Laboratory Based Courses on Internet Security

Slides:



Advertisements
Similar presentations
CS5038 The Electronic Society
Advertisements

Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
SIS - Security Lab Introductory Session University of Pittsburgh 2006.
Security+ Guide to Network Security Fundamentals
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
IS Network and Telecommunications Risks
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
Firewall Slides by John Rouda
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
A First Course in Information Security
A Laboratory Based Course on Internet Security Prabhaker Mateti Wright State University Dayton, OH NSF DUE
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
COEN 252 Computer Forensics
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Computer Networking Course Introduction Dr Sandra I. Woolley.
Computer & Network Security
COEN 252 Computer Forensics Collecting Network-based Evidence.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
Computer Networking A few notes on reading Dr Sandra I. Woolley.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
The Internet Teaching Lab and Courses at UMass Amherst Brian Neil Levine Department of Computer Science University of Massachusetts, Amherst.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
UNIT 3 SEMINAR Unit 3 Chapter 3 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Module 11: Designing Security for Network Perimeters.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Module 10: Providing Secure Access to Remote Offices.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
SIS - Security Lab Introductory Session University of Pittsburgh 2008.
Laboratory Based Courses on Internet Security Prabhaker Mateti Wright State University Dayton, OH NSF DUE
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006.
Last updated: 28 April, 2006 Tomas B. Krag ItrainOnline MMTK: 1 Linux based Infrastructure Developed by: Tomas B. Krag, wire.less.dk.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
IT 244 Week 8 DQ 3 To purchase this material link 244-Week-8-DQ-3 For more courses visit our website
Computer Data Security & Privacy
Laboratory Based Courses on Internet Security
Welcome To : Group 1 VC Presentation
Security in Networking
Malware, Phishing and Network Policies
PPPoE Internet Point to Point Protocol over Ethernet
Module 7 Questions Prepared by Mr O Seguna next.
Lecture 3: Secure Network Architecture
Test 3 review FTP & Cybersecurity
Presentation transcript:

Laboratory Based Courses on Internet Security Prabhaker Mateti Wright State University Dayton, OH 45435 NSF DUE-9951380

Goals Teach security improvement techniques Explain how exploitable errors have been made in the development of software. Raise the level of ethics awareness Bring attention to legal issues

Term or Semester Course Ten or 15 weeks Lectures on topic one per week Lectures on experiment one per week Lab experiments one per week

Short Course 3-days, 18 hrs, 6 lectures Five experiments

Currently Available Material “There is an oceanic amount of material on network security available over the Internet.” -- A Web Page. COAST http://www.cerias.purdue.edu/coast/ Ronald Rivest, theory.lcs.mit.edu/~rivest/crypto-security.html Avi Rubin, www.cs.nyu.edu/~rubin/courses.html …

Text Books on Security Many text books, > 100 Chapman and Zwicky 1995 Cheswick and Bellovin 1994 Cobb 1996 Garfinkel and Spafford 1996 Kaufman et al. 1995 Stein 1997 Stallings 2000

Table of Contents of a Lab Handout Summary Educational Objectives Background Information Pre-Lab and Suggested Preparation Procedures Appendix A: Acronyms Appendix B: Further Reading Links Notes to TAs Procedures Step 1, 2, … Report on the Experiment Demo Achievement Test Concluding Activities Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Experiments being Developed Experience Serious Nuisance Trojan Horses, Viruses and Worms Experience Selected PC Viruses Password Cracking Privacy and Authentication of a User Proper Conf of Security for Personal Machines Security Fortification for Personal Machines Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Experiments being Developed Hostile Applets in Java and ActiveX Virtual Private Networks Buffer Overflow and Other Bug Exploitation Probing a Host for Weakness Security Software Setting Up a Linux PC as a Packet Filtering Router Commercial Products Lab Courses on Internet Security/ pMateti@cs.wright.edu

CEG 499: Internet Security Computer System Security TCP/IP exploits Firewalls Secure e-Commerce Transactions Ethics and Legal Issues

Setting the Lab up Lab Operating Systems Operating Systems and Internet Security 26 PC s (PIII 450MHz, 128 MB RAM, 13 GB HDD) 8 Fast Ethernet Switches Operating Systems Linux 2.2.10 Windows NT 4 sp 6 Windows 98 SR2

IP Filtering Router Firewall All the lab PCs are on 192.168.*.* Internet connections are through the Firewall IP masquerading

Security Software Sniffers Firewall kits nmap, tcpdump, iptraf, and ntop

CEG 499: Internet Security/ System Security Booting sequence Passwords User privileges File Permissions

Setting the Lab up/Security Software Secure Shell Sniffing Programs Firewall Kits