The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006.

Slides:



Advertisements
Similar presentations
Educating System Testers in Vulnerability Analysis: Laboratory Development and Deployment Leonardo A. Martucci, Hans Hedbom, Stefan Lindskog, and Simone.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
04/07/06 DePaul University - Teaching and Technology Conference Remote Networking Labs for Hands-on Exercises James Yu, Ph.D. Scholl of CTI DePaul University.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Potions of Protection Server Security. What does that do again? Familiarity Differing levels of protection –Low, does not exist –Medium, No private data.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
1 Host – Based Intrusion Detection “Working of Tripwire”
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Introduction to Computer Administration System Administration
Chapter 3  Manage the computer’s resources ◦ CPU ◦ Memory ◦ Disk drives ◦ Printers  Establish a user interface  Execute and provide services for applications.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
1 Creating a Virtual Laboratory to Teach Information Assurance Courses Online Dr. Wayne Summers & Dr. Bhagyavati Columbus State University Columbus, Georgia.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Computer Networking Course Introduction Dr Sandra I. Woolley.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 14: Configuring Server Security Compliance
Windows 7 Firewall.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
CS 390 Unix Programming Summer Unix Programming - CS 3902 Course Details Online Information Please check.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA About the Hands-on Lab.
Module 9: Fundamentals of Securing Network Communication.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
STORMWATER UTILITY MANAGEMENT SYSTEM (SUMS) GIS Application with Web Service Data Access.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Fundamentals of IT Essentials 2: Network Operating Systems Mike Milford.
Kickstart Installation
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Vulnerability Assessment Using SAINT Jane Lemmer Information Security Specialist World Wide Digital Security, Inc.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
SCSC 455 Computer Security Chapter 3 User Security.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Chapter 11: Managing Users
Chapter 8 File Security.
FTP - File Transfer Protocol
Introduction to Networking
Printers.
LINUX SECURITY Dongmei Wu ID: /25/00.
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Operating System Security
Linux Security.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Presentation transcript:

The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006

Overview of talk Overview of the COSC 316 course –Course background –Concepts and hands on exercises covered –Teaching resources Experiences and challenges So, what? Possible solution

Course background Interdisciplinary course for the Criminology, Business students, Communications, and Computer. Introduces the theory and concepts of host computer security. –Security building blocks for a Linux host Pre-requisite -Problem Solving and Structured Programming.

Main concepts covered Users, Passwords and authentication Users, Groups and the Super user, File systems and Security Cryptography Basics Defending accounts Integrity Management Auditing and Logging Vulnerability assessment Introduction to digital forensics

Basis for the course “The security blocks form a sound defense strategy of multiple layers. If one layer is penetrated, there are still other layers of protection. “

Hands-on exercise Introduction to Unix commands and utilities Password crackers, PAM module, integrity checking, password configuration files. User Private Groups and sharing of devices in groups. Defending accounts utilities- protecting of root account, sudo utility, sudoers files, checking for root kits, lsof tool

Hands-On exercise File permissions- use of chmod and umask utility, sticky bit, SUID bit, SGUID bits Tripwire tool for integrity checking Auditing and logging- use of logging tools; swatch, logcheck, logrotate, pacct. PGP tool; sending keys to the server. Tool capstone project-Sara, Rat, Nessus, Hunt, Ethereal, Squid, Satan, Protsentry, and Internet Security Scanner.

Teaching Resources An isolated network security laboratory with 22 Red Hat Linux 9.2 servers, 10 Cisco 2600 series routers and 10 PIX firewalls. Text: Garfinkel. S, Spafford, G, Schwartz. A; Practical Unix and Internet Security; O’Reilly; Third edition; 2003.

Positive experiences Linux is free; we are using Red Hat 9.1. There is an abundance of freely downloadable Linux security tools. Tutorials and documentation are available with most of the tools, which can be tailored to one’s teaching environment. Positive feedback has been received from students on the use of hands-on exercises.

Positive experiences The password cracking, accounts defending, groups security, Tripwire, PGP exercise and the capstone tool project were very interesting as for activities performed (from student evaluations).

Challenges Research tool exercise is interesting for computer science majors but a challenge for non-computer science majors. –Extensive documentation with some of the assigned tools. –The challenging installation process –some tools require advanced Unix/Linux knowledge, and, –Output from some of the tools is sometimes not easy to understand it requires an understanding of basic network concepts.

Challenges There is a need to include Windows tools as highlighted both in the course student evaluations and by the dept Interns. Windows tools are however usually commercial. Given a choice between Windows and Linux, 95% of the students chose Windows Trial versions for the capstone project.

Solution Designed a prerequisite for this course COSC216 to introduce students to the Windows and Linux operating systems and basic information assurance topics. Course has only been taught once.