Location:Home > Product Center >Detection of defensive >

ISCS


       Green alliance Information Security and defense competitive platform Information Security Competition System (ISCS), is a contestant, network Security theory knowledge and practical problems handling capacity of Competition.


       Information security and defense competitive platform of information security theory and knowledge, through group theory, personal fight, fight closely integrated and capture the flag four competitions, to facilitate rapid forming and implement information security against the skills of actual combat game.

       Platform aims to improve information security awareness, popularize knowledge of information security; Practice of information security technology, create information security environment; Find information security personnel.

Product Detail


advantage


? security research offensive and defensive advantage With green alliance science and technology in the security industry for many years well-known defense research experience and the ability of emergency response, the topic content more offensive and defensive combat characteristic, more difficult.

Free range, network attack and defense can be designed by the user and defense each link, a single match can through multiple levels in any combination, can let users have multiple defense entrance, a variety of offensive and defensive route choice, let their users really involved in the real competitive game.

Easy, offensive and defensive isolation security Offensive and defensive platform and the platform, teachers through the console can be opened various experimental environment for students, students can in the experimental environment for a variety of computer and network security defense. Convenient to restore to the original state, waiting for the next batch experiments, reduce the teacher workload management.



architecture

In the main operating system on different virtual servers, virtual each application layer in the experimental program is running in the independent software environment, start many safety experiments at the same time, the use of system resources utilization, improve equipment performance.

Information security competition platform provides a drone virtualization template customization capabilities, and provide the host system, WEB application, user, business application system level vulnerabilities virtualization template. Scheduling system provides monitoring platform drone template, according to different actual combat mission issued for automatic scheduling drone virtualization template function.





The core technology



Cloud laboratory techniques

Through a variety of means, such as virtual machine technology, but on the ISCS for remote participants to provide a complete set of offensive and defensive drills environment, remote participants completed only through a web browser can convenient remote all security defense experiments, the actual network running environment or equipment will not cause any harm.


Attack-defense environment experiment technology

About a suppositional environment needed for the test all components, including tools, running environment, main service program, non-public technical documentation such as through the experiment of encryption technology to form a complete package, can be easily managed and load. Using experimental package snapshot technology teachers can facilitate the students' test score.


Virtualization technology

In the main operating system on different virtual servers, virtual each application layer in the experimental program is running in the independent software environment, start many safety experiments at the same time, the use of system resources utilization, improve equipment performance.



Show