Frequently Asked Questions

Common Questions

Who is eligible to participate in the Uzbekistan national selection?

All students currently enrolled in educational institutions in Uzbekistan are eligible to participate in the selection process. There are no age restrictions for the national selection rounds, as long as you are a registered student at the time of participation.

What is the ICO (International Cybersecurity Olympiad)?

The International Cybersecurity Olympiad (ICO) is a premier global competition that brings together the world's most talented young cybersecurity professionals. ICO challenges participants in various cybersecurity domains through Capture The Flag (CTF) competitions, including both Attack-style and Defence-style formats. The 2026 edition will be held in Sydney, Australia from June 27 to July 2, 2026.

How many rounds are in the national selection process?

The Uzbekistan national selection consists of 4 rounds: Round 1 (National Online Qualification, open to all eligible students), Round 2 (Online Advanced Round, top 50 participants), Round 3 (Offline Proctored Round, top 15 participants), and Round 4 (Offline Interviews, selecting the final 5 team members from the top 15 candidates).

What are the dates for each selection round?

Round 1: February 1-2, 2026 (National Online Qualification). Round 2: March 1-2, 2026 (Online Advanced Round). Round 3: April 1-2, 2026 (Offline Proctored Round). Round 4: May 1-2, 2026 (Offline Interviews). All dates are subject to change, and participants will be notified of any updates through official channels.

What topics and domains are covered in the competition?

The competition covers multiple cybersecurity domains including: Cryptography (encryption, decryption, cryptanalysis), Web Security (vulnerabilities, SQL injection, XSS, authentication bypass), Digital Forensics (file analysis, memory dumps, network packet analysis), Binary Exploitation (buffer overflows, ROP chains, format string vulnerabilities), and Reverse Engineering (binary analysis, malware analysis, code decompilation). The competition uses CTF (Capture The Flag) format with both Attack-style and Defence-style challenges.

What is the difference between Attack-style and Defence-style CTF?

In Attack-style CTF, participants solve individual challenges across different categories (Jeopardy-style) to find flags and earn points. Defence-style CTF involves teams receiving identical server environments with vulnerabilities - teams must exploit other teams' servers to capture flags while defending their own systems. This format emphasizes both offensive skills and defensive strategies, requiring teamwork and quick decision-making.

Is there a registration fee to participate?

No, participation in the Uzbekistan national selection process is completely free of charge. There are no registration fees, application fees, or hidden costs for participating in any of the selection rounds.

How many team members will be selected for the national team?

The final national team will consist of 5 members selected from the top 15 candidates who reach Round 4 (Offline Interviews). The selection committee evaluates technical expertise, problem-solving approach, teamwork capabilities, and commitment to determine the final team composition.

What technical requirements are needed for the online rounds?

For online rounds, participants need a computer with reliable internet connection, a modern web browser, and the ability to run common security tools (which may be provided or can be downloaded). For offline rounds (Round 3 and 4), participants should bring their own laptops with administrative privileges. Specific technical requirements will be communicated to qualified participants before each round.

How is cheating and plagiarism prevented during the selection?

We employ multiple anti-cheating measures including: proctored examinations for offline rounds with human supervision, plagiarism detection systems to identify copied solutions, network monitoring and activity tracking, strict rules prohibiting collaboration during individual rounds, and comprehensive code/answer analysis. Violations result in immediate disqualification.

Can I participate if I have limited cybersecurity experience?

Yes! Round 1 is designed to be accessible to students with varying levels of experience. The selection process is progressive, with each round increasing in difficulty. Students new to cybersecurity are encouraged to participate, as this is an excellent learning opportunity. We recommend studying fundamentals and practicing on CTF platforms to prepare.

What happens after I am selected for the national team?

Selected team members will participate in an intensive national training program covering all competition domains, team coordination strategies, and advanced techniques. The training program is designed to prepare the team for ICO 2026 in Sydney, Australia. Training includes both theoretical knowledge and hands-on practice sessions with experienced mentors and cybersecurity professionals.

What is the format of the international ICO 2026 competition?

ICO 2026 in Sydney, Australia (June 27 - July 2, 2026) will feature CTF competitions in both Attack-style (Jeopardy format with individual challenges) and Defence-style (team-based Attack & Defence format) formats. Teams compete against other national teams from around the world in a controlled, secure environment. The competition tests practical cybersecurity skills in realistic scenarios.

How can I prepare for the selection process?

We recommend: practicing on CTF platforms (picoCTF, HackTheBox, TryHackMe, OverTheWire), studying cybersecurity fundamentals (networking, operating systems, programming), learning about the competition domains (cryptography, web security, forensics, binary exploitation, reverse engineering), participating in online cybersecurity competitions, studying past CTF challenges and writeups, and reviewing our Training & Preparation page for additional resources and recommendations.

Are the selection rounds conducted in English or Uzbek?

The selection rounds are conducted in English, as the international ICO competition uses English as the official language. However, instructions and clarifications may be provided in multiple languages to ensure all participants understand the requirements. Proficiency in English is important for success in both the selection process and the international competition.

Can I use online resources and tools during the online rounds?

For Round 1 and Round 2 (online rounds), the format may allow the use of online resources, tools, and references, similar to an open-book examination. However, collaboration with other participants, sharing solutions, or receiving external help is strictly prohibited. Specific rules for each round will be communicated to participants before the competition begins.

What programming languages should I know for the competition?

Knowledge of Python is highly recommended, as it's widely used in cybersecurity for scripting, automation, and tool development. Familiarity with C/C++ is valuable for binary exploitation and reverse engineering. Understanding of JavaScript, PHP, and SQL is beneficial for web security challenges. Bash scripting is also useful. However, the competition primarily tests security concepts rather than programming language expertise alone.

What are the scoring and evaluation criteria?

Scoring varies by round: Online rounds typically use points-based systems where harder challenges award more points. The top performers by total points advance to the next round. Round 3 (Offline Proctored) combines challenge performance with proctored assessment. Round 4 (Interviews) evaluates technical knowledge, problem-solving approach, communication skills, teamwork, and commitment. The committee uses comprehensive evaluation criteria to select the final 5 team members.

Will travel and accommodation be provided for offline rounds?

Details regarding travel arrangements and accommodation for offline rounds (Round 3 and Round 4) will be communicated to qualified participants. The selection committee will provide information about locations, logistics, and any support available. For the international competition in Sydney, travel and accommodation arrangements for the selected national team will be organized by the selection committee.

What if I cannot attend an offline round due to valid reasons?

Participants who qualify for offline rounds but cannot attend due to valid reasons (medical emergencies, family circumstances) should contact the selection committee immediately. Each case will be evaluated individually. However, offline rounds are essential for team selection, and alternatives may not always be possible. Regular attendance at all rounds is strongly recommended.

Is there a specific age requirement for participation?

There is no specific age requirement for the Uzbekistan national selection process - any student enrolled in an educational institution in Uzbekistan is eligible. However, participants should be aware that the international ICO competition may have age restrictions (typically for students under 26), and the selected team members must meet all eligibility requirements for ICO 2026 as specified by the international organizers.

How will I be notified about my results and advancement?

Results will be communicated through official channels including this website, email notifications to registered participants, and official announcements. Participants should regularly check the website for updates. Qualified participants for offline rounds will receive detailed instructions via email regarding dates, locations, and requirements.

Can I participate if I have participated in other cybersecurity competitions?

Yes, prior experience in other cybersecurity competitions (CTF competitions, cybersecurity challenges, etc.) is actually beneficial and encouraged. Previous experience demonstrates interest and can help in preparation. All eligible students, regardless of their competition history, are welcome to participate in the selection process.

What operating system should I use for the competition?

Linux (especially Kali Linux, Ubuntu, or Parrot OS) is highly recommended as most cybersecurity tools are designed for Linux environments. Windows and macOS are also acceptable, but participants should be familiar with Linux command line and tools. For offline rounds, participants may be required to use specific environments or virtual machines provided by the organizers.

What happens if there is a tie in scoring?

In case of ties, the selection committee uses tiebreaker criteria which may include: time to complete challenges (faster solutions rank higher), number of challenges solved, performance on specific high-value challenges, or additional evaluation criteria. The committee reserves the right to use comprehensive evaluation methods to fairly resolve ties and select the best candidates.