Welcome to the World of Global CyberPeace Challenge

1) Cybersecurity in extended reality

One of the areas where end users are most vulnerable is entertainment. Mixed reality (MR), augmented reality (AR) and virtual reality (VR) are rapidly entering the consumer world of interactive media. These technologies do have privacy concerns — some AR devices have constantly working cameras, which can pose a security risk not only to the user himself, but also for the people around. When technology can convince the brain it’s somewhere where it’s not, the opportunities for taking advantage of human vulnerabilities are huge. Attackers might inject features into VR platforms designed to mislead users into giving away personal information. There are also new implications for ransomware, in which cybercriminals could interrupt important meetings before asking for a ransom.

Aside from potentially providing attackers with new ways to manipulate their victims, VR and AR present all the classic cybersecurity risks too. They’re possible targets for DDos attacks, which could have very serious implications for those depending on AR in critical situations such as surgical procedures or when operating dangerous machinery. Help to protect MR, AR and VR users!

2) Machine learning in cybersecurity

Lately, machine learning (ML) algorithms became vastly applicable in cybersecurity. Not only the companies, who develop protective solutions use these algorithms, but also cybercriminals use it to improve their attacks (for example, to improve phishing’s effectiveness). Today machine-learning methods already help to meet real-world security requirements, such as achieving a low false-positive rate.

But there’s still plenty of other implications not quite developed yet, like applied ML in the automation of vulnerability identification and any other applications you may imagine. We encourage you to develop ML algorithms as instruments for cybersecurity improvement!

3) Security awareness games

It is no secret that the internet and the gadgets we use every day are fraught with dangers! Among them, there are profoundly serious ones, but in order to avoid the majority, simple digital literacy is enough. Some kind of information hygiene. For a large proportion of people, the significant aspects of this hygiene remain unknown, and they do not even have a desire to study new precautions.

Create a game that will help to study in a gaming environment that basic complex of information security measures that you deem necessary, or tell players about the possible problems in their personal information security that are worth paying attention to.

4) Security of smart homes (5G & IoT)

5G is known as the fifth-generation cellular network technology. It is supposed to be 100 times faster than the present 4G systems, with up to 25 times lower latency, and as many as one million devices supported within one square kilometer.

IoT devices will occupy the 5G network capacity, and the connection of all these devices in the 5G network will disclose previously unresearched problems in the design and behavior of 5G. So why are we talking about smart homes? Network service providers will have extensive access to large amounts of data transferred by user devices and so-called smart homes. It could show exactly what is happening inside a user’s home and describe their living environment, in-house sensors and parameters via metadata.

In some cases, vulnerabilities could cause injuries or ill health, for instance, if a client’s therapeutic gadgets are disconnected and not operational. The potential threats may become even greater when critical infrastructure components such as water and energy equipment are put at risk. Research this new technology and help users to stay safe in the 5G-covered world!

5) Driving Innovation to Monitor Online Sexual Abuse Against Children

Description : “Across the world the production and distribution of images and video depicting the sexual abuse of children has reached a level that is exceeding the capabilities of law enforcement to investigate and prosecute. The projected growth in mobile and internet usage in India is expected to grow exponentially over the next 5 years. The sexual abuse of a child is a crime and requires investigation and intervention when detected. What technological solutions can be implemented to stop the flow of these images into, across and out of India whilst ensuring that appropriate action is taken to locate and identify child victims? “

6) Problem Statement : Honeypots

Description : The internet houses millions of bots and humans waiting attack open systems and it is important to enable proactive protection controls to safeguard our systems, networks and data assets. A honeypot can help to identify and observe attack techniques and patterns that can then be inputs for development of protective controls and / or effective response tactics. However, honeypots must be of different flavors and must mimic real systems with business or technical configuration scenarios to be able to attract malicious attacks. The challenge is to build honeypots presenting different scenarios like websites, ICS/SCADA systems, windows networks for different verticals, and to have a backend that will capture the attacker’s movements across the decoy system. Keep in mind present day threats can target mobile or IoT devices too and a honeypot can be an important tool in the defense strategy for cyber security – at a national or enterprise level.

7) Problem Statement : Fake News

Description : Fake news also referred to hoax news occupies large sphere of cyber space today world-wide. Cyber technology’s wide reach and fast spread contributes to its menace. Publicity through such fake news on cyber space today has been adopted by States, institutions as well as individuals for various reasons and varied forms. Often sensational news are created and spread through social media to achieve intended end. On the other hand, it may also involve narration of a true fact however being deliberately exaggerated. This may also include titling the webpages with misleading title or tag-lines in order to seize attention of readers. Such misinformation may lead in committing offences, social unrest, financial frauds upon such misrepresentation, political gain, to increase number of readers, gain revenue associated with click, etc. This may also affect the affect the importance of serious news media. Further danger lies in other electronic media using this as a source for their news thereby carrying forward further spread of such news. The problem is to identify the authenticity of the news and online content. Equally important problem is to identify the bots involved in spreading false news.

8) Problem Statement : Security of Women Online

Description : One of the biggest issues women face online is trolling. Can a system be developed where this can be controlled as well as there is a data intelligence to collect information about trollers and report them accordingly. The problem isto identify the bots, and identify the trolls written in languages other than English. Another challenge is to address the language part, as Romanization (hinglish etc). Solution should be able to identify trolls preferably in two languages Hindi and English and then aspire for local languages.It should also be able to carry out historical analysis and predictive analysis based on the tweets or posts so the troll’s intelligence can be used constructively for predictive use.

9) Problem Statement : Integrated Recourse for Digital Fraud Victims

Description : Technology has played an important role in transforming the lives by providing digital authentication, facilitating digital payments and extending the service to citizens through Digital means. Banking, communication, government services, ecommerce etc is available on the fingertips and, in event of a disruption, can lead to national chaos or disrupt our personal life. Due to the nature of cyber (or technology) integration in our life and work, it is important that citizen support should be all encompassing and be available through a single channel. The challenge here is to facilitate citizens at different level for reporting any incident related to Digital Payment through a single channel preferably through an app or website. The solution should be capable to advise the remedial actions. Solution shall carry out historical analysis based on the incidents reported to it and generate regular advisories to its users. It shall also provide correct and updated contact details for reporting incidents to Regulatory Authorities/Law Enforcement Authorities, if required all necessary communication may also be initiated through app/website only on behalf of user (one stop shop for all complaints related to digital payments). This will not only help citizens but also it will emerge as central helpline for all incidents related to Digital Payments regardless of industry/sector.

10) Problem Statement : Mobile Security

Description : Context: As per the GSMA Mobile economy, there were 4.8 billion unique mobile subscribers, 1.9 billion smartphones and 7.9 billion SIM connections globally in December 2016. The mobile traffic data is expected to grow globally by a CAGR of 47% from 2016 to 2020. With ubiquitous presence of mobile in daily life, mobile security has become paramount. There are multiple mobile security tools and apps, each having differential features but it is difficult to find a single authentic app for all mobile security operations. The mobile phone has become an integral and essential part of our life and is critically necessary for us to be able to carry out our communication and connectivity for the operation of our personal or work activities. Billions of applications have been made available to enable communication, news, data sharing, time management, gaming and much more. While these apps contribute to making life easy, and available at one’s fingertips, many of these apps have been identified as malicious. While the app hosting system does carry out a technology check to ensure that the app does not pose a security threat to the user, the behavior of the app may yet be uncertain. There have been numerous instances where users have been enticed to use malicious apps, and as a result, possibly losing sensitive information. In the face of such risks, it is necessary to test apps for malicious behavior and to flag them for exclusion or deletion from hosting platforms. The challenge is to develop an app which provides risk rating to apps based on the malicious behavior and security threats. In addition, the app is required with at least 15 features related to cyber security that consume up to 2 MB memory space and can be stored in external memory devices. The preferable feature includes data leakage, access to personal information, location sharing, mobile locking, internet consumption when not in use, SMS to another mobile in case of change of SIM, identifying genuine application, etc. The solution developed using open source software will be an added advantage.

11) Problem Statement : Digital Awareness

Description : The last couple of years have seen most of the critical infrastructures such as banking, energy, telecommunication, defence etc. has seen implementation of information and ICT tools for its effective and efficient use across the globe. But these information systems are prone to cyber risks and vulnerabilities; these systems thus need to be kept secure. To achieve cyber security, security professionals deploy (i) technical and security measures and (ii) develop policies for end users to implement security. But research says humans are one of the weakest links in cyber security. Human behavior has been a key challenge that needs to be addressed. But most of the time, individual users are unaware of the risks arising due to their behavior on the internet. There is thus a need to design extensive awareness and training for end users in cybersecurity. In an Indian scenario, implementing of awareness and training programme is a challenge considering that 1.34 billion of Indian population is divided into: (i) Urban and Rural (ii) Different states (iii) Different regional languages (iv) Different age groups (v) Different educational profile. There is thus a need to design and develop awareness campaigns to cater to the needs of the users. Digital Cyber Awareness Campaign Challenge invites schools/colleges/universities and industries across India to design and develop digital awareness campaigns in first of its kind awareness campaign challenge. The key elements of the challenge are:

  • Ease of use
  • Reach
  • Measurable
  • Effective
Share This