Abstract
In March 2012, the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) was hosted at Regis University and attended by seven colleges from the region. CCDC was developed by the University of Texas in San Antonio to provide a structured environment for practical education tied to established information assurance learning objectives in the implementation of security techniques, strategies and processes. The Regis University infrastructure team designed the competition scenario to emulate an e-commerce web business. The pervasiveness of web application attacks resonated with the event developers at Regis University because of recent reported attacks against Valve, Inc. and their Steam video game retail and social networking service. This paper will outline at a high level the event architecture and technical infrastructure details, a discussion on Agile development methodologies (specifically SCRUM) and how they can be applied to competition infrastructure development.
Chapter PDF
References
The Agile Manifesto (2012), http://www.agilemanifesto.org
Brown, C., DeHayes, D., et al.: Methodologies for Custom Software Development. In: Managing Information Technology, 6th edn. Pearson Prentice Hall (2009) ISBN-10: 0-13-178954-6
Carlin, A., Manson, D., Zhu, J.: Developing the cyber defenders of tomorrow with regional collegiate cyber defense competitions (CCDC). Information Systems Education Journal 8(14) (2010) ISSN: 1545-679X, http://isedj.org/8/14/ISEDJ.814.Carlin.pdf (retrieved May 1, 2012)
Coyle, S., Conboy, K.: A case study of risk management in agile systems development. In: 17th European Conference on Information Systems (2009), http://www.ecis2009.it/papers/ecis2009-0642.pdf
Diaz, J., Garbajosa, J., Calvo-Manzano, J.A.: Mapping CMMI level 2 to scrum practices: An experience report. In: O’Connor, R.V., Baddoo, N., Cuadrago Gallego, J., Rejas Muslera, R., Smolander, K., Messnarz, R. (eds.) EuroSPI 2009. CCIS, vol. 42, pp. 93–104. Springer, Heidelberg (2009)
Poeter, D.: Valve’s steam forums hacked, not clear if credit card number were stolen. PC Magazine, PCMag.com. (2011); http://www.pcmag.com/article2/0,2817,2396246,00.asp (retrieved March 10, 2012)
Potter, N.: Comparing scrum and cmmi, how they can work together. The Process Group (2010), www.dfw-asee.org/archive/scrum-cmmi-v1p6-45mins.pdf (retrieved)
Pressman, R.: Agile Development. In: Software engineering, a practitioner’s approach, 6th edn., pp. 85–87. McGraw-Hill Series in Computer Science (2005) ISBN: 0-07-285318-2
Schwaber, K., Sutherland, J.: The scrum guide, the definitive guide to scrum: the rules of the game (2011), http://www.scrum.org/storage/scrumguides/SCRUM_Guide.pdf (retrieved May 12, 2012)
White, G., Williams, D.: Collegiate Cyber Defense Competitions. The ISSA Journal (October 2005), https://www.issa.org/Library/Journals/2005/October/White,%20Williams%20-%20Collegiate%20Cyber%20Defense%20Competitions.pdf (retrieved April 15, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Novak, H., Likarish, D., Moore, E. (2013). Developing Cyber Competition Infrastructure Using the SCRUM Framework. In: Dodge, R.C., Futcher, L. (eds) Information Assurance and Security Education and Training. WISE WISE WISE 2013 2011 2009. IFIP Advances in Information and Communication Technology, vol 406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39377-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-39377-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39376-1
Online ISBN: 978-3-642-39377-8
eBook Packages: Computer ScienceComputer Science (R0)