Cyber Exercises, Small and Large



Similar documents
Small-Scale Cyber Security Competitions

Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

The Open Cyber Challenge Platform *

Directory and File Transfer Services. Chapter 7

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INFORMATION SECURITY TRAINING CATALOG (2015)

CyberNEXS Global Services

Networking: EC Council Network Security Administrator NSA

Jort Kollerie SonicWALL

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Protecting Your Organisation from Targeted Cyber Intrusion

Cyber Essentials. Test Specification

74% 96 Action Items. Compliance

Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives

Minnesota State Community and Technical College Detroit Lakes Campus

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

Loophole+ with Ethical Hacking and Penetration Testing

Security + Certification (ITSY 1076) Syllabus

Active Learning with the CyberCIEGE Video Game

The Protection Mission a constant endeavor

Principles of Information Assurance Syllabus

FORBIDDEN - Ethical Hacking Workshop Duration

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Building the Next Generation of Computer Security Professionals. Chris Simpson

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Virtual Learning Tools in Cyber Security Education

Introduction to Cyber Security / Information Security

Detailed Description about course module wise:

EC-Council Certified Security Analyst (ECSA)

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Critical Controls for Cyber Security.

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Attack and Penetration Testing 101

How To Protect Your Network From Attack From A Hacker (For A Fee)

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Linux Operating System Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

information security and its Describe what drives the need for information security.

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Computer Network Engineering

CYBERTRON NETWORK SOLUTIONS

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network Security Solution. Arktos Lam

A Systems Engineering Approach to Developing Cyber Security Professionals

NE-6416D Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

2016 TÜBİTAK BİLGEM Cyber Security Institute

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

INFORMATION SECURITY TRAINING CATALOG (2016)

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall

Learn Ethical Hacking, Become a Pentester

MS-6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Policy on Connection to the University Network

Step-by-Step Configuration

CRYPTUS DIPLOMA IN IT SECURITY

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Hackers are here. Where are you?

Recommended IP Telephony Architecture

MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Jumpstarting Your Security Awareness Program

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

VMware ESX Server 3 Configuration Guide

How To Prevent Hacker Attacks With Network Behavior Analysis

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Setting Up Scan to SMB on TaskALFA series MFP s.

VMware: Advanced Security

ICANWK406A Install, configure and test network security

Turn-Key Penetration Testing Labs

Chapter 1 The Principles of Auditing 1

CCNA Security v1.0 Scope and Sequence

IT- NETWORK SYSTEMS ADMINISTRATION TI - GESTION DE RÉSEAUX POST- SECONDARY NIVEAU POSTSECONDAIRE

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Achieving PCI-Compliance through Cyberoam

Locked Shields Kaur Kasak 24 Sept 2013

Microsoft Technologies

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

SecurityMetrics Vision whitepaper

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Standard: Network Security

DESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Transcription:

First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis, Maryland U.S.A. bilzor@usna.edu

Cyber Exercise - Small In the Classroom

Intro to Cyber Security Freshman (first year) class, ~18-year-old students One-semester course, ~600 students per semester Taken by all students, regardless of intended major No background knowledge assumed First offered in 2011-2012 academic year

Course Outline - Three Sections The Cyber Battlefield Public Site: http://www.usna.edu/cs/si110/ Digital data, computer components, operating systems, programs Web: Servers, browsers, HTML, build your own webpage, scripting, injection attacks, cross-site scripting Networks: Protocols, build-a-lan lab, wireless networks Models and Tools Information assurance, firewalls, authentication and cryptography, certificates Cyber Operations Forensics, malware, network reconaissance, network attack, network defense

Exercise - End of Semester Course culmination - three labs, each 2 hours long Network Reconaissance Network Attack Network Attack and Defense

Classroom Cyber Exercise Each class (20 students) divided into two teams Each team has 10 students, one student leader Blue Net Student Workstations DNS Entire setup is virtual DNS Gold Net Student Workstations Workstation Red Net Workstation Webserver Instructor Webserver Router Gateway Switch Gateway Router

Classroom Cyber Exercises Tools Central servers - three VMWare ESX servers Student and Instructor client - VSphere Client Exercise target virtual machines to attack/defend Windows Server 2003 Windows XP Ubuntu Linux Student virtual workstations Backtrack 5

Conduct Offense: semi-scripted initially, with "hints" on vulnerabilities Metasploit Framework attacks - denial of service, password cracking, etc. Defense: strengthen passwords, encrypt valuable information, construct firewall rules, remove/restrict unnecessary accounts, privileges, and services Goals: Capture the flag - adversary data token Compromise adversary services: accounts, web site, DNS, etc.

Observations and Lessons Need most/all of one semester of instruction for freshmen (1st year) to develop necessary skills, even for introductory/semi-scripted cyber exercise Can't overstate the value of: VMWare ESX Server and VSphere Client Administration of setup using Windows Powershell These tools allow for changing exercise configuration in hours, and clean restart of all virtual machines in minutes (e.g., between consecutive class periods)

Cyber Exercise - Large Multiple Universities: CDX

CDX: Cyber Defense Exercise Designed for military school students Faculty coach, but students perform all exercise tasks Currently defense only (no attack) Sponsored by NSA Exercise occurs annually, over three days in April Regular Participants U.S. Naval Academy U.S. Air Force Academy U.S. Military Academy U.S. Coast Guard Academy U.S. Merchant Marine Academy U.S. Naval Postgraduate School Air Force Institute of Technology Royal Military College of Canada

CDX: Conduct NSA Publishes annual directive, network specification Establishes VPN tunnel with each participating school Serves as "red team" attacker Keeps score Scoring basis: Service availability Data confidentiality Data/System integrity

CDX: Services to Defend DNS Active Directory Network Time Protocol E-Mail: SMTP, IMAP FTP IPv4 and IPv6 VoIP User workstations Web server Remote access SSH or RDP Attack/Defend Window 0900-2200 each day, for 3 days

CDX: Attacks Red Cell attacks are unclassified, but representative of common real-world threats May use Metasploit Framework or other publicly avavailable hacking tools

CDX Philosophy Current focus: students build network systems from scratch, to be as secure as possible Must provide services (e-mail, chat, DNS, SSL, etc.), but students choose the configuration and the software Possible future alternative: each school receives identical pre-built network virtual images NSA pre-builds the networks and services Images contain some hidden vulnerabilities Students first examine and secure the networks (patch, update, restrict services, etc.), then defend them

Observations and Lessons Systems are 100% virtual - VSphere, ESX Commercial classes are expensive, but valuable SANS, etc. During the exercise, students run the show Using many different geographic locations is okay Scoring is automated, but there are always debates regarding points After all, it's a competition

Questions?