Hacking contest seeks to attract women to information security
A security conference in Seoul hosted a hacking event only for women to spur interest in the field
IDG News Service - Computer security conferences tend to be male-dominated affairs. It's not that women aren't present, but just not anywhere near their normal proportional representation in society.
To address the disparity, the Power of Community (POC2012) security conference in Seoul held the final round of a hacking contest on Thursday appropriately called the "Power of XX," a women-only skills battle intended to spur interest in the field and also at a level that wasn't overwhelming.
The competition, also sponsored by the Sookmyung Information Security Study, a club that is part of the computer science department at Sookmyung Women's University's engineering school in Seoul, started with 48 teams. Eight teams made the final round, and they worked throughout the day to solve challenges in areas such as web application attacks, programming, system hacking and cryptography.
The challenges were designed with novices in mind, as usual hacking contests tend to be designed for people that are very active in information security rather than students who are studying general computer science.
The five-member teams, with names such as "Power of MachoGirl" and "Power of Layer23," were laser-focused on their tasks, with perhaps an unhealthy number of snack-food wrappers and plastic soda bottles littering tables. A sign written in Korean with large red letters warned that men were not allowed in the competition area.
There's a perception that women aren't necessarily as good as men when it comes to computer skills, said a 32-year-old male organizer of the contest who goes by the nickname "Monggi." He only knows five women who are in his computer science classes.
The hacking competition changed his perception. "We didn't expect they were very good," Monggi said. "We figured out they are very good."
Su-hee Kang, also a computer science major, said that she has been told by other people that if she were their son or daughter, they would have discouraged her from studying computers. "It's very hard for women," she said.
Another male organizer, Jeong-hoon Shin, said there are distinct difference between how men and woman approach computer science problems. Women, he said, are more detail oriented, work slower and ponder problems, while men tend to rush with less thought -- and perhaps less success.
Jeong-jinn Kang, a woman studying computer science, said, "The most important things are patience, endurance and taking on new challenges."
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cyberwarfare White Papers | Webcasts