IT-Плеханов CUP 2025

Secure Digital Environment

Basic Level

📌 Required Knowledge

Proficiency in the Python programming language, knowledge of basic ciphers in computer cryptography and steganography, information security tools, logic algebra. Working with the command line.

🖥 Software
  • Windows 10/11
  • Google Chrome
  • Microsoft Edge
  • Yandex Browser
  • Visual Studio Code
  • Python 3
📝 Type of Task

Participants must develop a program code that meets the requirements of a specific data encryption type, considering the characteristics of the method and the encoding of the operating system.

📋 Format of the Event
  • Preliminary round – Online testing on the fundamentals of information security and data encryption methods.
  • Final round – A two-day competition, including the development of program code for various encryption algorithms using Python.
🚫 It will be prohibited
  • Using neural networks and code generators for automatic development.
  • Logging into email services, cloud storage, GitHub, online IDEs, remote repositories, or any services requiring account login.
  • Uploading or downloading files from personal cloud storage or remote servers.
🛠 Allowed Actions
  • Using online tools without authentication (e.g., documentation, sandboxes, reference resources).
  • Working exclusively in a local environment with pre-installed software configured for the task.

Applications

0

Professional level

📌 Required Knowledge

Knowledge of security tools in information systems, understanding of the TCP/IP stack, working with software firewalls, network device command lines, and emulators. Familiarity with Linux-based OS, package installation, and system configuration.

🖥 Software
  • Windows 10/11
  • Google Chrome
  • Microsoft Edge
  • Yandex Browser
  • Cisco Packet Tracer
  • Virtual Box
  • QEMU/KVM
  • Visual Studio Code
  • Python 3
  • Putty
  • VNC Client
  • Windows RDP Client
  • WireShark
📝 Type of Task

Participants must ensure secure access within the virtual lab’s information system, configure data transmission, set up a software firewall, and implement security measures at the data link and network layers of the OSI model.

📋 Format of the Event
  • Preliminary round – Online testing on information security tools and system security.
  • Final round – A two-day competition, including configuring security tools in a virtual lab and implementing secure data transmission methods.
🚫 Prohibited Actions
  • Using neural networks and code generators for automatic development.
  • Logging into email services, cloud storage, GitHub, online IDEs, remote repositories, or any services requiring account login.
  • Uploading or downloading files from personal cloud storage or remote servers.
🛠 Allowed Actions
  • Using online tools without authentication (e.g., documentation, sandboxes, reference resources).
  • Working exclusively in a local environment with pre-installed software configured for the task.

Applications

0

Submit an Application for Participation

Нажмите или перетащите файл в эту область для загрузки.