-10.074-.171-.214-.257-21.38-.214-47.046l.129-46.618 6.654 3.697c57.313 32.043 118.491 56.531 197.699 79.143 40.313 11.521 83.459 18.058 138.669 21.059 15.584.857 65.685.857 81.14 0 33.744-1.876 61.306-4.93 88.396-9.806 6.396-1.126 11.634-1.983 11.722-1.929.255.375-20.48 7.769-30.999 11.038-28.592 8.948-59.288 15.646-91.873 20.147-26.36 3.59-50.015 5.627-78.35 6.698-15.584.59-55.209.59-72.339-.053Z\"><\/path>\n                <path fill=\"#fff\" d=\"M-3.066 295.067 32.06 304.1v9.033H-3.066v-18.066Z\"><\/path>\n            <\/svg>\n            <\/div>\n\n    \n\n    <\/div>\n<\/section>\n\n<p>To stop a hacker, you need to think like one. And the <a href=\"https:\/\/csc21.cybersecuritychallenge.ca\/\" rel=\"noopener noreferrer\" target=\"_blank\">CyberSCI Cyber Security Challenge<\/a> asks competitors to put themselves in a hacking state of mind.<\/p>\n\n\n\n<p>The annual competition presents participants with a series of puzzles and tasks, and challenges students to work as a team to solve them. For the past nine years, CyberSCI has been pitting teams of undergraduate computer science students against each other in a multi-round competition.<\/p>\n\n\n\n<p>In January 2021, Carleton swept the podium in the regional competition before the winning team, Team Rocket, went on to place second in the online national competition in July 2021. It was the first time that any of Ottawa\u2019s post-secondary institutions had achieved the feat during the regional competition.<\/p>\n\n\n\n<p>The team competing in the national competition was made up of Carleton <a href=\"https:\/\/carleton.ca\/scs\/\" rel=\"noopener noreferrer\" target=\"_blank\">School of Computer Science<\/a> students Emma Sewell, Trent Holmes, John Forsythe and Michael Shlega, dubbed Team Rocket.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full wp-image-78598\"><img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"250\" src=\"https:\/\/newsroom.carleton.ca\/wp-content\/uploads\/sonia-chiasson-250w-1.jpg\" alt=\"Prof. Sonia Chiasson\" class=\"wp-image-78598\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/sonia-chiasson-250w-1.jpg 250w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/sonia-chiasson-250w-1-150x150.jpg 150w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/sonia-chiasson-250w-1-200x200.jpg 200w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><figcaption class=\"wp-element-caption\">Prof. Sonia Chiasson<\/figcaption><\/figure>\n\n\n\n<p>\u201cThe exact challenges in CyberSCI change from year to year, so students never know exactly what they will need to do,\u201d says <a href=\"https:\/\/carleton.ca\/scs\/people\/sonia-chiasson\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sonia Chiasson<\/a>, an associate professor in Carleton\u2019s School of Computer Science and Canada Research Chair in User Centric Cybersecurity.<\/p>\n\n\n\n<p>\u201cThey might be asked to break into an admin account so they can get access to a console, and then perform a task. They are trying to hack into the system in some way, and after they do, we have conversations about how this type of attack could be handled by a security professional. Even though students pretend to be attackers during the challenge, we always come back to what could be done to protect against this type of attack in the real world, once they are security professionals.\u201d<\/p>\n\n\n\n<p>The competition emulates real-world scenarios, and because of that, cyber security companies typically attend CyberSCI\u2014and use it as a recruiting event where they can meet potential interns.<\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe set out to be as realistic as possible, and work on a network that looks like a real company,\u201d says Tom Levasseur, a cyber security analyst at the Bank of Canada who launched CyberSCI in 2011 after participating in the HackFest Cyber event in Quebec City.<\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>\u201cThis year we had to do it online and used Discord. So, it was a little unlike a regular hacker competition, where competitors get to interact directly with mentors who can explain exactly what&#8217;s going on. And mentors get to see students in scenarios that are a lot like what they will be doing at work. It\u2019s a format that really works well for everybody.\u201d<\/p>\n\n\n<figure class=\"wp-block-image alignfull wp-image-78602 size-full w-screen ml-offset-center cu-max-w-child-max px-4 md:px-6 lg:px-12\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"680\" src=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-3jpg.jpg\" alt=\"Cybersecurity\" class=\"wp-image-78602\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-3jpg.jpg 1200w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-3jpg-400x227.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-3jpg-300x170.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-3jpg-768x435.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-3jpg-700x397.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cybersecurity-1200w-3jpg-200x113.jpg 200w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n<h2 id=\"cyber-security-professionals-are-in-high-demand\" class=\"wp-block-heading\">Cyber Security Professionals Are in High Demand<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>CyberSCI was founded in Ottawa, but has grown into a Canada-wide event. Each year, there are similar regional competitions held in Montreal, Toronto, Calgary, Halifax, and Vancouver. Winners move on to a national competition held in the summer, and this year, the top two teams from the Canadian competition have been invited to participate in the European Cyber Security Challenge in Prague\u2014 public health guidelines permitting. The champion is also invited to participate in the International Cyber Security Challenge in Athens.<\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIn the beginning, we were doing really well, but we kind of hit a wall, and got stuck for two hours on this one task,\u201d says three-time CyberSCI participant and fourth-year computer science student Emma Sewell of the regional competition.<\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>\u201cBut we went over challenges, and the parts we had missed, so we could revisit what we got wrong.\u201d<\/p>\n\n\n\n<p>Cyber security professionals are in high demand, and Chiasson has seen an uptick in interest in recent years.<\/p>\n\n\n\n<p>\u201cIt is increasing in popularity. More and more students are realizing it is an exciting career path,\u201d she says.<\/p>\n\n\n\n<p>\u201cPeople are also recognizing that they have a lot of opportunity to guide their own career in this field. There are a ton of jobs, and we regularly get emails from businesses asking if we have any students graduating soon because they have openings. There are a lot of opportunities for students who build this kind of experience.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full wp-image-78604\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"537\" src=\"https:\/\/newsroom.carleton.ca\/wp-content\/uploads\/cyber-sci-2021-rankings-800w-1.jpg\" alt=\"CyberSci 2021 Canadian National Championships Standings\" class=\"wp-image-78604\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cyber-sci-2021-rankings-800w-1.jpg 800w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cyber-sci-2021-rankings-800w-1-400x269.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cyber-sci-2021-rankings-800w-1-300x201.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cyber-sci-2021-rankings-800w-1-768x516.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cyber-sci-2021-rankings-800w-1-700x470.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/cyber-sci-2021-rankings-800w-1-200x134.jpg 200w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">CyberSci 2021 Canadian National Championships Standings (Photo: CyberSci)<\/figcaption><\/figure>\n\n\n\n<p>Team Rocket\u2019s Trent Holmes is among the students who ecently developed an interest in the field.<\/p>\n\n\n\n<p>\u201cWhen I went into computer science, I wasn&#8217;t really sure what I wanted to do, but cyber security was most interesting to me,\u201d he says.<\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cA little over a year ago, I did a \u2018capture the flag\u2019 computer security competition, and I really enjoyed it. I&#8217;ve been looking for more ever since.\u201d<\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>Second place in the regional competition was claimed by Team Solar Winds, &nbsp;comprised of students from the Bachelor of Information Technology program, a degree jointly offered by Carleton and Algonquin College. Completing the sweep was another School of Computer Science team. Called Ctrl-Alt-Elite, they earned the unofficial prize for best team name.<\/p>\n\n\n\n<p>&#8212;<br>\n<a href=\"https:\/\/newsroom.carleton.ca\/our-stories\/\">More Stories<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To stop a hacker, you need to think like one. And the CyberSCI Cyber Security Challenge asks competitors to put themselves in a hacking state of mind. The annual competition presents participants with a series of puzzles and tasks, and challenges students to work as a team to solve them. For the past nine years, [&hellip;]<\/p>\n","protected":false},"author":410,"featured_media":78596,"template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"cu_story_type":[19],"cu_story_tag":[],"class_list":["post-78593","cu_story","type-cu_story","status-publish","has-post-thumbnail","hentry","cu_story_type-technology-innovation"],"acf":{"cu_post_thumbnail":"blueprint"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/78593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story"}],"about":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/types\/cu_story"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/users\/410"}],"version-history":[{"count":4,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/78593\/revisions"}],"predecessor-version":[{"id":98012,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/78593\/revisions\/98012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media\/78596"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media?parent=78593"}],"wp:term":[{"taxonomy":"cu_story_type","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_type?post=78593"},{"taxonomy":"cu_story_tag","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_tag?post=78593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}