<node id="60782">
  <nid>60782</nid>
  <type>news</type>
  <uid>
    <user id="27191"><![CDATA[27191]]></user>
  </uid>
  <created>1283503885</created>
  <changed>1475896043</changed>
  <title><![CDATA[Competition Seeks the ‘Hungriest Hacker at Georgia Tech’]]></title>
  <body><![CDATA[<p>The Georgia Tech Information Security Center (GTISC), the
Georgia Tech Association for Computing Machinery (GT ACM) and Georgia Tech
Research Institute’s (GTRI) Cyber Technology Group host the inaugural cyber
security competition, Hungry, Hungry Hackers (aka H3). </p>

<p>The “Hungriest Hacker at Georgia Tech” will receive $750
cash and an opportunity to interview for a position at GTRI. Organizers also plan
to provide runners-up with some geeky gift cards and possible interview slots.</p>

<p>Open to all current Georgia Tech students, the competition will
be held at the GTRI Conference Center October 23, from 10 a.m. to midnight. Registration
is available on the event website, <a href="http://www.hungryhungryhackers.org/">www.hungryhungryhackers.org</a>.
Students are encouraged to register early. Morning-of registrants will be
assigned available space on a first-come, first-served basis. </p>

<p>“A systematic vulnerability assessment is an important way
to discover weaknesses that must be addressed to increase the robustness of
systems against such attacks,” said GTISC Director Mustaque Ahamad. “This
competition will be a great opportunity for our students to experience how to
not only analyze IT systems for vulnerabilities, but also experience how to
defend them against attacks that may exploit the discovered vulnerabilities.”</p>

<p>In keeping with the H3 title, food and drinks will be
provided throughout the event. Phase I of the competition is scheduled to begin
at 10 a.m. After lunch, the top performers will advance to Phase II, scheduled
to end around 10 p.m. Dinner and snacks will be served during this time. The
winner and runners up will be announced shortly after. &nbsp;</p>

<p>“In cyber security research, the key to developing effective
defenses is in understanding the threat,” said Electronic Systems Lab Chief Engineer
Fred Wright. “This event will provide an opportunity for students to apply
their knowledge of computers and networks and to build cyberspace exploitation
techniques. In this way, they will gain valuable insights into needed security
technologies and strategies.”</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[GTISC, GT ACM, and GTRI host day-long hacking competition for Georgia Tech’s brightest]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2010-09-03T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Winner receives cash and a chance to interview at Georgia Tech Research Institute.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>GTISC, GT ACM, and GTRI host day-long
hacking competition October 23 in search of Georgia Tech’s brightest hackers. </p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="60781">
            <nid>60781</nid>
            <type>image</type>
            <title><![CDATA[H3 Logo]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>191213</fid>
                  <filename><![CDATA[HungryHackers_Final_v1.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/HungryHackers_Final_v1_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/HungryHackers_Final_v1_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[H3 Logo]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[h3@gtri.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Student Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>8862</tid>
        <value><![CDATA[Student Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.hungryhungryhackers.org/</url>
      <title></title>
      </link>
          <link>
      <url>http://www.hungryhungryhackers.org/registration.html</url>
      <title></title>
      </link>
          <link>
      <url>http://www.gtisc.gatech.edu/</url>
      <title></title>
      </link>
          <link>
      <url>http://www.gtacm.org/</url>
      <title></title>
      </link>
          <link>
      <url>http://www.gtri.gatech.edu/</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Home]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>10568</tid>
        <value><![CDATA[Georgia Tech Association for Computing Machinery]]></value>
      </item>
          <item>
        <tid>10567</tid>
        <value><![CDATA[Georgia Tech Information Security Center]]></value>
      </item>
          <item>
        <tid>10569</tid>
        <value><![CDATA[Georgia Tech Research Institute Cyber Technology Group]]></value>
      </item>
          <item>
        <tid>10570</tid>
        <value><![CDATA[Hungry Hungry Hackers]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
