Developing Cyber Competition Infrastructure Using the SCRUM Framework

  • Heath Novak
  • Daniel Likarish
  • Erik Moore
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 406)


In March 2012, the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) was hosted at Regis University and attended by seven colleges from the region. CCDC was developed by the University of Texas in San Antonio to provide a structured environment for practical education tied to established information assurance learning objectives in the implementation of security techniques, strategies and processes. The Regis University infrastructure team designed the competition scenario to emulate an e-commerce web business. The pervasiveness of web application attacks resonated with the event developers at Regis University because of recent reported attacks against Valve, Inc. and their Steam video game retail and social networking service. This paper will outline at a high level the event architecture and technical infrastructure details, a discussion on Agile development methodologies (specifically SCRUM) and how they can be applied to competition infrastructure development.


Collegiate Cyber Defense Competition CCDC Cybersecurity Information Assurance Curriculum Agile SCRUM SDLC Capability Maturity Model Integration CMMI 


  1. 1.
    The Agile Manifesto (2012),
  2. 2.
    Brown, C., DeHayes, D., et al.: Methodologies for Custom Software Development. In: Managing Information Technology, 6th edn. Pearson Prentice Hall (2009) ISBN-10: 0-13-178954-6Google Scholar
  3. 3.
    Carlin, A., Manson, D., Zhu, J.: Developing the cyber defenders of tomorrow with regional collegiate cyber defense competitions (CCDC). Information Systems Education Journal 8(14) (2010) ISSN: 1545-679X, (retrieved May 1, 2012)
  4. 4.
    Coyle, S., Conboy, K.: A case study of risk management in agile systems development. In: 17th European Conference on Information Systems (2009),
  5. 5.
    Diaz, J., Garbajosa, J., Calvo-Manzano, J.A.: Mapping CMMI level 2 to scrum practices: An experience report. In: O’Connor, R.V., Baddoo, N., Cuadrago Gallego, J., Rejas Muslera, R., Smolander, K., Messnarz, R. (eds.) EuroSPI 2009. CCIS, vol. 42, pp. 93–104. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  6. 6.
    Poeter, D.: Valve’s steam forums hacked, not clear if credit card number were stolen. PC Magazine, (2011);,2817,2396246,00.asp (retrieved March 10, 2012)
  7. 7.
    Potter, N.: Comparing scrum and cmmi, how they can work together. The Process Group (2010), (retrieved)
  8. 8.
    Pressman, R.: Agile Development. In: Software engineering, a practitioner’s approach, 6th edn., pp. 85–87. McGraw-Hill Series in Computer Science (2005) ISBN: 0-07-285318-2 Google Scholar
  9. 9.
    Schwaber, K., Sutherland, J.: The scrum guide, the definitive guide to scrum: the rules of the game (2011), (retrieved May 12, 2012)
  10. 10.
    White, G., Williams, D.: Collegiate Cyber Defense Competitions. The ISSA Journal (October 2005),,%20Williams%20-%20Collegiate%20Cyber%20Defense%20Competitions.pdf (retrieved April 15, 2012)

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Heath Novak
    • 1
  • Daniel Likarish
    • 1
  • Erik Moore
    • 1
  1. 1.Regis UniversityDenverUSA

Personalised recommendations