{"60782":{"#nid":"60782","#data":{"type":"news","title":"Competition Seeks the \u2018Hungriest Hacker at Georgia Tech\u2019","body":[{"value":"\u003Cp\u003EThe Georgia Tech Information Security Center (GTISC), the\nGeorgia Tech Association for Computing Machinery (GT ACM) and Georgia Tech\nResearch Institute\u2019s (GTRI) Cyber Technology Group host the inaugural cyber\nsecurity competition, Hungry, Hungry Hackers (aka H3). \u003C\/p\u003E\n\n\u003Cp\u003EThe \u201cHungriest Hacker at Georgia Tech\u201d will receive $750\ncash and an opportunity to interview for a position at GTRI. Organizers also plan\nto provide runners-up with some geeky gift cards and possible interview slots.\u003C\/p\u003E\n\n\u003Cp\u003EOpen to all current Georgia Tech students, the competition will\nbe held at the GTRI Conference Center October 23, from 10 a.m. to midnight. Registration\nis available on the event website, \u003Ca href=\u0022http:\/\/www.hungryhungryhackers.org\/\u0022\u003Ewww.hungryhungryhackers.org\u003C\/a\u003E.\nStudents are encouraged to register early. Morning-of registrants will be\nassigned available space on a first-come, first-served basis. \u003C\/p\u003E\n\n\u003Cp\u003E\u201cA systematic vulnerability assessment is an important way\nto discover weaknesses that must be addressed to increase the robustness of\nsystems against such attacks,\u201d said GTISC Director Mustaque Ahamad. \u201cThis\ncompetition will be a great opportunity for our students to experience how to\nnot only analyze IT systems for vulnerabilities, but also experience how to\ndefend them against attacks that may exploit the discovered vulnerabilities.\u201d\u003C\/p\u003E\n\n\u003Cp\u003EIn keeping with the H3 title, food and drinks will be\nprovided throughout the event. Phase I of the competition is scheduled to begin\nat 10 a.m. After lunch, the top performers will advance to Phase II, scheduled\nto end around 10 p.m. Dinner and snacks will be served during this time. The\nwinner and runners up will be announced shortly after. \u0026nbsp;\u003C\/p\u003E\n\n\u003Cp\u003E\u201cIn cyber security research, the key to developing effective\ndefenses is in understanding the threat,\u201d said Electronic Systems Lab Chief Engineer\nFred Wright. \u201cThis event will provide an opportunity for students to apply\ntheir knowledge of computers and networks and to build cyberspace exploitation\ntechniques. In this way, they will gain valuable insights into needed security\ntechnologies and strategies.\u201d\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"GTISC, GT ACM, and GTRI host day-long hacking competition for Georgia Tech\u2019s brightest"}],"field_summary":[{"value":"\u003Cp\u003EGTISC, GT ACM, and GTRI host day-long\nhacking competition October 23 in search of Georgia Tech\u2019s brightest hackers. \u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Winner receives cash and a chance to interview at Georgia Tech Research Institute."}],"uid":"27191","created_gmt":"2010-09-03 08:51:25","changed_gmt":"2016-10-08 03:07:23","author":"Robert Nesmith","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2010-09-03T00:00:00-04:00","iso_date":"2010-09-03T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"60781":{"id":"60781","type":"image","title":"H3 Logo","body":null,"created":"1449176296","gmt_created":"2015-12-03 20:58:16","changed":"1475894528","gmt_changed":"2016-10-08 02:42:08","alt":"H3 Logo","file":{"fid":"191213","name":"HungryHackers_Final_v1.jpg","image_path":"\/sites\/default\/files\/images\/HungryHackers_Final_v1_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/HungryHackers_Final_v1_0.jpg","mime":"image\/jpeg","size":157350,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/HungryHackers_Final_v1_0.jpg?itok=ofalZ-rV"}}},"media_ids":["60781"],"related_links":[{"url":"http:\/\/www.hungryhungryhackers.org\/","title":"H3 2010"},{"url":"http:\/\/www.hungryhungryhackers.org\/registration.html","title":"H3 2010 Registration"},{"url":"http:\/\/www.gtisc.gatech.edu\/","title":"GTISC"},{"url":"http:\/\/www.gtacm.org\/","title":"GT ACM"},{"url":"http:\/\/www.gtri.gatech.edu\/","title":"Georgia Tech Research Institute"}],"groups":[{"id":"1183","name":"Home"}],"categories":[{"id":"129","name":"Institute and Campus"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"10568","name":"Georgia Tech Association for Computing Machinery"},{"id":"10567","name":"Georgia Tech Information Security Center"},{"id":"10569","name":"Georgia Tech Research Institute Cyber Technology Group"},{"id":"10570","name":"Hungry Hungry Hackers"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":["h3@gtri.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}