Capture-the-Flag Challenges in Computer Security