{"id":357,"date":"2022-06-28T16:05:23","date_gmt":"2022-06-28T08:05:23","guid":{"rendered":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/?page_id=357"},"modified":"2022-06-29T16:38:21","modified_gmt":"2022-06-29T08:38:21","slug":"syarat-syarat-pertandingan","status":"publish","type":"page","link":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/syarat-syarat-pertandingan\/","title":{"rendered":"SYARAT-SYARAT PERTANDINGAN"},"content":{"rendered":"<p style=\"padding-left: 240px;\"><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-420\" src=\"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-300x300.jpg\" alt=\"\" width=\"195\" height=\"195\" srcset=\"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-300x300.jpg 300w, https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-150x150.jpg 150w, https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-100x100.jpg 100w, https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-270x270.jpg 270w, https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-192x192.jpg 192w, https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-180x180.jpg 180w, https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers-32x32.jpg 32w, https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-content\/uploads\/2022\/06\/cropped-cropped-Logo-Cyber-Avengers.jpg 512w\" sizes=\"auto, (max-width: 195px) 100vw, 195px\" \/><\/strong><\/p>\n<h2 style=\"text-align: center;\"><strong>Terms &amp; Conditions<\/strong><\/h2>\n<h1>1.\u00a0 Introduction<\/h1>\n<p style=\"padding-left: 40px;\">Institute Latihan Perindustrian (ILP) Kuala Langat is organizing our first cyber security competition event called Capture the flag, The Rise of Cyber Avengers. This event will be held on 13th -14th September 2022. The event is designed and targeted for ILJTM students in search for the top potential network security talents and promoting cyber security culture among young generation. This competition aims at producing and nurturing Malaysian-youth-talents in securing and defending the cyber space.<\/p>\n<h1>2.\u00a0 Organization &amp; Participants<\/h1>\n<h1>2.1. Team<\/h1>\n<p style=\"padding-left: 80px;\">a. A Team shall consist of two (2) participants and accompanied by one (1)\u00a0 Coach.<\/p>\n<p style=\"padding-left: 80px;\">b. Each institute can submit entries without any limit.<\/p>\n<p style=\"padding-left: 80px;\">c. Each team must be officially registered to participate in this competition.<\/p>\n<h1>2.2. Coach<\/h1>\n<p style=\"padding-left: 80px;\">a. Coach must be a staff from the Institute ie. lecture.<\/p>\n<p style=\"padding-left: 80px;\">b. Coach must provide valid staff ID during registration.<\/p>\n<p style=\"padding-left: 80px;\">c. Coach is responsible to handle the team registration and manage the team during\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0competition.<\/p>\n<h1>2.3. Participants<\/h1>\n<p style=\"padding-left: 40px; text-align: left;\">\u00a0 \u00a0 \u00a0 \u00a0 a. Participants must be enrolled under institute (undergraduate).<\/p>\n<p style=\"padding-left: 80px; text-align: left;\">b. Participants must be 25 years old or below.<\/p>\n<p style=\"padding-left: 80px;\">c. Participants need to present valid student ID during registration<\/p>\n<p style=\"padding-left: 80px;\">d. Participants need to appoint one (1) from their team member as Team Leader.<\/p>\n<h1>3.\u00a0 Registrations &amp; Payments<\/h1>\n<p style=\"padding-left: 80px;\">a. Registrations must be made through online at <a href=\"https:\/\/www.ilpkls.gov.my\/cybersecurity\/pendaftaran\/\">https:\/\/www.ilpkls.gov.my\/cybersecurity\/pendaftaran\/<\/a><u><\/u><\/p>\n<p style=\"padding-left: 80px;\">b. Cyber Avengers crew will filter registration submission to ensure that only registered teams\u00a0 \u00a0 \u00a0 \u00a0 from each Institute are accepted for the competition.<\/p>\n<p style=\"padding-left: 80px;\">c. The selected teams will be notified by email to confirm the participation.<\/p>\n<p style=\"padding-left: 80px;\">d. The payment method and bank details will be given to the selected teams by email.<\/p>\n<p style=\"padding-left: 80px;\">e. The selected teams must pay the registration fee, RM150 per team.<\/p>\n<p style=\"padding-left: 80px;\">f. The closing date for the registration is <strong>29<\/strong><strong>th <\/strong><strong>July 2022<\/strong>.<\/p>\n<p style=\"padding-left: 80px;\">g. Payment must be made before or on <strong>5<\/strong><strong>th <\/strong><strong>August 2022<\/strong>.<\/p>\n<p style=\"padding-left: 80px;\">h. The registration will only be accepted after the payment has been received.<\/p>\n<h1>4.\u00a0\u00a0\u00a0 Competition Requirements<\/h1>\n<p style=\"padding-left: 40px;\">Teams must meet the following basic requirements and responsible to bring their OWN Computer\/laptop, hardware and software to participate in the competition. The followings listed the basic item to be prepared:<\/p>\n<p style=\"padding-left: 80px;\">4.1\u00a0 Knowledge and Skill Sets<\/p>\n<p style=\"padding-left: 120px;\">a. Basic Linux\/Windows command and operating systems<\/p>\n<p style=\"padding-left: 120px;\">b. Basic networking knowledge (IP addressing, TCP\/IP, etc)<\/p>\n<p style=\"padding-left: 120px;\">c. Basic knowledge on computer forensics<\/p>\n<p style=\"padding-left: 120px;\">d. Linux &amp; Windows incident response<\/p>\n<p style=\"padding-left: 80px;\">4.2 Hardware<\/p>\n<p style=\"padding-left: 120px;\">a. Each team is allowed to bring maximum three (3) machine.<\/p>\n<p style=\"padding-left: 120px;\">b. The machines must at least meet these requirements:<\/p>\n<p style=\"padding-left: 160px;\">i. Minimum processor Intel i5 64-bit architecture or equivalent<\/p>\n<p style=\"padding-left: 160px;\">ii. Minimum 4GB RAM<\/p>\n<p style=\"padding-left: 160px;\">iii. Minimum 20GB free space<\/p>\n<p style=\"padding-left: 160px;\">iv. RJ45 port or adapter (each team will be provided with 2 cables)<\/p>\n<p style=\"padding-left: 120px;\">c. Each team is required to bring at least one (1) power extension as the organizer only provide one (1) power outlet for each team table.<\/p>\n<h1>5.\u00a0\u00a0\u00a0\u00a0\u00a0 Rules<\/h1>\n<p style=\"padding-left: 120px;\">a. Any attempt of the following list will disqualify the team from the competition :<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Attempt of attacking the competition dashboard<\/li>\n<li>Attempt a DDOS attack while a contest is running<\/li>\n<li>Sharing of flags with another team<\/li>\n<li>Interrupting the competition operation<\/li>\n<li>Hacking, cheating or unfair playing practice \u2013 sabotage, threaten or harass<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 120px;\">b. If there is a tie between teams, the selection of the winner will be based on the shortest\u00a0 \u00a0 \u00a0 duration of completion.<\/p>\n<p style=\"padding-left: 120px;\">c. All participants are required to attend the closing ceremony to receive the certificate of\u00a0 \u00a0 \u00a0 \u00a0participation.<\/p>\n<h1>6.\u00a0\u00a0\u00a0\u00a0\u00a0 Cancellation or postponements<\/h1>\n<p style=\"padding-left: 40px;\"><strong>\u00a0<\/strong>We reserve the rights to cancel or postpone the program due to unforeseen circumstance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Terms &amp; Conditions 1.\u00a0 Introduction Institute Latihan Perindustrian (ILP) Kuala Langat is organizing our first cyber security competition event called Capture [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-357","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/pages\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":28,"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/pages\/357\/revisions"}],"predecessor-version":[{"id":522,"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/pages\/357\/revisions\/522"}],"wp:attachment":[{"href":"https:\/\/www.ilpkls.gov.my\/cybersecurity\/wp-json\/wp\/v2\/media?parent=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}