IN order to complement the numerous theoretical security
|
|
|
- Branden Bell
- 10 years ago
- Views:
Transcription
1 82 IEEE TRANSACTIONS ON EDUCATION, VOL. 49, NO. 1, FEBRUARY 2006 Georgia Tech Information Security Center Hands-On Network Security Laboratory Randal T. Abler, Senior Member, IEEE, Didier Contis, Julian B. Grizzard, Member, IEEE, and Henry L. Owen, Senior Member, IEEE Abstract An undergraduate internetwork, security-teaching laboratory, which includes both defensive and offensive security laboratory experimentation, is described. This laboratory is oriented toward an introductory internetworking security class and is intended to complement more theoretical network security classes while sparking student interest. The laboratory is unique in that it uses an isolated laboratory network that provides a simple model of the Internet, including an enterprise network component, a university component, a good Internet service provider, and a bad Internet service provider. This setup is in contrast to typical educational laboratories, which use only a few physical computers with virtual machines. All of the laboratory assignments are available on the Internet for general community use and modification (the Internetwork Security Class Home Page is available at Index Terms Computer network security, educational technology, laboratories. I. INTRODUCTION IN order to complement the numerous theoretical security classes that exist, a hands-on-oriented, laboratory-based class that allows students to be exposed to the real-world challenges of network security was needed. A common complaint from students who have taken theoretical network security classes was that no apparent way to obtain practical experience, legally and ethically, with network security exists. A large amount of network security course activity was found in literature and Web searches [2] [11]; however, readily reusable lecture materials or laboratory assignments and laboratory setups that met the goals and objectives of a realistic, hands-on-type learning experience were not found. The existing laboratory infrastructures in the literature consisted of only a few machines and did not approach a realistic network topology [4], [6], [7], [10]. Thus, effort was expended to create this laboratory and the associated online laboratory materials [1]. Many groups have explored methods of teaching information security. In [10], the pedagogical issues related to designing and implementing a cyber warfare laboratory exercise for a computer security course is examined. Micco and Rossman [6] discuss using National Science Foundation (NSF) funding Manuscript received August 11, 2004; revised July 22, The authors would like to acknowledge the CISCO University Critical Infrastructure Assurance Group equipment donation program [17] and training programs, as well as Intel equipment donations, which made this laboratory possible. The authors are with the School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA USA ( [email protected]). Digital Object Identifier /TE to establish a laboratory where students can learn penetration testing techniques, hardening networks against attacks, and logging/audit controls for the purpose of convicting hackers. Ragsdale et al. [7] present an information warfare analysis and research laboratory based upon virtual machines. In [11], the pedagogical approach of active learning and persistent, student-led teams for learning information security was examined. Reference [5] has a course website that contains complete lecture materials and laboratory assignments for a network security laboratory based upon an isolated LAN of at least three machines. This teaching laboratory model builds on the previously discussed methods of teaching and also adds unique elements that help build a teaching environment that approaches a real-world, hands-on laboratory that is both fun and inspiring to students. To strengthen the laboratory design, the industry s best practices and latest developments need to be understood. Organizations that are making important contributions to the network security community and are useful resources in identifying network security laboratory components and teaching objectives include [12] [14]. These organizations contribute to the community in various ways from informing security professionals of the latest alerts to offering free lectures on information security-related topics. Building on the various laboratory architectures discussed and the professional security community, a network security laboratory has been created. The goals of this network security laboratory include exposing students to both defensive mechanisms and offensive mechanisms used by the opposition. These goals enable the students to gain a deeper understanding of the real-world threats that exist and how to cope with them. The laboratory was not intended to be a hacker festival so that students could learn hacking techniques; instead, the intent was to allow both defensive and offensive strategies to be understood and explored. Better protection mechanisms and strategies may be created and employed when there is a full understanding of how attacks are created and how they work. This laboratory is intended to spark student interest in network security using a realistic environment. The laboratory is intended to motivate students to take additional, more traditional, theoretical, network security classes. The format of this laboratory is one hour of lecture and approximately six hours of laboratory exercises per week. II. THE NETWORK The effectiveness and the popularity of a hands-on internetworking class [15] were examined to determine desirable char /$ IEEE
2 ABLER et al.: GEORGIA TECH INFORMATION SECURITY CENTER HANDS-ON NETWORK SECURITY LABORATORY 83 Fig. 2. Enterprise portion of the laboratory network. Fig. 1. Administrative interface. acteristics of a new laboratory-based network security class. Student reviews of this existing laboratory-based class indicated that it was a good initial model for the new efforts. Results from this existing class indicated that the new network security laboratory network needed to be as realistic, large scale, and interactive as possible. This type of network structure was not found in any of the published literature. The authors determined that a structure that contained an Internet backbone with distribution routers, an enterprise network with excellent security practices implemented, a university network with a more open network but with some access control, an Internet service provider with good security practices, and a second Internet service provider with no security practices would be the best representation of the Internet for the purposes of this laboratory. This laboratory network architecture represents a very difficult target to exploit (the enterprise network), a network with moderate difficulty to exploit (the good Internet service provider), a relatively easy target (a university), and a very easy target (an Internet service provider with no security). Thus, students can, in practice, learn how very easy targets are exploited and then work their way up the complexity chain as their understanding of exploits and techniques used by hackers increased. In addition, students may encounter good security policies in portions of the network and see the effectiveness of such policies. The student laboratory network is physically isolated from the Internet so that exploits and information assurance laboratory assignments do not have the potential to escape and proliferate outside the student laboratory. However, one is able to reconfigure the laboratory from the Internet through an administrative interface, which is shown in Fig. 1. This capability allows multiple instructors and multiple teaching assistants to reconfigure the laboratory setup remotely. For example, this capability is used to reconfigure the laboratory network for laboratory assignments in a prerequisite introductory networking course [15]. The laboratory network configurations are stored on a Dell Power Edge 650 server. This server is connected to a Digi Console CM32 console port manager. The Digi Console CM32 is a device that connects to all of the network equipment including the switches, routers, intrusion detection systems, virtual private network devices, firewalls, and any other network Fig. 3. Fig. 4. University portion of the laboratory network. Good Internet service provided portion of the laboratory network. device that is incorporated in the future. The combined capabilities of the Power Edge and the Digi Console CM32 enable users to configure the network remotely with the desired topology. One goal of the network is to keep it completely isolated from the real Internet. The access to the Power Edge and Digi Console CM32 does not compromise this goal because the Digi Console CM32 only connects to console ports on the network devices, which are not capable of transmitting network packets. The console ports are serial lines used to configure the devices. The laboratory network topology is shown in Figs. 2 through 6. The four autonomous systems, an enterprise (Fig. 2), a university (Fig. 3), a good Internet service provider (Fig. 4), and a bad Internet service provider (Fig. 5) are federated by a fifth autonomous system (Fig. 6). This fifth autonomous system represents an Internet backbone consisting of two Tier 1 backbone providers. The first Tier 1 provider consists of one
3 84 IEEE TRANSACTIONS ON EDUCATION, VOL. 49, NO. 1, FEBRUARY 2006 Fig. 5. Fig. 6. Bad Internet service provider portion of the laboratory network. Backbone portion of the laboratory network. Cisco 2621XM router and a virtual router on a Cisco Catalyst The second Tier 1 backbone provider consists of one Cisco 2621XM router. The backbone routers are used at layer 3 for normal routing. This architecture is a valuable model to use for teaching students and serves as a very small mock-up of the Internet. Each of the four representative autonomous systems has specific characteristics that model a typical real world scenario. The enterprise autonomous system consists of dual-homed Internet connection using two redundant Cisco 1760 routers, a Cisco PIX-515E firewall, an access/edge Cisco 1760-VPN/K9, and two Cisco 1720 access routers. A demilitarized zone that contains a domain name server as well as a Web server exists. The enterprise autonomous system allows a student to experiment with a realistic enterprise topology. The good Internet service provider autonomous system consists of a Cisco Catalyst 3550, three Cisco 1760-VPN/K9 routers, and two Cisco 1720 access routers. The good Internet service provider is set up so that it may contain remote office enterprise connections through both virtual private networks and clear connections. Network Address Translation is also used inside this good Internet service provider. The university autonomous system consists of a dual-connected Cisco Catalyst 3550 and a Cisco 3005 virtual private network concentrator. The emulated university has no firewall and terminates virtual private networks from emulated remote users. An access control list is used in the Cisco Catalyst University use of networks typically entails a large amount of user freedom and, thus, limited network restrictions. The bad Internet service provider autonomous system is a haven for hackers. It consists of a Cisco Catalyst 3550 virtual gateway router and two Cisco 1720s and one Cisco 1760-VPN/K9 for distribution. No access control firewalls nor network filtering is applied internally in the bad Internet service provider. This autonomous system is intended to represent the unrestricted access typical of many Internet service providers. One of the important features of the setup is its versatility. The use of virtual local area network (VLAN) technology and the combined capabilities of the Cisco Catalyst 3550 equipment that have both layer-2 Ethernet switching capabilities and layer-3 routing capabilities allow multiple logical network topologies to be mapped onto the physical topology. The switches make up the physical backbone of the network. All network devices and computers are connected to the switches, and all of the switches are connected together. Using this physical architecture, an almost unlimited number of virtual architectures may be created. The VLAN technology is used to create virtual switches in which any network device or computer can appear on any virtual switch. This capability is enabled and extended by the Cisco Catalyst 3550s, which are switches installed with an EMI routing image yielding both layer-2 switching and layer-3 routing capability in the same box. All that is required to create a new network is reprogramming the switches and network devices, which can be completed remotely. To enhance this versatility further, custom perl scripts have been developed that can save and restore the network configuration. Network reconfiguration may be necessary as different laboratory assignments or different classes use the equipment. The need to physically rewire the network is essentially gone. One can move various machines around the network, for example, from one autonomous system to another without doing any physical rewiring. One also may change the autonomous system architectures without doing any rewiring. This architecture has been found to be highly effective for a teaching laboratory. III. LABORATORY ASSIGNMENTS The class typically consists of twelve laboratory assignments and a capstone network security competition, which are all completed in one semester. Table I shows the goals, objectives, and tools used in some example laboratory assignments. All of the laboratory exercises are available online for modification and reuse [1]. One of the most unique characteristics of this network security instructional laboratory as compared with the literature is the level of realism and the scale of the network infrastructure available to students. Various laboratory assignments capitalize and leverage this realistic capability to varying degrees. The laboratory task of network mapping, scanning, and reconnaissance is very realistic because the laboratory is a small mock-up of the Internet. In contrast to traditional network laboratories, the setup enables one to divide the network into different Internet protocol (IP) address ranges, block access to some address by means of a firewall or access control lists (ACLs), have multiple hops and routes between source and destination, and provide various other realistic configurations. In the sniffing labo-
4 ABLER et al.: GEORGIA TECH INFORMATION SECURITY CENTER HANDS-ON NETWORK SECURITY LABORATORY 85 TABLE I SAMPLE LABORATORY ASSIGNMENTS TABLE II LABORATORY ASSESSMENT RESULTS STUDENT EVALUATION OF CLASS AVERAGE VALUES: 5=STRONGLY AGREE, 4=AGREE, 3=PARTLY AGREE AND DISAGREE, 2=DISAGREE, AND 1=STRONGLY AGREE ratory, having a large enough network structure to provide background traffic to make sniffing for packets of interest (which are buried in considerable unrelated traffic) very realistic. In the denial of service assignment, the laboratory enables a method to generate a number of diverse denial of service sources, making identifying and blocking those sources more challenging. Releasing a worm on a larger network allows a more interesting study of propagation, while conducting such exercises on only one or two machines does not really allow this study to be conducted. At the other end of the spectrum, laboratory assignments of buffer overflows only require two machines: a victim and an attacker. Not all of the present assignments capitalize on the realistic network architecture; however, the more realistic the network is, the more excited the students are to work and interact in the laboratory environment. The main reason for the realistic design is to provide the infrastructure for challenging and complex security issues. Some of the laboratory assignments can be completed with only a few machines. In fact, using only a few machines is the typical methodology employed in the literature [2] [11]. On the other hand, a more complex network enables many more possibilities and interesting exercises. IV. COURSE ASSESSMENT At the time of writing, this laboratory environment had been used in four semester offerings. Student evaluation of this laboratory is shown in Table II. Results are out of a possible 5.0. These assessment results, coupled with individual discussions with students, indicate that students find it very helpful to see and work with a realistic network topology that is representative of the type of environments they will encounter. Students have indicated that prior to creation of this laboratory that no good hands-on environment was available in which they could ethically and legally experiment and learn. As a result of unethical attackers being able to experiment and sharpen hacking skills on the Internet, students who wanted to become ethical network security professionals indicated that they believed they were at a disadvantage. They also stated that pure theoretical courses did not really teach them the skills they felt they needed to be competent network security professionals. Feedback has been received from students that this laboratory environment goes a long way toward removing the disadvantage ethical students felt they were encountering. V. CONCLUSION Having a totally isolated information security laboratory where students are allowed to launch attacks and attempt to defend against them is highly educational and highly motivating. Students having hardened their assigned machines and networks and then seeing them compromised are better prepared to understand how to prevent similar compromises in the future. Having a laboratory environment where students may experiment and be creative in a complex network environment is highly motivating for students. The reconfiguration capability of the laboratory is highly beneficial in that one can change the network topology by just running a configuration script. One may reconfigure the laboratory for a firewall laboratory assignment without requiring any physical wiring changes or manual configuration changes to reset
5 86 IEEE TRANSACTIONS ON EDUCATION, VOL. 49, NO. 1, FEBRUARY 2006 the firewall laboratory network configuration. One of the interesting capabilities is a master reset ability. When the laboratory is completed, one can easily set the network topology back to the original configuration. The laboratory has been used to accommodate up to a total of 90 students a semester. The limiting factor is the number of end station computers (25) that exist at present. The reconfiguration capability allows this laboratory equipment to be shared with an introductory networking class that also requires an isolated network [15]. The laboratory that was implemented has more network equipment and capability than many small companies. These small companies typically have a full-time information technology support person. There is a high workload level associated with maintaining and managing a laboratory of this type. A highly successful information assurance laboratory may be implemented with far less equipment [7] [16]. What was discovered by implementing this laboratory at the other end of the capability and complexity spectrum is that having this level of complexity enables a level of realism unmatched by the simpler implementations. Exposure to realistic network background traffic, access control lists, firewall rules, network address translation, etc., in a network of the complexity presented here teaches valuable operational issues that theoretical and simpler laboratory implementations never encounter. ACKNOWLEDGMENT The authors would like to thank Cisco field representative J. Berg, who was instrumental in helping architect, select, and set up the equipment. The authors would also like to thank M. Nelson-Palmer, who made this laboratory possible. REFERENCES [1] The Internetwork Security Class Home Page (2004). [Online]. Available: [2] A. Yasinac, Information security curricula in computer science departments: Theory and practice, in Proc. 5th Nat. Colloquium for Information Systems Security Education 2001: A Security Odyssey,May 22 24, 2001, [Online] Available: [3] A. Yasinac, J. Frazier, and M. Bogdonav, Developing an academic security laboratory, in Proc. 6th Nat. Colloquium for Information Systems Security Education 2002, Redmond, WA, Jun. 3 7, 2002, [Online] Available: [4] P. Mateti, A laboratory-based course on Internet security, in Proc. 34th SIGCSE Tech. Symp. Computer Science Education, Reno, NV, Feb. 2003, pp [5] Internet Security Lectures Home Page (2004). [Online]. Available: [6] M. Micco and H. Rossman, Building a cyberwar lab: Lessons learned teaching cybersecurity principles to undergraduates, in Proc. 33rd SIGCSE Tech. Symp. Computer Science Education, Northern Kentucky Convention Center, Feb. 2002, pp [7] D. Ragsdale, Lathrop, and R. Dodge, A virtual environment for IA education, in Proc IEEE Workshop on Information Assurance U.S. Military Academy, West Point, NY, Jun. 2003, pp [8] J. Huss, Laboratory projects for promoting hands-on learning in a computer security course, ACM SIGCSE Bull., vol. 27, no. 2, pp. 2 6, Jun [9] C. Frank and G. Wells, Laboratory exercises for a computer security course, J. Comput. Sci. Colleges, vol. 17, no. 4, pp , Mar [10] P. Wagner and P. Wudi, Designing and implementing a cyberwar laboratory exercise for a computer security course, in Proc. 35th SIGCSE Tech. Symp. Computer Science Education, Norfolk, VA, Feb. 2004, pp [11] J. Hill, C. Carver, J. Humphries, and U. Pooch, Using an isolated network laboratory to teach advanced networks and security, in Proc. 32nd SIGCSE Tech. Symp. Computer Science Education, Charlotte, NC, Feb. 2001, pp [12] SANS Home Page (2004). [Online]. Available: [13] CERT Coordination Center Home Page (2004). [Online]. Available: [14] Insecure.org Home Page (2004). [Online]. Available: [15] R. Abler, H. Owen, and G. Riley, University methodology for Internetworking principles and design projects, IEEE Trans. Educ., vol. 46, no. 2, pp , May [16] The Information Warfare Analysis and Research Laboratory Home Page (2004). [Online]. Available: [17] The Critical Infrastructure Assurance Group Home Page (2004). [Online]. Available: [18] The Vmware Home Page (2004). [Online]. Available: vmware.com/ [19] The Cheops-Ng Home Page (2004). [Online]. Available: [20] The Insecure.org Nmap Home Page (2004). [Online]. Available: [21] The Nessus Home Page (2004). [Online]. Available: nessus.org/ [22] The Snapfiles.com Superscan Home Page (2004). [Online]. Available: [23] The Same Spade.org Windows Home Page (2004). [Online]. Available: [24] The Security Focus Tools Page (2004). [Online]. Available: [25] John the Ripper Password Cracker Page (2004). [Online]. Available: [26] The Ethereal.com Home Page (2004). [Online]. Available: [27] The Packet Storm Tools Page (2004). [Online]. Available: [28] The Monkey.org Dsniff Home Page (2004). [Online]. Available: [29] The LBNL Network Research Group Page (2004). [Online]. Available: [30] The Packet Storm DoS Tools Page (2004). [Online]. Available: [31] Smashing The Stack for Fun and Profit by Aleph One (2004). [Online]. Available: [32] The Packet Storm Rootkits Tools Page (2004). [Online]. Available: [33] The Samhain Lab Library Home Page (2004). [Online]. Available: [34] The Chkrootkit.org Home Page (2004). [Online]. Available: [35] The Strace Homepage (2004). [Online]. Available: ~wichert/strace/ [36] The Rootkit Home Page (2004). [Online]. Available: rootkit.nl/ [37] The Hacker Defender Home Page (2004). [Online]. Available: [38] The GNU Netcat Project Home Page (2004). [Online]. Available: [39] The Project-Hack.org Home Page (2004). [Online]. Available: [40] The Real vnc Home Page (2004). [Online]. Available: [41] The cultdeadcow.com Back Orifice Home Page (2004). [Online]. Available: [42] The SourceForge AIDE Home Page (2004). [Online]. Available: [43] The Honeynet.org Challenges Home Page (2004). [Online]. Available: [44] The F.I.R.E. Home Page (2004). [Online]. Available: com/ [45] The Computer Forensics Home Page (2004). [Online]. Available: [46] The Autopsy Forensic Browser Home Page (2004). [Online]. Available: [47] The Sourceforge.net Sleuthkit Home Page (2004). [Online]. Available: [48] The Zone Labs Home Page (2004). [Online]. Available: zonelabs.com/store/content/home.jsp
6 ABLER et al.: GEORGIA TECH INFORMATION SECURITY CENTER HANDS-ON NETWORK SECURITY LABORATORY 87 [49] C. Church, T. Schmoyer, and H. L. Owen, Design and implementation of a simple class room laboratory internet worm, J. Security Educ., vol. 1, no. 2/3, pp , Feb [50] The Symantec vbs.ss@mm Worm Page (2004). [Online]. Available: [51] The Kismet Home Page (2004). [Online]. Available: kismetwireless.net/ [52] The Airsnort Home Page (2004). [Online]. Available: shmoo.com/ [53] The Wget Home Page (2004). [Online]. Available: software/wget/wget.html [54] The Nikto Home Page (2004). [Online]. Available: code/nikto.shtml [55] The UCSB Capture the Flag Home Page (2004). [Online]. Available: Didier Contis received the B.S. degree from the School of Mines of Nantes, France, and the M.S.E.E. degree from the Georgia Institute of Technology, Atlanta, both in Currently, he is a Research Engineer in the School of Electrical and Computer Engineering, Georgia Institute of Technology. His research interests include network security as well as distributed and embedded intrusion detection systems. Julian B. Grizzard (S 99 M 02) received the B.S. degree in computer engineering from Clemson University, Clemson, SC, in 2002 and the M.S.E.E. degree from the Georgia Institute of Technology, Atlanta, in He is currently working toward the Ph.D. degree at the School of Electrical and Computer Engineering at the Georgia Institute of Technology. His research interests include network and operating system security. Randal T. Abler (M 00 SM 05) received the B.S.E.E, M.E.E, and Ph.D. degrees from the Georgia Institute of Technology, Atlanta, in 1986, 1992, and 2000, respectively. He is currently an Assistant Professor at the Georgia Institute of Technology with a joint appointment to the School of Electrical and Computer Engineering and to the Regional Engineering Program in Savannah, GA. His research interests include the Session Initiation Protocol, Quality of Service implementations, and Internet technology in support of distributed education. Henry L. Owen (M 00 SM 03) received the B.S.E.E, M.S.E.E., and Ph.D. degrees from the Georgia Institute of Technology, Atlanta, in 1979, 1983, and 1989, respectively. Currently, he is a Professor in the School of Electrical and Computer Engineering, Georgia Institute of Technology. His research interests include network security and Internetworking.
TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach
TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach Rahul V. Tikekar Southern Oregon University Abstract: Increasing awareness of the vulnerabilities of computer systems has led to the introduction
Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course
Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course Paul J. Wagner and Jason M. Wudi Department of Computer Science University of Wisconsin-Eau Claire Eau Claire, WI
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner [email protected]
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner [email protected] Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 [email protected] Kyle Gwinnup and Carol
Tools for Attacking Layer 2 Network Infrastructure
Tools for Attacking Layer 2 Network Infrastructure Kai-Hau Yeung, Dereck Fung, and Kin-Yeung Wong Abstract Data Link layer is considered as the weakest link in a secured network. If an initial attack comes
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Information Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
Experiences from Educating Practitioners in Vulnerability Analysis
Experiences from Educating Practitioners in Vulnerability Analysis Abstract. This paper presents experiences from a vulnerability analysis course especially developed for practitioners. The described course
Building a Virtual Constructivist Learning Environment for Learning Computing Security and Forensics
ORIGINAL ARTICLE Building a Virtual Constructivist Learning Environment for Learning Computing Security and Forensics Liangxiu Han, 1 Jamie Harries 1 & Phillip Brown 1 1 School of Computing, Mathematics
A Portable Computer Security Workshop
A Portable Computer Security Workshop PAUL J. WAGNER AND ANDREW T. PHILLIPS University of Wisconsin Eau Claire We have developed a computer security workshop designed to instruct other post-secondary instructors
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
Network Security: A Case Study
Network Security: A Case Study Susan J. Lincke Computer Science Department University of Wisconsin-Parkside Kenosha, WI [email protected] Abstract This paper reviews 3 case studies related to network security.
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
Enabling Remote Access to Computer Networking Laboratories for Distance Education
Enabling Remote Access to Computer Networking Laboratories for Distance Education Carlos E. Caicedo Bastidas Syracuse University, [email protected] Abstract - Academic organizations that provide students
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
ISOM3380 Advanced Network Management. Spring 2014 15. Course Description
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
Guide for Designing Cyber Security Exercises
Guide for Designing Cyber Security Exercises VICTOR-VALERIU PATRICIU Computer Science Department Military Technical Academy Bucharest, Bd. George Cosbuc, no. 81-83 ROMANIA [email protected] ADRIAN
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Virtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1
NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Footprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
SECURITY FLAWS IN INTERNET VOTING SYSTEM
SECURITY FLAWS IN INTERNET VOTING SYSTEM Sandeep Mudana Computer Science Department University of Auckland Email: [email protected] Abstract With the rapid growth in computer networks and internet,
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Analyze. Secure. Defend. Do you hold ECSA credential?
1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
When a testbed does more than testing
When a testbed does more than testing The Internet-Scale Event Attack and Generation Environment (ISEAGE) providing learning and synthesizing experiences for cyber security students. Julie A. Rursch, Doug
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
TABLE OF CONTENTS NETWORK SECURITY 1...1
Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
How To Pass The Information And Network Security Certificate
Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
A Preliminary Evaluation of the new Cisco Network Security Course
IJCSNS International Journal of Computer Science and Network Security, VOL.0 No.9, September 00 A Preliminary Evaluation of the new Cisco Network Security Course S P Maj, D Veal, L Yassa Edith Cowan University,
CCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] ABSTRACT
AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT
AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT Hetal Jasani, Northern Kentucky University Dr. Hetal Jasani is an assistant professor in the Department of Computer Science at Northern Kentucky
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
Small-Scale Cyber Security Competitions
Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Towards a virtualized Internet for computer networking assignments
Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
- Introduction to PIX/ASA Firewalls -
1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
