Callout to cybersecurity experts, coders, designers and even coaches/mentors! Let’s meet on March 8-9, 2019 for 24hrs of coding (

GovSat/SES, in collaboration with SECURITYMADEIN.LU, are proud to announce that this year – and for the first time – there will be a challenge related to cybersecurity and space.
Information security is of everybody’s concern and we bet yours too, so are you willing to take this challenge and try to revolutionize satellite and or cybersecurity industries? Here is the plot:

For the 2019 edition of Game of Code, GovSat and SES have developed a fictive use case of an imaginary company called ACME Sat. ACME Sat is satcom provider that offers managed satcom services to customers worldwide and is committed to provide best in class secure satellite communications therefore cyber security is one of their top priorities. In their continuous effort to enhance information security, they have setup the following challenge to coders and cyber security enthusiasts.

Your role
You will act as strategic advisor and integrator for the information security department of ACME Sat.

Your mission
Assess today’s satellite communication principles, especially in the information security context, and design and implement a solution that brings improvements to this ecosystem. Focusing on all components of satellite delivered services: cyber security, access control in unmanned locations, social engineering etc. is what ACME Sat is mostly interested.

The environment
Consider a classical satellite communication ecosystem which includes end-users as systems but most importantly as humans, satellite terminals (antennas), radio-frequency links, satellite itself, access to public terrestrial infrastructure and so on.

Your tools
There are no restrictions on technologies, platforms, programming language. You are free to define the scenario, but keep in mind the quality of the proposed scenario will also be evaluated.

We understand is vast, but so are the space and cybersecurity businesses. ACME Sat is just a classical example of a satcom provider so don’t panic, our teams will work alongside with you to shape ideas and guide you through satcom service architecture. In fact, we have some samples/ideas already here, check them out:

  • Sample 1: Service integrity validation using blockchain

Managed satcom services are complex and during their lifetime go through many changes such as: component replacements, satellite capacity upgrades/downgrades, supporting personnel turnover or data hosting migration from local hosting to cloud, just to name a few.

The challenge is to build a software application that uses blockchain for validating the integrity of a managed service throughout its entire lifetime regardless of the changes it might suffer.

Why? ACME Sat wants to help its customers in many ways: raise awareness about service modifications, detect unauthorized changes, verify the sanity of the components replaced or get a history of their service evolution.

  • Sample 2: Social Engineering Awareness

How about building an application/program that displays the digital/internet footprint of an entry (person name, company name, domain name, email address, telephone number etc.) and matches to the other of another entry.

Why? We want to bring awareness on the digital noise we leave behind us while browsing, using apps, social media and try find the source of information for those nasty targeted social engineering activities (e.g. targeted emails, phone calls etc.). We are all annoyed by them, to say the least so let’s turn this pain in a creative business opportunity!!!

  • Sample 3: Access Control System

Build software application that simulates a two-factor authentication access control system. What the application is going to open is a world of opportunities, but for the moment the authentication itself is of interest.

Why? The goal is to raise awareness on authentication systems and build the enhanced security systems of the future. There are some limitations: factors must be different and usage of knowledge factor (memorized passwords, PINs etc.) is not allowed. Would be too mainstream, right? However, there is plenty left to use: possession factor (exp. Token), biometric factor (iris, fingerprint, face), location factor (geolocation during the authentication attempt) or time factor (time of the attempt).