A Low Cost, Portable Platform for Information Assurance and Security Education Dan C. Lo, Kai Qian Department of Computer Science and Software Engineering.

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Security Issues and Challenges in Cloud Computing
System and Network Security Practices COEN 351 E-Commerce Security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Securing Information Systems
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Information Security and Computer Systems: An Integrated Approach Mark A. Holliday and Bill Kreahling, Dept of Mathematics and Computer Science Western.
Software Security Testing Vinay Srinivasan cell:
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Ingredients of Security
IS3220 Information Technology Infrastructure Security
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Citrix Academic Network
Chapter 1 Computer Technology: Your Need to Know
Virtual Private Networks and IPSec
“New security software vendors are coming into the marketplace offering solutions that provide support to the development environment. Example vendors.
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 5 Network Security Protocols in Practice Part I
Penetration Testing: Concepts,Attacks and Defence Stratagies
Manuel Brugnoli, Elisa Heymann UAB
Chapter 7: Identifying Advanced Attacks
Network Security Basics: Malware and Attacks
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Introduction to Networking
Chapter 2: Basic Switching Concepts and Configuration
Security in Networking
Resource Management Chapter 19 9/20/2018 Crowley OS Chap. 19.
Cloud Testing Shilpi Chugh.
Cisco Dumps PDF Implementing Cisco Network Security RealExamCollection.com.
Nessus Vulnerability Scanning
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
CS-3013 Operating Systems Hugh C. Lauer
Introduction to Network Security
Comparison to existing state of security experimentation
Security: Exploits & Countermeasures
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
Module 4 System and Application Security
Session 20 INST 346 Technologies, Infrastructure and Architecture
Security: Attacks & Countermeasures
Introduction to Networking Security
Ethical Hacker Pro IT Fundamentals Pro
Computer Science Dr Hwang Chair, Computer Science Department
OU BATTLECARD: Oracle WebCenter Training
Cloud Computing for Wireless Networks
Presentation transcript:

A Low Cost, Portable Platform for Information Assurance and Security Education Dan C. Lo, Kai Qian Department of Computer Science and Software Engineering Kennesaw State University, Marietta, GA {clo, kaiqn}@spsu.edu Wei Chen Department of Computer Science Tennessee State University Wchen@tnstate.edu

Motivations Massive growth in mobile devices Security raised to national concerns Lack of mobile application development workforce Hard to maintain a network lab Lack of educational materials, especially hands-on teaching modules High demands in online delivery

Some Figures in Year 2014 A survey in University of Florida shows 98% of students with mobile devices. (1/2014) Worldwide shipments of smart phones will reach 1.9 billion in 2015. Worldwide shipments of tables (300 million) will exceed PCs after 2014. Android 1.9 billion vs. IOS (iPhone OS) 682 million (2014). App downloads will reach 269 billion in 2017. Mobile APP development jobs are best through 2020. Mobile payment transactions to $1 trillion by 2015. SPSU ranked top 7 for the 2015 best colleges for online CS degrees (ComputerScienceOnline.org)

PLab Learning Platform

Rationales in our Learning Model Communicate young generations using their language and approach Hands-on learning materials engage students in subjects such as networking and security The best defense is attack. Curriculum with real world applications will better prepare students for the workforce. Portable isolated networking platform

Isolated Network A network that does not connect to Internet. it must keep the isolated information inaccessible to users on the Internet, it must ensure that authorized users can access only the type of information they are authorized to access

Reasons Why Isolated users are prevented from inadvertently releasing sensitive data or vulnerability information to the Internet. users are prohibited to bring in malicious software, such as “programs with Trojan horses or other malicious logic.” users within the isolated network are prevented from intentionally passing information to the Internet, and prevented from running an attack against an Internet host. training systems can be created in an isolated network that should not be used elsewhere. administrative limitations can be placed on the systems that may not be feasible on departmental machines. isolation of the lab denies external attackers a launch platform from within the department.

How about online courses? High demand in online delivery that requires a low cost learning platform. Also the need to learn anytime anywhere – portable.

PLab Setups Reverse Tethering on Rooted Devices (sharing PC internet connection) via a USB Cable Connecting Android Devices to a Laptop Computer Using a Virtual Router PLab Configuration Using USB Tethering PLab Configuration Using WiFi Hotspot

Reverse Tethering on Rooted Devices via a USB Cable

PLab Configuration Using USB Tethering

A Comparison Among Different PLab Configurations Power Consumption Rooted Devices Needed Software USB Reverse Tethering Low Yes Reverse tethering tool Virtual Router Medium No Virtual router software USB Tethering No if there is one in the device WiFi Hostspot High

Labware Design We host labware in a Google site: https://sites.google.com/site/iasoncs Each contains the following: 1 Overview 2 Learning Objectives 3 Ethics 4 Suggested Targeting Courses 5 Activities 5.1 Pre-Lab Activities 5.2 Lab Activities 5.3 Post-Lab Activities 6 Review questions and answers 7 Assignments 8 Projects 9 References

Proposed Learning Modules Network Security Database Security Defensive Programming Web Security Systems Fundamentals

Network Security Internet protocol (IP) IP Spoofing and countermeasures TCP 3-way handshaking protocol, TCP SYN flood attack, Man-in-the-middle attacks and countermeasures Sniffing and traffic redirection (routing) attack with their countermeasures Network intrusion detection and prevention Cryptography (secure/unsecure channels, attackers and their capabilities, encryption, decryption, keys, signatures, cipher types, public key infrastructure, etc.)

Database Security Security challenges for databases Access Control (authentication, verify who you are, and authorization, verify that you have access to something) Data protection with encryption SQL Injection Attack examples Preventing attacks

Web Security Web App security Cross-site scripting Custom Application Scripting HTTP/HTTPS Authentication Cookie Manipulation Frames busting Browser security

Defensive Programming Secure input validation and output handling Buffer overflow attack and prevention Access Control and Confidential Information Injection and Inclusion Accessibility and Extensibility Mutability Serialization and Deserialization

Systems Fundamentals Root of Trusts Secure Application Programming Interfaces Policy Enforcement Engine Memory protection hardware (DEP) Instruction set architecture: privileged instruction and dual mode operation Encryption/decryption hardware Assembly programming

Acknowledgment This material is based in part upon work supported by the National Science Foundation under Grant Numbers 1438858, 1438924, 1244697, and 1241651. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.