Cyber –o– Hack
About Cyber Hackathon 2024
Cyber-o-Hack
In today’s digital age, cybersecurity is more crucial than ever. As technology evolves, so do the threats and vulnerabilities that come with it. Enter the cyber hackathon a dynamic and high-energy event designed to tackle these challenges head-on. Whether you’re a seasoned security professional, an aspiring hacker, or simply a tech enthusiast, a cyber hackathon offers a unique platform to innovate, collaborate, and enhance your skills.
Timeline
Cyber-o-Hack
22nd August 2024
Registration Start
❶
25th August 2024
PPT Submission Starts
❷
16th September 2024
Registration Ends
❸
21st September 2024
Speaker Sessions
❹
21st September 2024
Hackathon Final Presentations
❺
21st September 2024
Winner Announcement & Award Ceremony
➏
PROBLEM STATEMENTS
Speech analytics tools are designed to analyze and interpret spoken language. They can be used in various applications such as customer service, healthcare, and market research.
OSINT (Open Source Intelligence) tools are used to gather and analyze publicly available information to support various types of investigations and research.
Network security tools are essential for protecting networks from various threats, managing security risks, and ensuring the integrity and availability of network resources. These tools can range from firewalls and intrusion detection systems to more advanced solutions for threat intelligence and network monitoring.
Internet of Things (IoT) tools are designed to help manage, monitor, and secure IoT devices and networks. These tools are used across various industries, including smart homes, industrial automation, healthcare, and transportation.
IP address analysis tools help identify, analyze, and manage IP addresses for various purposes, including network troubleshooting, security monitoring, and geographical analysis. These tools can provide information about IP address ownership, geographical location, network performance, and potential security threats
Image and video analysis tools are used to process and interpret visual data
Cryptocurrency investigation tools are designed to analyze and track transactions and activities within the cryptocurrency space
Virtual numbers analysis tools are designed to track, analyze, and manage virtual phone numbers, which are often used for purposes like online verification, marketing campaigns, and privacy protection. These tools help users understand and manage virtual number usage, detect fraud, and ensure compliance with regulations.
Mobile security tools are designed to protect mobile devices (smartphones and tablets) from various threats, including malware, unauthorized access, and data breaches. These tools help manage and secure mobile applications, data, and communications.
Chat messenger decryption tools are specialized applications designed to decrypt and analyze encrypted messages from chat platforms.
Women’s safety tools are designed to enhance personal security and provide assistance in dangerous or threatening situations. These tools can be apps, devices, or services that offer features such as emergency alerts, location tracking, and safety monitoring.
Any other innovative development
Agenda for Presentation
Introduction
Introduction the team members and their roles.
Problem statement
Clearly define the problem statement and its significance and also highlight the challenges encountered during the task.
Methodology
Explain the pre - processing steps.
Result
Present the experimental result from the developed solution.
Result
Present the experimental result from the developed solution.
Demo
Demonstrate the functionality of developed software.
Guidelines
CONTEST RULES
Introduction
The Cyber Hackathon is a skill contest. It consists of two rounds, a preliminary PPT submission round starts from 25th August 2024, followed by declaration of selected teams by the end of 17th September 2024 for the final round, scheduled on 21.09.2024 from 9:00 Am to 5:00 Pm
18 years or above
Citizen of India
Verified government ID or
Verified college ID or institute/organisation.
The participation in the event will be in the form of a single- member (individual) team or a group consisting up to a maximum of 5 members. They will be termed as “Team”. The terms and conditions will be agreed as a team and not liable to discretion of acceptance of every individual in the team. If any member violates the term & condition or goes against the interest of hackathon for any illegal or malafide activity, the team will be disqualified.
Any individual who violates the eligibility criteria stated will automatically be disqualified along with all team members he/she is in association with. Also, he/she must meet the eligibility criteria for participating in the event.
Nomination For The Main Event
The selected teams will be invited for the final event scheduled on 21.09.2024 from 9:00 Am to 5:00 Pm. The constitution of the team selected for the main event will not change and will have the same membership as the preliminary round.
Each eligible entry will be evaluated by a jury panel
Relevancy
Novelty of concept, and
Practicality, feasibility and sustainability.
The declaration of the winner based on the above criteria will be a matter of pure discretion of the panel and not open to questioning or scrutiny. The winner will be declared on 21.09.2024 as per the timeframe of the committee.
The top three teams will be awarded motivational prizes along with a certificate of excellence for all the participants of the main event. The reward will be given to the participants directly by the sponsors. (*The amount will be disclosed soon)
By entering the contest, participants will represent and warrant that their eligible entries are their original work. Each participant agrees that any outside data, tools, materials, or information were used with permission, or in accordance with all applicable laws for the purpose of entering the contest. Each participant agrees not to submit any entry that infringes any third-party proprietary rights, intellectual property rights, industrial property rights, personal or moral rights or any other rights, including without limitations, copyright, trademark, patent, trade secret, privacy, publicity, confidentiality obligations.
Participants agree that the personal data entered during the registration & otherwise in connection with the contest has been filled with their own consent.
You shall not disclose or release to the third party any information you receive and relating to the Hackathon which is not publicly available information, including all materials you receive and discussions(whether verbal or written) during the Hackathon and information relating to the Applications, details of the Applications developed and produced by you, your team or by other participants or other team during the Hackathon, any other confidential information you may have received from other participants during the Hackathon, and feedback provided by the Organizer and any Intellectual Property presented, developed and produced during the duration of the Hackathon. This ‘Confidentiality’ clause shall survive the cancellation, end/expiration or termination of the Hackathon.