Ira Winkler: Facebook is giving hacking a good name again
Its Hacker Cup celebrates creative computer talent instead of rewarding the destroyers
Computerworld - Whenever I see another "cyberchallenge" getting play in the press, I think our priorities are screwed up.
People seem to think that organizing teams of people to hack into systems is a way to bring together the best computer talent to square off against each other. I look at it as a waste of that talent. Maybe the press wouldn't be as interested, but I believe we all would be better served by competitions over who can better secure a nonprofit organization, who can develop a better fundraising database or who can teach underprivileged children math or programming better. Cyberchallenges are about who can destroy things most effectively. Doesn't it make sense to challenge young hackers to create something that can provide true value?
That's why I was excited to read about Facebook's latest Hacker Cup. This contest has become one of the few tests of creative computer talent. To quote the IDG News Service's report on the Hacker Cup: "The contest consists of successive sets of increasingly difficult algorithmic problems. Scoring will be based on how accurately and quickly the programmers complete the puzzles. Last year's contest featured challenges such as determining the optimum number of shield generators and warriors one should acquire for the Facebook game Starcraft II and calculating the best race car driving strategy given a variable number of opponents, race track curves and likelihood of crashing."
In other words, it's all about being creative, not destructive. Unfortunately, we often seem to highlight the people who destroy more than those who create.
For example, the National Security Agency is awarding scholarships based on cyberchallenges. This is muddied thinking. The NSA would get far more benefit if it awarded scholarships based on good, creative programming. By rewarding the forces of destruction, the NSA is sending a message. Is it one we want to send to the nation's young hackers?
Meanwhile, the media effectively lionize groups like Anonymous by breathlessly reporting on their latest hacks. But these hacks are really little more than random attacks that take advantage of vulnerabilities. The better story is admittedly much harder to cover, involving the IT staffs at hundreds of companies who create secure architectures and who, though subjected to hundreds, if not thousands, of attacks a day, repel them successfully.
For example, we don't hear about the talent it took to create our telecommunications infrastructure. We take for granted how seamless our communications have become. At this point, the Star Trek communicator seems outdated. Not only can we talk to people by saying their name, but we can also use our phones to text, download videos, run applications and buy a frappuccino from Starbuck's.
More by Ira Winkler
- Ira Winkler: My run-in with the Syrian Electronic Army
- A simple cure for the cybersecurity skills shortage
- Ira Winkler: 6 failures that led to Target hack
- Ira Winkler: The RSA Conference boycott is nonsense
- Electronic privacy? There's no such thing
- Guys, stop creeping out women at tech events
- Ira Winkler: Stupid users, or stupid infosec?
- We're missing out on the value of security awareness
- Are your security professionals qualified?
- Ira Winkler: Press falls short in reporting on chip hack
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!