SEC.FAIL Information Security Defense Lab Setup. SEC.FAIL Instructions Each team will need to operate on a separate system profile. For the labs, you.

Slides:



Advertisements
Similar presentations
Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Advertisements

Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Module 5: Configuring Access for Remote Clients and Networks.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Secure Messaging Nick Hall & James Clifford Microsoft.
E-business Infrastructure
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
0-1 Team # Status Report (1 of 4) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team #: Team Name.
Web Server Administration
Creating WordPress Websites. Creating a site on your computer Local server Local WordPress installation Setting Up Dreamweaver.
0-1 Team # Status Report (1 of 4) Client Contact –Status Point 1 –Status Point 2 Team Meetings –Status Point 1 –Status Point 2 Team Organization –Description.
MCT260-Operating Systems I Operating Systems I Networking.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Business Strategies A strategic view of the various options and connectivity levels available to business through the Internet. Copyright 2011.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
Chapter 7: Using Windows Servers to Share Information.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Transition to Managed Services 0 Microsoft E-Learning IT Infrastructure Partnership Team August 26, 2008.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Network Operating Systems versus Operating Systems Computer Networks.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Team Members ? ? Chintan Goswami Nirav Tank Project Guide ? ? Mrs. Darshana H. Patel [Internal] Mr. Manish I. Vora [External]
Internet Advertising John Campione CBS Co./ WebRamp.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Windows 2000 Server Active Directory Groups User Accounts Frank Schneemann.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Eurostat November 2015 Eurostat Unit B3 – IT and standards for data and metadata exchange SDMX IT Tools Test Client Jean-Francois LEBLANC Christian SEBASTIAN.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Computer Security By Duncan Hall.
Internet Engineering Course Outline. Internet Engineering Course; Sharif University of Technology Aims and Contents To attain necessary skills for handling.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Hostway Confidential & Proprietary Introduction to Web Hosting.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Information Resources at University of Worcester Information and Learning Services.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 7. Identifying Assets and Activities to Be Protected
Stop Those Prying Eyes Getting to Your Data
CIS 333 Course Experience Tradition/ snaptutorial.com
MODULE 10 – PROJECT SERVER
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Tool Server Workstation Router Universal
NTC 324 RANK Lessons in Excellence-- ntc324rank.com.
NTC 324 RANK Perfect Education/ ntc324rank.com.
NTC 324 RANK Education for Service-- ntc324rank.com.
Building a Security Operations Center
Virtual Private Network
Configuring Internet-related services
Firewalls Jiang Long Spring 2002.
Designing IIS Security (IIS – Internet Information Service)
Module 1: Overview of Systems Management Server 2003
Pass-the-Hash.
Presentation transcript:

SEC.FAIL Information Security Defense Lab Setup

SEC.FAIL Instructions Each team will need to operate on a separate system profile. For the labs, you will need to establish these profiles before the start of Level 0. Each system profile should include the following: A high level business description of what the system does, sufficient for the team to determine information classification based on business purpose. A list of computer assets, including basic information about the operating system and system software A network map of how these are interconnected and a disconnected connection to the central network A list of user names and passwords necessary to access all related infrastructure and systems A IP address space confinement so that the connected systems don’t conflict

SEC.FAIL Strengths and Weaknesses The purpose of the lab is for the teams to understand the risk profile of each system profile and learn how to protect it. They are similar in purpose, but not necessarily in mitigation techniques. Before game play starts, you need to understand each system profile and have a strategy for the following:  Identify critical assets and services that must be available to the common network.  Identify components for a protection strategy which can be leveraged by the teams given their level of skill  Identify weaknesses for a protection strategy which provide sufficient threat which can be mitigated Remember, the goal isn’t to create a system that is invulnerable nor to create an attack that can’t be mitigated. It is to craft workable attacks that can be mitigated, and assist the teams in discovering techniques to manage the risk. Each system profile must have a problem capable of being solved by your teams.

SEC.FAIL Sample System Profiles

SEC.FAIL System Profile “Alpha” Office Productivity / Common Office Environment Business Purpose  Provide common office environment for corporate users productivity software. System Profile  Windows 2012 R2 Domain Controller with DNS/DHCP  Windows 2012 R2 SharePoint 2013 Server with Embedded SQL  Windows 7 Client with Office 2012  pfSense Firewall To Be Protected  SharePoint site contains business confidential information  Internet Facing SharePoint Site Username: Password:

SEC.FAIL System Profile “Beta” / Common Office Environment Business Purpose  Provide common office environment for corporate . System Profile  Windows 2012 R2 Domain Controller with DNS/DHCP  Windows 2012 R2 Exchange 2013  Windows 7 Client with Office 2012  pfSense Firewall To Be Protected  Exchange box contains business confidential information  Internet facing SMTP/OWA services Username: Password:

SEC.FAIL System Profile “Gamma” WordPress Blogging Site Business Purpose  Provide internet facing blog site System Profile  Ubuntu Linux LTS Server LAMP Server with WordPress  Ubuntu Linux LTS Server MySQL Server  Ubuntu Workstation with Firefox  pfSense Firewall To Be Protected  Internet facing web page Username: Password:

SEC.FAIL System Profile “Delta” Corporate Web Presence Business Purpose  Provide internet facing CRM customer web site System Profile  Ubuntu Linux LTS Server LAMP Server with Sugar CRM  Ubuntu Linux LTS Server MySQL Server  Ubuntu Workstation with Firefox  pfSense Firewall To Be Protected  Internet facing web page Username: Password: