{"id":93,"date":"2014-03-09T16:53:10","date_gmt":"2014-03-09T16:53:10","guid":{"rendered":"http:\/\/cyberdefenseresearch.com\/michiganccdn\/?page_id=93"},"modified":"2020-03-07T12:09:37","modified_gmt":"2020-03-07T12:09:37","slug":"staff","status":"publish","type":"page","link":"https:\/\/michiganccdn.com\/?page_id=93","title":{"rendered":"Teams"},"content":{"rendered":"<p style=\"text-align: left;\">For over 14 years the Michigan Collegiate Cyber Defense Network has been providing industry sponsored and executed cyber defensive events.\u00a0 These events have led Michigan college teams to a new level in academic expectations.\u00a0 Each year a state qualifier and assessment is conducted by industry personnel from various organizations.\u00a0 The objective is to find the highest qualified student academic team, with the best prepared industry candidates.\u00a0 As the intensity and number of academic institutions have increased over the years, so have the skills required to participate, resulting in raising the bar of academic programs across the state as well.\u00a0 The product of this entire process is some of the highest quality graduates in the field of cyber defense.\u00a0 Participants in these events are categorized into teams.\u00a0 They include:<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Orange.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-417 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Orange-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Orange-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Orange.png 760w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><strong>Design and Integration Team<\/strong><\/h3>\n<p>This team is responsible for the pre-planning phase of the event.\u00a0 They determine the intensity of all activities before the event begins.\u00a0 They are responsible for determining the network topology while taking into account everything from equipment availability and integration, operating system configuration and build, scheduling, type and deployment of adverse event implementation, creation of the service inject pool that will be issued to blue team members, delivery environment, and the method of electronic service monitoring and scoring.\u00a0 The design and integration team are network engineers and security experts with extensive experience.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Compliance.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-424 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Compliance-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Compliance-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Compliance-768x749.png 768w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Compliance.png 770w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\">Chief Judge<\/h3>\n<p>The chief judge is an industry expert in networking and security and is responsible for overseeing equitable distribution of all activities, including the verification and validation of the final results of all score tallies and reports.\u00a0 The chief judge may serve in the role of competition director during the event.<\/p>\n<hr \/>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-425 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin2-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin2-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin2-768x749.png 768w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin2.png 770w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/h3>\n<h3 style=\"text-align: center;\"><strong>Administration Team<\/strong><\/h3>\n<p>The Administration Team operates the execution phase of all activities. These are industry professionals who conduct the real-time operations of event activities, including electronic monitoring and scoring.\u00a0 Positions within the administration team include the competition director, assistant director, and the chief judge.<\/p>\n<hr \/>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Chief.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-423 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Chief-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Chief-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Chief-768x749.png 768w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Chief.png 770w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/h3>\n<h3 style=\"text-align: center;\"><strong>Compliance Monitor<\/strong><\/h3>\n<p>The compliance monitor serves only in the role during the event as certifying all the rules of the event have been followed and the equality of events have been consistent as possible.\u00a0 The compliance monitor cannot serve in a scoring or judging role but can rule on the validity and integrity of a decision that may come into question.<\/p>\n<hr \/>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/White.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-419 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/White-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/White-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/White-768x749.png 768w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/White.png 770w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/h3>\n<h3 style=\"text-align: center;\"><strong>White Team<\/strong><\/h3>\n<p>This team is the backbone of the execution phase of the event.\u00a0 They are industry experts that serve in the roles of network and security engineers and are responsible for serving as service score compilers, network support, and operate the electronic service monitoring and scoring systems.\u00a0 They keep the event running.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Red.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-418 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Red-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Red-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Red.png 760w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><strong>Red Team<\/strong><\/h3>\n<p>Members of the red team are industry experts whose sole purpose is to assess each blue team network for vulnerabilities and compromise those networks wherever and whenever they can.\u00a0 This team is located both on-site and in remote locations.\u00a0 They use commonly used penetration tools and techniques as well as those of their own specially crafted design.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><strong><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Blue.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-416 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Blue-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Blue-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Blue.png 760w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/p>\n<h3 style=\"text-align: center;\"><strong>Blue Te<\/strong><strong>am(s)<\/strong><\/h3>\n<p>These are the students who represent various academic institutions competing in the cyber defense qualifier and assessment activities.\u00a0 Their roles are to defend their networks against cyber attack while maintaining services, monitoring network traffic, responding to administration team required service and network changes, incident response and identifying the difference between production and malicious traffic or events.\u00a0 They are enrolled into a networking or cyber security program and represent their academic institution.\u00a0 There are up to eight active blue team members.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><strong><a href=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-415 size-medium\" src=\"http:\/\/www.michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin-300x293.png\" alt=\"\" width=\"300\" height=\"293\" srcset=\"https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin-300x293.png 300w, https:\/\/michiganccdn.com\/wp-content\/uploads\/2014\/03\/Admin.png 760w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/p>\n<h3 style=\"text-align: center;\"><strong>Green Team<\/strong><\/h3>\n<p>Green team members are those who provide support to all the other teams by delivering equipment, act as runners and registration assistants.\u00a0 These may be industry personnel or students of the hosting institution.<\/p>\n<hr \/>\n<p>Some of our cyber defense qualifier events have benefited from presentations from various organizations including the Turkish National Police, the USSS, FBI, State of Michigan Department of Technology, Brazilian security firm, and the Cyber Security Forum Initiative, as well as other local and state companies, organizations and academic institutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For over 14 years the Michigan Collegiate Cyber Defense Network has been providing industry sponsored and executed cyber defensive events.\u00a0 These events have led Michigan college teams to a new level in academic expectations.\u00a0 Each year a state qualifier and assessment is conducted by industry personnel from various organizations.\u00a0 The objective is to find the<br \/><a class=\"moretag\" href=\"https:\/\/michiganccdn.com\/?page_id=93\">+ Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":324,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-93","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/michiganccdn.com\/index.php?rest_route=\/wp\/v2\/pages\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/michiganccdn.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/michiganccdn.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/michiganccdn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michiganccdn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=93"}],"version-history":[{"count":0,"href":"https:\/\/michiganccdn.com\/index.php?rest_route=\/wp\/v2\/pages\/93\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/michiganccdn.com\/index.php?rest_route=\/wp\/v2\/pages\/324"}],"wp:attachment":[{"href":"https:\/\/michiganccdn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}