Skip to content

Latest commit

 

History

History
35 lines (18 loc) · 1.24 KB

security.md

File metadata and controls

35 lines (18 loc) · 1.24 KB

Though evaluation would be done based on contribution made by candidates in respective domain, here are Some of the evaluation paramenters for security hackathon.

Cyber Security 🛡

  • Completeness of submission

  • Quality of submitted solution

  • Understanding of the problem

  • Extra points:

    Innovative approach towards the solution

    Going extra mile to build PoC for exploit

    Build wireframe or flow to further explain the solution/hack

    Finding valid unknown 0day vulnerabilities which wasn't part of the CTF

    Documentation, Robust Design and architectural knowledge

    Deployment and Live Demo

Raw Evaluation Understanding for Safety of Docker containers in Cloud, Splunk SIEM, VA/PT and overall Cybersecurity events.

I. Candidates would submit their research and findings on three of the domains on HackerEarth platform.

II. Once the event is over, subject-matter expert will evaluate each of the candidate's submission given on domains.

III. As an outcome, we would get efficiency of each candidate on each of the domain and cumulative ranking on how good they're with respective domains.

For example, Say candidate Alice has 70% in Slunk, Bob scored 50% on VA/PT and Mallory scored 90% on Cloud.