CYBER JAWARA is a national cyber security competition which is held online and on-site rounds. The CYBER JAWARA competition consists of Computer Network Defense, Penetration Test, Capture The Flag and Forensic Analysis challenges.
CYBER JAWARA's goal is to raise information security awareness through online cyber security competition.
CYBER JAWARA aims to promote ethical hacking to be accepted, practiced and demonstrated without any discriminations, across all geographic boundaries, for the purpose of understanding what it takes to protect and secure critical information and assets.
1. The Cyber Jawara ™️
The CYBER JAWARA competition was first held in 2012 organized by ID-SIRTII / CC. Since 2020 Cyber Jawara has continued to be held by CSIRT.ID. This competition is held to inspire and encourage the growth of interests, talents, and human resource potential in Cyber Security initiatives in Indonesia. We are grateful that since then similar activities - including other pre-existing Cyber Security Competition series - have begun to receive wider attention and recognition. Therefore, CYBER JAWARA has effectively become a dissemination and awareness medium of general Cyber Security issues.
2.The Cyber Defence ™️
The CYBER JAWARA team was also appointed as the organizer of the Open Source Security Competition at the annual Indonesia Creative Open Source Software (ICROSS) event which is organized by the Indonesian Open Source Association (AOSI). Then, since 2013 along with the Indonesian Information Technology Federation (FTII), a series of Cyber Defense Competitions (CDC) was formed within the TNI to support the cybersecurity program in Ministry of Defense –.
The Elimination Round is an online Jeopardy style of Capture the Flag (CTF). In Jeopardy CTF, the participants will be challenged with a number of security scenarios to look for special data (Flags) that can be obtained by exploiting system vulnerabilities or by looking for important security information details from the prepared data.
Mechanism1. Each question contains a narrative case along with supporting files or addresses of network/web services that must be analyzed from cybersecurity perspective.
This competition is held based on the Capture the Flag standard (https://ctftime.org/).
The ability to monitor, defend, and protect computer network and information systems from any interference or attack attempts.
Ability to quickly analyze and find evidence of an attack.
A Hacking Competition where the participants are free to explore and exploit a network that has been provided by the committee with predetermined objectives. All participants are required to find and exploit network security vulnerabilities so that participants are able to penetrate the target provided by the committee and usually the target is a server.
Ability to find vulnerabilities of a computer system and network.