

{"id":28,"date":"2020-03-02T16:39:18","date_gmt":"2020-03-02T21:39:18","guid":{"rendered":"https:\/\/sites.temple.edu\/socialengineering\/?page_id=28"},"modified":"2026-02-26T06:44:50","modified_gmt":"2026-02-26T11:44:50","slug":"home","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/socialengineering\/","title":{"rendered":"Social Engineering Competition"},"content":{"rendered":"<h2><strong>What is the Social Engineering Competition (SEC) all about?<\/strong><\/h2>\n<p>The SEC allows students to compete in a <em>purely<\/em> social engineering experience that is grounded in the social sciences. The competition offers a timely and unique platform for students to learn about social engineering in a hands-on, engaging, and ethical manner. The competition has a different theme each year to demonstrate the relevance of social engineering across various cybersecurity areas, and is open to high school, undergraduate, and graduate students.<\/p>\n<p data-start=\"1056\" data-end=\"1216\">The SEC is a nationally recognized, prevention-focused cybersecurity initiative examining the human dimensions of cybercrime.\u00a0The SEC is featured by the <a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a> as part of its <a href=\"https:\/\/niccs.cisa.gov\/resources\/cybersecurity-competitions-games\" target=\"_blank\" rel=\"noopener\">national repository of cybersecurity competitions and games<\/a>, and has been highlighted through the <a href=\"https:\/\/www.caecommunity.org\/cop-cyber-defense\/cae-cd-meet-your-cyber-comp-inititiative\" target=\"_blank\" rel=\"noopener\">CAE Community\u2019s <em data-start=\"1435\" data-end=\"1464\">Meet Your Cyber Competition<\/em> initiative<\/a> as a model for experiential learning, workforce development, and cybercrime prevention.<\/p>\n<h3><strong>Competition <\/strong><strong data-start=\"1075\" data-end=\"1109\">by the Numbers (2020\u20132026)<\/strong><\/h3>\n<p>\ud83c\udf93 <strong data-start=\"1121\" data-end=\"1147\">657 total participants<\/strong><\/p>\n<ul>\n<li data-start=\"1118\" data-end=\"1370\"><strong data-start=\"1155\" data-end=\"1182\">117 high school students<\/strong><\/li>\n<li data-start=\"1118\" data-end=\"1370\"><strong data-start=\"1190\" data-end=\"1220\">459 undergraduate students<\/strong><\/li>\n<li data-start=\"1118\" data-end=\"1370\"><strong data-start=\"1228\" data-end=\"1252\">81 graduate students<\/strong><\/li>\n<\/ul>\n<h3 data-start=\"644\" data-end=\"1050\"><strong>Origins and Mission<\/strong><\/h3>\n<p data-start=\"644\" data-end=\"1050\">The Social Engineering Competition was originally developed as part of an <strong data-start=\"718\" data-end=\"787\">NSF-funded education and outreach initiative (<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2032292&amp;HistoricalAwards=false\" target=\"_blank\" rel=\"noopener\">NSF Award #2032292<\/a>)<\/strong> focused on <a href=\"https:\/\/www.nsf.gov\/od\/broadeningparticipation\/bp.jsp\" target=\"_blank\" rel=\"noopener\">broadening participation in cybersecurity education<\/a>. Grounded in NSF\u2019s strategic priorities around workforce development, the competition was designed to engage students from a variety of disciplinary backgrounds, experience levels, and institutions.<\/p>\n<p data-start=\"1057\" data-end=\"1618\">Following the conclusion of the NSF funding period (January 31, 2026), the competition will continue as a standalone, fully virtual event. It operates with institutional authorization and oversight (including risk management, legal review, and ethics processes) and is informed by guidance from an <a href=\"https:\/\/sites.temple.edu\/socialengineering\/advisory-board\/\" target=\"_blank\" rel=\"noopener\"><strong data-start=\"1357\" data-end=\"1417\">external advisory board of academic and industry experts<\/strong><\/a>. While no longer NSF-funded, the competition remains committed to its founding mission by staying free to participate, globally accessible, and open to students across a variety academic disciplines and levels.<\/p>\n<h2><a href=\"https:\/\/sites.temple.edu\/socialengineering\/theme\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff0000\"><strong>The theme for the 2026 competition is &#8220;AI-Enhanced Social Engineering Attacks on a Community-Based Pharmacy&#8221;.\u00a0<\/strong><\/span><\/a><\/h2>\n<h2><\/h2>\n<h2><span style=\"color: #ff0000\"><strong>We are no longer accepting team applications for the 2026 SE Competition.<\/strong><\/span><\/h2>\n<p><strong>Team registration dates:<\/strong><br \/>\nDecember 1, 2025 &#8211; February 9, 2026 (12pm ET)<\/p>\n<ul>\n<li>Code of conduct forms (team members and advisors)<\/li>\n<li>Media consent waivers (team members)<\/li>\n<li>Parental consent for participation of minors (for team members under 18)<\/li>\n<\/ul>\n<p><strong>Notification:<\/strong> February 20, 2026<\/p>\n<p><strong>Pre-event surveys:<\/strong> February 20 &#8211; March 11, 2026<\/p>\n<p><strong>Orientation session (5-6 hours):<\/strong> March 21, 2026 (11am-5pm ET)<\/p>\n<p><strong>Competition dates:<\/strong><br \/>\nApril 10-12, 2026: Graduate<br \/>\nApril 17-19, 2026: Undergraduate<br \/>\nApril 24-26, 2026: High school<\/p>\n<p><strong>Closing ceremony:<\/strong> April 30, 2026 (Time TBD)<\/p>\n<p><strong>What is social engineering?<\/strong><\/p>\n<p>Social engineering (SE) is defined as any act that uses persuasion strategies to influence individuals to take an action that may or may not be in their best interests. Many people use social engineering in everyday contexts.<\/p>\n<p><strong>Why is social engineering relevant?<\/strong><\/p>\n<p>SE is often used to conduct reconnaissance, which is the first stage of a cyberattack. Previous research indicates that adversaries, such as nation states and organized crime groups, spend a good portion of their time (50-75%) on reconnaissance. Furthermore, SE is used beyond just the initial recon stage to get more\/different types of information and access.<\/p>\n<p>SE may also be used maliciously by &#8220;deceiving an individual into revealing sensitive information (passwords), obtaining unauthorized access (to restricted areas such as server rooms), or committing fraud (deception via phishing) by associating with the individual to gain confidence and trust&#8221;, <a id=\"term-def-src-link-4-0\" href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-63-3\" target=\"_blank\" rel=\"noopener noreferrer\">National Institute of Standards and Technology (NIST SP 800-63-3).<\/a><\/p>\n<p>Nearly 70% of US organizations experienced SE attacks in 2017, costing the country approximately $2.76 million and each instance taking approximately 20 days to resolve. The Federal Bureau of Investigation\u2019s 2019 Internet Crime Report noted that the total financial loss from the SE tactics of business email compromise, phishing scams, and confidence fraud\/romance scams totaled more than $2.23 billion.<\/p>\n<p>Cybersecurity experts agree that the human factor is increasingly being leveraged in cyberattacks, making SE a major concern for cybersecurity.<\/p>\n<p><strong>So why a &#8216;pure&#8217; social engineering competition?<\/strong><\/p>\n<p>There are MANY cybersecurity competitions already in existence (PicoCTF, PlaidCTF, CSAW, UCSB iCTF, US Cyber Challenge, Panoply, CPTC, CCDC, CyberPatriot, Cyber Academy, to name a few). While these are all excellent sources of hands-on training, they are primarily technical in nature and have specific focus areas, such as reverse engineering, hacking, cryptography, and exploitation. They do not emphasize the relevance of the human-socio-psychological aspects of cyberattacks and cybersecurity.<\/p>\n<p>Given that the human factor is increasingly being exploited by cybercriminals, a pure SE competition grounded in the social sciences offers a timely and unique platform for students to learn about this topic in a hands-on, engaging, and <span style=\"text-decoration: underline\">ethical<\/span> manner.<\/p>\n<p><strong>Who can participate?<\/strong><\/p>\n<p>This event is open to high school, undergraduate, and graduate students. Teams are required (solo entries are not permitted). Team sizes can range from 2-4 members. Members can be from different institutions (schools\/colleges), but must be at the same educational level (ex: purely high school students).<\/p>\n<p><strong>When and how can we put our application in?<\/strong><\/p>\n<p>The application window changes year to year &#8211; so please check our website for the latest updates!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1640\" src=\"https:\/\/sites.temple.edu\/socialengineering\/files\/2026\/02\/CLA_CARELab_Red_Black_Horiz.png\" alt=\"\" width=\"4400\" height=\"684\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the Social Engineering Competition (SEC) all about? The SEC allows students to compete in a purely social engineering experience that is grounded in&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/socialengineering\/\">Continue reading<span class=\"screen-reader-text\">Social Engineering Competition<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":66,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":2953,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/28\/revisions\/2953"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}