SOLICITATION NOTICE
B -- The required penetration testing and vulnerability assessment tool will be mainly deployed by Red Team students to search for vulnerabilities and avenues of attack for gaining access to the Blue Team
- Notice Date
- 8/31/2012
- Notice Type
- Combined Synopsis/Solicitation
- NAICS
- 511210
— Software Publishers
- Contracting Office
- N62271 Naval Postgraduate School 1 University Circle Monterey, CA
- ZIP Code
- 00000
- Solicitation Number
- N6227112Q2067
- Response Due
- 9/11/2012
- Archive Date
- 9/26/2012
- Point of Contact
- NPS CONTRACTS OFFICE 831-656-2034 JENNIFER LEE
- E-Mail Address
-
6-2034<br
- Small Business Set-Aside
- N/A
- Description
- The Naval Postgraduate School (NSP) has developed a new course, CY4710, which explores the development of cyber-orientated war games and exercises from the perspective of maintaining a high state of readiness in the face of state-sponsored cyber attacks and hostile action. Students will develop a strategy for defending and operating their networks while responding to hostile activities. Emphasis is placed on risk assessment, employment of forces and assets, early detection of threats and maintaining services in an increasingly degraded environment. CY4710 specifically emphasizes the role of the attackers in the scenarios. This course is in support of the Cyber Academic Group (CAG), which is the locus of synergistic cyber education and research at NPS. CAG ™s objective is to enable our students, including military officers, U.S Government civilians and enlisted personnel, to understand both how to defend our networks from penetration and to employ cyber capabilities to ensure an advantage in future operations. The Cyber Battle Lab (CBL), home to our semi-annual Cyber Wargames, is a facility for interdisciplinary cyber education and research ranging from high-level strategy to machine-level reverse engineering. This tool will be placed inside of said CBL for Red and Blue team use during the exercises. Scope: The chosen tool will be used by students to assess and gain entry into a network established by other students. This network will include no less then 20 hosts (up to 500 hosts) that will be composed of a variety of operating systems (Windows, Linux, Macintosh, Sun, switches, firewalls, etc ¦) at varying level of patching (some completely current while others may be not fully patched). All hosts will be placed into a private address space (192.168.0.0/16, 10.0.0.0/8, 172.16.0.0 “ 172.31.0.0/16) and the entire address spaces listed must be able to be scanned and exploited with the given tool. Tool must include some form of 0-day (unpublished) exploit with 0-day refreshes via updates. See attached RFQ for requirement and capability needs
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/notices/24767a5cf4a126dc49593229b130660d)
- Record
- SN02863858-W 20120902/120831235109-24767a5cf4a126dc49593229b130660d (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |