CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
|
|
|
- Loraine Foster
- 10 years ago
- Views:
Transcription
1 CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity and argue that it contributes to a necessary component of the computer security curriculum. This component is the study of software vulnerability investigation. It is currently not properly emphasized in this curriculum. We discuss reasons for this situation and we go on to describe how CTF can be useful for educating students within this focus. CTF helps develop those computer security skills that enable students to identify new vulnerabilities before those with malicious intent find them. It also helps them to hone the core computer security skills. capture the flag 1. INTRODUCTION Proactive vulnerability analysis on existing systems is lacking from the modern computer security curriculum. Students do not learn how to locate and fix design, configuration, and application flaws in existing systems. Exercises such as Capture-the-Flag (CTF) teach these skills. As such, CTF fills a critical void in Information Security education. Our paper is organized as follows. We argue that the vulnerability analysis education problem exists. We describe the current computer security educational approach in the section titled "The InfoSec Educational Environment". There we explore the underlying reasons for the deficiency in this approach and we go on to link these reasons for the educational disconnect with the current approach. We then go on to describe CTF in the section titled "CTF: A Lab to Fill the Gap". There we describe the setup for a CTF exercise and explore why it helps to train students to discover flaws in systems. We summarize our conclusions in the section titled "Conclusions". We propose that CTF helps to teach those skills that we find to be lacking. CTF fills this niche naturally by providing a safe parallel for the experiences of crackers in the wild. The specifics of a CTF exercise may lead to a general approach to teaching these skills. We focus on these specifics here because they serve as an excellent starting point for two efforts. First, CTF provides immediate educational value. Computer Security departments can participate in CTF exercises to teach a set of valuable skills. In addition, educational researchers can use CTF as an aide and basis to understanding how best to convey these skills.
2 Report Documentation Page Form Approved OMB No Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE JUL REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Capture-The-Flag: Learning Computer Security Under Fire 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School 833 Dyer Rd., Code CS/Cp Monterey, CA PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 11. SPONSOR/MONITOR S REPORT NUMBER(S) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 5 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
3 18 Capture-the-Flag: Learning Computer Security Under Fire 2. THE INFOSEC EDUCATIONAL ENVIRONMENT There are a series of challenges that a student of Information Security faces. Educational programs structure themselves in order to meet these challenges. Curricula are also developed to help meet the expectations of potential employers. These expectations present themselves in the course of the day-to-day operation of Information Technology (IT) systems. Organizations concerned with the security of their IT generally break it down along two lines. The security of an organization's IT flows from that organization's policies, which defines the organization's approach to the problem. The application of the policy is colored, however, by the timing concerns involved. First, these organizations are interested in being able to protect systems that they already have in place. They must do something to deal with known vulnerabilities, or any threats to their operation will have known avenues for doing them harm. Second, they are interested in planning for systems with more capabilities in the future that will better support their mission. Information Security education has grown to support these concerns. These organizational goals tend to divide a student's education into two categories. We will call these the protectionist and constructionist approaches to computer security. The protectionist approach focuses on developing students' capabilities to protect existing systems from known vulnerabilities, given known risks. The constructionist approach focuses on developing students' capabilities to build new systems that are free from vulnerabilities to a high degree of assurance. In his paper Training the Cyber Warrior, J.D. Fulp describes this divide using the terms cyber tacticians and cyber strategists, which correspond to our concepts of protectionists and constructionists, respectively: Cyber tacticians would focus on reducing the risk of existing fielded systems primarily through the application of appropriate safeguards. Cyber strategists would focus on reducing the risk of future systems primarily through the application of structured and formal system design techniques that reduce system vulnerabilities [Ful03]. Teachers use lecture sessions and laboratory work to convey information and experience to their students. Both of these tools tend to support one or the other of the protectionist or constructionist approaches. To illustrate this, we will refer to some generic courses. There are specific counterparts at the Naval Postgraduate School for many of these. Lecture sections are direct and in Information Security, as elsewhere, are used to convey important baseline facts. Even when there is a lab involved, it typically builds on prerequisite material presented in a lecture. Information Security lectures can cover understanding policy, grasping current threats, and learning how technology (including networking) works. Such lectures are clearly protectionist in nature. Other lectures can discuss the meaning of security and a robust process for developing secure systems. These lectures can include formal modeling and techniques, design approaches, and implementation standards. These are clearly constructionist. Laboratory exercises (labs) are a more interactive teaching tool. They have the benefit that they can provide experience in a subject. They are often more appealing to students than other types of work. It is difficult, however, to convey abstractions and theories through labs, as complex material can be challenging to model in a lab. Many of the labs in existence parallel the class lectures described previously. Teachers have also experimented with more comprehensive labs that exercise a variety of skills and the coordination of those skills. A Cyberdefense Exercise (CDX) is a lab that is focused on network security from a defense point of view. The converse of this is a Red Team Exercise, which attempts to take advantage of known vulnerabilities to test an installation's defenses. Labs such as these are protectionist in their approach. They encourage using known processes to achieve some well-defined goal using established technology and procedures.
4 Capture-the-Flag: Learning Computer Security Under Fire 19 For example, in his paper Teaching Network Security Through Live Exercises, Giovanni Vigna gives an overview of several configurations of interactive teaching techniques. One of the experiments that he describes is a lab called Capture The Flag. As Vigna describes it, though, this form of CTF exercise continues to contribute to the protectionist educational approach. The team's goal was not to prevent the other team from breaking into the host. Instead, the priority was to detect the attacks of the opponents. In addition, each team had to attack the other team's hosts and retrieve the flags for each of the attacked hosts [Vig03]. Here, the priority is learning about intrusion detection. Intrusion detection is a tool that is helpful for identifying when attacks may be taking place on IT resources. It is often taught to students as a component of a network security framework, and as such it is part of the protectionist educational focus. In contrast to such labs, there are other labs that provide interactive experience to students who are developing systems. These labs include training using the development tools. They can also expose students to experimentation with computing system components that can help students reason about future systems. These labs are clearly constructionist in their focus. There are important skills that are overlooked in these approaches to teaching Information Security. The protectionist focus has students learn what policies need to be enforced, and how to enforce them. With this focus, students harden systems and react to problems based upon known vulnerabilities. Once these students become practitioners, they must keep up to date in order to keep their systems up to date. Looking to the future, the constructionist focus has students learn the design skills needed to put together systems that are robust in the face of threats. The constructionists incorporate policy from the beginning to ensure that systems conform to policy. The nature of vulnerabilities is a vital input to both of these areas. Who is trained to discover new vulnerabilities? 3. CTF: A LAB TO FILL THE GAP We propose that Capture-the-Flag serves as an example of the type of material that needs to be included in Information Security education. Capture-the-Flag is a team-based sport that is essentially an exercise in controlled, time-sensitive system subversion (also known as cracking). Aside from a set of artificial goals that give the sport a measuring stick and a set of artificial boundaries that keep the sport contained, participants have an extraordinary amount of freedom. This freedom motivates students to experiment and forces those students to hone skills that are not normally covered in a standard Information Security curriculum. CTF is one component of an educational focus that is currently missing from institutional Information Security education. One of the potential drawbacks to CTF is the amount of setup required. CTF is based on the concept of running one's own and subverting others' services. A service is any application that can be utilized remotely over a network. Many services, for example, make use of a common web server. There are a plethora of potential services that can be used. In fact, many CTF configurations have tried to mix some common services with some that are more arcane. The CTF setup introduces the concept of a flag in order to monitor whether each of a particular team's services is available, and if so, who controls it. If a service is controlled by a team other than the team who owns that service, then it has been remotely compromised. A flag is some small string of data that identifies a particular team. In order to assign scores to teams, service flags are cryptographically "rotated" in an unpredictable way in order to monitor the duration for which a service is controlled continuously by a given team. There must be an automated way to perform this scoring. This "scoring server" accesses each team's services in much the same way that the participating teams access each others' services, but it may also have additional privileged access mechanisms for performing flag rotation that must be communicated
5 20 Capture-the-Flag: Learning Computer Security Under Fire to the teams in advance. The development of the scoring server is the primary source of the complexity in the preparation for the exercise. Game play is also quite complex, although given a correct setup it is straightforward. Each team is given space within the network topology. Each team is also given media, typically optical, such as a CD or DVD, containing working images of the systems sufficient for running the services. How the team organizes itself to satisfy the exercise's requirements is left entirely to that team. The most important characteristic of a CTF exercise is its focus on the 0-day exploit. A 0-day exploit is a software system vulnerability that has not been previously disclosed. 0-day exploits include both vulnerabilities that have not yet been discovered as well as those about which certain groups may know but choose not to reveal. In contrast to Vigna's approach to CTF exercises described earlier, the ones in which we have been involved require the development of new exploits. This is a CTF exercise's primary benefit. In order to be competitive, teams must harden their systems as much as possible. In turn, this means that other teams must find new, previously unknown and hence innovative ways to undermine their competitors' systems. We have broken down the important educational targets for developing 0-day exploits into eight areas. These areas are: 1. Consistently secure programming practices 2. Compiler theory 3. Assembly language 4. Operating system theory 5. Reverse engineering theory 6. Networking and practical protocol analysis 7. Exploit methodology, and 8. Ethics and disclosure Many of these topics are traditional computer science areas of study. In an Information Security educational environment, these topics would all be taught with a concentration on learning where flaws could exist and discovering where flaws actually exist. These skills border on both protectionist and constructionist domains, but they are largely overlooked in modern Information Security curricula. While the 0-day exploit is of paramount importance to a CTF exercise, these exercises develop a wide assortment of additional skills. Building up a picture of how the exercise has been constructed and finding targets to analyze develops computer forensics skills. Defending the systems requires a combination of network security and system administration skills. This defense must be responsive to new attacks, and it requires extensive knowledge of a wide array of system components, including various (and potentially arcane) operating systems. Participating effectively in a CTF exercise requires preparation. This preparation is targeted towards enabling the team to cooperate. It requires some technical work, such as network engineering, but it also requires proper team management. CTF is a thorough information security exercise. It integrates well with other Information Security educational targets and so it can be used effectively to train Cybersecurity professionals. 4. CONCLUSIONS In response to the IT environment and the security needs of that environment, an educational program of protection and construction has developed. We suggest that these categories are very useful educational foci, but that they require additional support. We need to be training people to act like crackers and find new vulnerabilities in existing systems. Exercises such as Capture-the- Flag develop these needed skills in students.
6 Capture-the-Flag: Learning Computer Security Under Fire 21 We conclude that we need a third focus for students. We will call this focus the destructionist focus; its primary goal is to learn how to break software and computer systems and thereby expose the vulnerabilities in those systems. Destructionists complement both protectionists and constructionists. Destructionists work to uncover new vulnerabilities. This information naturally supports the protectionists, who specifically work to counter known vulnerabilities. Destructionists also work to expose new models of risk and to better understand the weaknesses in system composition. This information is useful to the constructionists in that it will provide them with a better foundation on which to base their design decisions. In our observation, CTF has helped students understand the security relevancy of system details in a way not previously covered. Students participating in our formulation of a CTF exercise are forced to deeply and thoroughly inspect and understand the operating environment of IT systems. They must then be able to assemble this knowledge into a viable threat. Our description of the CTF architecture gives students almost free reign in their manipulation of the game systems. Students are forced to take everything into consideration as a possible avenue of attack. There is still a good deal of work that needs to be done to incorporate CTF neatly into an educational environment. In our experience, evaluating students based upon their participating in one of these exercises can be challenging. Individual students are likely to have very different aptitudes, and a CTF exercise tends to draw out specific skill sets. A CTF exercise is unavoidably a team exercise. As a result, we have typically used CTF exercises as extra-curricular activities, although this is also due to the fact that we are still working to integrate CTF-related material into the curriculum. This has the side benefit that as an extra-curricular activity, CTF provides an avenue for students to interact with the hacker community. 5. REFERENCES [Ful03] Fulp, J.D. Training the Cyber Warrior. Security Education and Critical Infrastructures; June 26-28, 2003; Monterey, California, USA; The International Federation for Information Processing. Kluwer Academic Publishers, Boston, Massachusetts, USA [Vig03] Vigna, Giovanni. Teaching Network Security Through Live Exercises. Security Education and Critical Infrastructures; June 26-28, 2003; Monterey, California, USA; The International Federation for Information Processing. Kluwer Academic Publishers, Boston, Massachusetts, USA
Overview Presented by: Boyd L. Summers
Overview Presented by: Boyd L. Summers Systems & Software Technology Conference SSTC May 19 th, 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
FIRST IMPRESSION EXPERIMENT REPORT (FIER)
THE MNE7 OBJECTIVE 3.4 CYBER SITUATIONAL AWARENESS LOE FIRST IMPRESSION EXPERIMENT REPORT (FIER) 1. Introduction The Finnish Defence Forces Concept Development & Experimentation Centre (FDF CD&E Centre)
Report Documentation Page
(c)2002 American Institute Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
Asset Management- Acquisitions
Indefinite Delivery, Indefinite Quantity (IDIQ) contracts used for these services: al, Activity & Master Plans; Land Use Analysis; Anti- Terrorism, Circulation & Space Management Studies; Encroachment
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
EAD Expected Annual Flood Damage Computation
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program EAD Expected Annual Flood Damage Computation User's Manual March 1989 Original: June 1977 Revised: August 1979, February
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 21-23 June 2005, at US Military Academy, West Point, NY 712CD For office use only 41205 Please complete this form 712CD as your cover
Cyber Security Training and Awareness Through Game Play
Cyber Security Training and Awareness Through Game Play Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, and Thuy D. Nguyen Naval Postgraduate School, Monterey, CA 93943, USA {bdcone,mfthomps,irvine,tdnguyen}@nps.edu
In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach
A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach Cynthia E. Irvine and Timothy E. Levin Department of Computer Science, Naval Postgraduate
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center Technical Report - Final Award Number N00014-03-1-0844 Mod.
DEFENSE CONTRACT AUDIT AGENCY
DEFENSE CONTRACT AUDIT AGENCY Fundamental Building Blocks for an Acceptable Accounting System Presented by Sue Reynaga DCAA Branch Manager San Diego Branch Office August 24, 2011 Report Documentation Page
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
AFRL-RX-WP-TP-2008-4023
AFRL-RX-WP-TP-2008-4023 HOW KILLDEER MOUNTAIN MANUFACTURING IS OPTIMIZING AEROSPACE SUPPLY CHAIN VISIBILITY USING RFID (Postprint) Jeanne Duckett Killdeer Mountain Manufacturing, Inc. FEBRUARY 2008 Final
Guide to Using DoD PKI Certificates in Outlook 2000
Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group Author: Margaret Salter Updated: April 6, 2001 Version 1.0 National Security Agency 9800 Savage Rd.
DCAA and the Small Business Innovative Research (SBIR) Program
Defense Contract Audit Agency (DCAA) DCAA and the Small Business Innovative Research (SBIR) Program Judice Smith and Chang Ford DCAA/Financial Liaison Advisors NAVAIR 2010 Small Business Aviation Technology
Integrated Force Method Solution to Indeterminate Structural Mechanics Problems
NASA/TP 2004-207430 Integrated Force Method Solution to Indeterminate Structural Mechanics Problems Surya N. Patnaik Ohio Aerospace Institute, Brook Park, Ohio Dale A. Hopkins and Gary R. Halford Glenn
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency. May 11, 2011
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency May 11, 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
RT 24 - Architecture, Modeling & Simulation, and Software Design
RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University
TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples
AD Award Number: W81WH-07-1-0069 TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples PRINCIPAL INVESTIGATOR: Sally L. Maliski, Ph.D., R.N. CONTRACTING ORGANIZATION:
IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND. Ready. Resourceful. Responsive!
~ IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND Ready. Resourceful. Responsive! Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
ELECTRONIC HEALTH RECORDS. Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
United States Government Accountability Office Report to Congressional July 2014 ELECTRONIC HEALTH RECORDS Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
Intelligence Community Public Key Infrastructure (IC PKI)
Intelligence Community Public Key Infrastructure (IC PKI) 2002 The MITRE Corporation This technical data was produced for the U.S. Government under contract 99-G000109-000, and is subject to the Rights
Advanced Micro Ring Resonator Filter Technology
Advanced Micro Ring Resonator Filter Technology G. Lenz and C. K. Madsen Lucent Technologies, Bell Labs Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management James W. Bilbro JB Consulting International Huntsville, AL Multi-dimensional Assessment of Technology Maturity Technology
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP By Dr. Carl M. Powe, Jr. 2-3 March 2005 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS Anton Treskunov, Jarrell Pair*, and Bill Swartout Institute for Creative Technologies University
Headquarters U.S. Air Force
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Technology Readiness Assessment (TRA) Process for Major Defense Acquisition Programs LtCol Ed Masterson Mr
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS E. E. Eilertson*, L. Ertoz, and V. Kumar Army High Performance Computing Research Center Minneapolis, MN 55414 K. S. Long U.S. Army Research Laboratory
CERT Virtual Flow Collection and Analysis
CERT Virtual Flow Collection and Analysis For Training and Simulation George Warnagiris 2011 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
2010 2011 Military Health System Conference
2010 2011 Military Health System Conference Population Health Management The Missing Element of PCMH Sharing The Quadruple Knowledge: Aim: Working Achieving Together, Breakthrough Achieving Performance
PROBLEM STATEMENT: Will reducing the ASD for Kadena AB F-15 C/Ds increase the CPFH for this Mission Design Series (MDS)?
CONSULTING REPORT Kadena F-15 C/D Cost per Flying Hour Analysis PROJECT MANAGERS: Capt Jeremy Howe and Capt Kevin Dawson AFLMA PROJECT NUMBER: LM200520700 16 August 2005 BACKGROUND: Kadena AB is currently
ADVANCED NETWORK SECURITY PROJECT
AFRL-IF-RS-TR-2005-395 Final Technical Report December 2005 ADVANCED NETWORK SECURITY PROJECT Indiana University APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AIR FORCE RESEARCH LABORATORY INFORMATION
IPLocks Vulnerability Assessment: A Database Assessment Solution
IPLOCKS WHITE PAPER February 2006 IPLocks Vulnerability Assessment: A Database Assessment Solution 2665 North First Street, Suite 110 San Jose, CA 95134 Telephone: 408.383.7500 www.iplocks.com TABLE OF
Cancellation of Nongroup Health Insurance Policies
Cancellation of Nongroup Health Insurance Policies Bernadette Fernandez Specialist in Health Care Financing Annie L. Mach Analyst in Health Care Financing November 19, 2013 Congressional Research Service
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
About Effective Penetration Testing Methodology
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Graduate Level Credit for Resident EWS Students. Natasha McEachin CG 1
Graduate Level Credit for Resident EWS Students Natasha McEachin CG 1 February 20, 2009 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
Non-Autoclave (Prepreg) Manufacturing Technology
Non-Autoclave (Prepreg) Manufacturing Technology Gary G. Bond, John M. Griffith, Gail L. Hahn The Boeing Company Chris Bongiovanni, Jack Boyd Cytec Engineered Materials 9 September 2008 Report Documentation
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD
Defense Business Practice Implementation Board DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD Report to the Senior Executive Council, Department of Defense MANAGEMENT INFORMATION TASK GROUP Report FY02-3
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE Gerald Furey Deputy for Small Business Ready. Resourceful. Responsive! 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation
NASA/TM 2005-213568 An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation Steve Bauman Glenn Research Center, Cleveland, Ohio March 2005 The NASA STI Program Office... in Profile
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Interagency National Security Knowledge and Skills in the Department of Defense
INSTITUTE FOR DEFENSE ANALYSES Interagency National Security Knowledge and Skills in the Department of Defense June 2014 Approved for public release; distribution is unlimited. IDA Document D-5204 Log:
A GPS Digital Phased Array Antenna and Receiver
A GPS Digital Phased Array Antenna and Receiver Dr. Alison Brown, Randy Silva; NAVSYS Corporation ABSTRACT NAVSYS High Gain Advanced GPS Receiver (HAGR) uses a digital beam-steering antenna array to enable
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Mobile Robot Knowledge Base
Mobile Robot Knowledge Base Tracy Heath Pastore* a, Mitchell Barnes** a, Rory Hallman b b SPAWAR Systems Center, San Diego, Code 2371, 53560 Hull Street, San Diego, CA 92152; b Computer Sciences Corporation,
Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX)
NASA/CR 2005-213422 AIAA 2004 6361 Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX) William A. Maul, Amy Chicatelli, and Christopher E. Fulton Analex
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Software Security Engineering: A Guide for Project Managers
Software Security Engineering: A Guide for Project Managers Gary McGraw Julia H. Allen Nancy Mead Robert J. Ellison Sean Barnum May 2013 ABSTRACT: Software is ubiquitous. Many of the products, services,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking
A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking Dr. Alex Bordetsky LCDR Glenn R. Cook Dr. Bill Kemple LCDR Timothy Thate Naval Postgraduate School Department of Information
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Dr. Gary S. E. Lagerloef Earth and Space Research, 1910 Fairview Ave E
Establishing a NOAA Operational Data Center for Surface Currents Derived from Satellite Altimeters and Scatterometers; Pilot Study for the Tropical Pacific Including the Hawaiian Islands and US Territorial
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Simulation of Air Flow Through a Test Chamber
Simulation of Air Flow Through a Test Chamber by Gregory K. Ovrebo ARL-MR- 0680 December 2007 Approved for public release; distribution unlimited. NOTICES Disclaimers The findings in this report are not
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SECURITY INFORMATION AND EVENT MANAGEMENT TOOLS AND INSIDER THREAT DETECTION by Christopher J. Callahan September 2013 Thesis Advisor: Co-Advisor:
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Microstructural Evaluation of KM4 and SR3 Samples Subjected to Various Heat Treatments
NASA/TM 2004-213140 Microstructural Evaluation of KM4 and SR3 Samples Subjected to Various Heat Treatments David Ellis and Timothy Gabb Glenn Research Center, Cleveland, Ohio Anita Garg University of Toledo,
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
Cyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) [email protected] www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
Course Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
The 5 Cybersecurity Concerns You Can t Overlook
The 5 Cybersecurity Concerns You Can t Overlook and how to address them 2014 SimSpace Corporation The 5 Cybersecurity Concerns You Can t Overlook CONCERN 1 You don t know how good your cybersecurity team
