ABOUT
UFAZ Hackathon is a thematic event during which competitors from various universities work intensively on different projects with the objective of producing solutions in 48 hours. Competitors in this event are groups of three students and each group will be given a unique topic to work on. To increase the competition spirit, topics will be distributed at the start of the Hackathon.
Competition date:
The Hackathon will take place on May 18 and 19, 2024.
Who can join:
Students from any university forming a group of 3.
Why join?
Hackathon
· Discovers talented students
· Encourages students to go further with their ideas
· Inspires students how to exploit their time in a good manner
· Strengthens the spirit of teamwork
· Links students to university through extra-curricular activities
Stakeholders of the Hackathon
* Competitors
* Scientific Committee/Jury: Approve topics and evaluate projects
* Mentors: A group of mentors will guide groups during the competition by discussing and exchanging ideas with each group. The mentors will be passing by groups twice during the Hackathon (see Program)
* Sponsors: Sponsors by funds and/or topics
Rules and Requirements
1. Fundamental Understanding of Cybersecurity Principles:
– Basic knowledge of cybersecurity concepts, including threat modeling, risk assessment, and the CIA triad (Confidentiality, Integrity, Availability).
– Familiarity with common cybersecurity threats and attack vectors, such as phishing, malware, and network attacks.
2. Programming and Scripting Skills:
– Proficiency in at least one programming language (e.g., Python, Java, C++), which is essential for developing tools and simulations.
– Experience with scripting for automation tasks.
3. Knowledge of Mobile Network Security:
– Understanding of network protocols, network architecture, and data flow.
– Familiarity with tools and techniques for network traffic analysis and intrusion detection.
4. Experience with Security Tools and Platforms:
– Experience with vulnerability assessment tools, security scanners, and DAST/SAST tools.
– Familiarity with CI/CD pipelines and integrating security measures into these pipelines.
5. Understanding of Secure Software Development Practices:
– Knowledge of the Software Development Life Cycle (SDLC) and how to integrate security practices into it.
– Experience with dependency scanning and addressing vulnerabilities in third-party libraries.
6. Incident Response and Management Skills:
– Basic understanding of incident response procedures and platforms.
– Skills in digital forensics and analysis for incident investigation.
7. Familiarity with Collaboration and Management Tools:
– Experience with task management systems, particularly in a cybersecurity context.
– Ability to use collaboration platforms efficiently for team-based projects.
8. Understanding of Encryption and Data Security:
– Knowledge of encryption algorithms and secure communication protocols.
– Experience with implementing end-to-end encryption for data transmission.
9. Compliance and Standards Awareness:
– Awareness of international network security standards and compliance requirements.
– Understanding of the importance of audit trails and compliance management in cybersecurity.
10. Soft Skills:
– Problem-solving and critical thinking skills to tackle complex cybersecurity challenges.
– Teamwork and communication skills for effective collaboration in a hackathon environment.
– Have an understanding of basic Agile methodologies (Project Management)
11. Gender Balance
– Teams should contain at least one female and one male participant.
* Only students can compete in the Hackathon
* Submitted work will be removed if:
– Plagiarism is detected
– The deadline for submission is not respected
– The team is trying to get help from other members (competitors or outside)
Evaluation criteria and Types of deliverables
Each team will be evaluated based on:
1. Business evaluation: presentation of project in 5 minutes (in English):
2. Technical evaluation: submitted code and its deployment
Prizes:
3500 AZN
2500 AZN
1500 AZN
DISCIPLINES
Topics
Topics will be given by sponsors.The list of topics will not be given to participants beforehand
Topics will be distributed among teams randomly at the opening session
Information Technology
Cybersecurity
Mobile Network
Timeline
22th of AprilPublish Announcement and Open Registration
6th of MayClose Registration
18th and 19th of May Competition
27th of MayPresentations and Ceremony to announce results
Program
DAY 1
08:00 - 09:00: Arrival of competitors and distribution of badges
09:00 - 09:30: Opening Ceremony - welcome speech and distribution of topics
09:30 - 10:00: Settling each team in their assigned rooms
10:00 - 19:30: 1st round of mentor sessions
11:30 - 12:00: Snack
13:00 - 14:00: Lunch
14:00 - 17:00: Meeting with Azercell HR Team
16:00 - 16:30: Snack
19:30 - 20:30: Dinner
DAY 2
08:30 - 09:30: Breakfast
10:00 - 19:30: 2nd round of mentor sessions
11:00 - 11:30: Snack
13:00 - 14:00: Lunch
14:00 - 17:00 Meeting with Azercell HR Team
16:00 - 16:30: Snack
20:00 Deadline for submission of code & 2-3 minute video explanation in English with screen recording
DAY 3
10:00 - 17:00: Presentations
17:00 - 18:00: Ceremony to announce results
Contacts
- Baku Nizami str 183