Laboratory Based Courses on Internet Security

Slides:



Advertisements
Similar presentations
Operating System.
Advertisements

Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
SIS - Security Lab Introductory Session University of Pittsburgh 2006.
IS Network and Telecommunications Risks
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Lesson 19: Configuring Windows Firewall
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
Firewall Slides by John Rouda
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
A First Course in Information Security
A Laboratory Based Course on Internet Security Prabhaker Mateti Wright State University Dayton, OH NSF DUE
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Network Operating Systems Week 9.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
DTS Web Hosting, Rates And Services Web Hosting Internet Services Unit May 2006.
Hands-On Ethical Hacking and Network Defense
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1  A network is a connected collection of devices (computers, interconnections, routers, and.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Chapter 9: Novell NetWare
Computer Networking Course Introduction Dr Sandra I. Woolley.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
COEN 252 Computer Forensics Collecting Network-based Evidence.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Linux Operations and Administration Chapter Two Installing OpenSUSE.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Lesson 11: Configuring and Maintaining Network Security
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
SIS - Security Lab Introductory Session University of Pittsburgh 2008.
Laboratory Based Courses on Internet Security Prabhaker Mateti Wright State University Dayton, OH NSF DUE
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
EDN 303 Unit 7 – Class Online Monday, November 23 rd Dr. Dennis S. Kubasko, Jr. Associate Professor.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
IT 240 OUTLET The learning interface/it240outletdotcom.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Instructor Materials Chapter 8 Configuring Cisco Devices
Welcome to CS 340 Introduction to Computer Networking
Laboratory Based Courses on Internet Security
Introduction to Information Security
© 2015 Air Force Association
CompTIA Server+ Certification (Exam SK0-004)
Computer Data Security & Privacy
Security Fundamentals
Welcome To : Group 1 VC Presentation
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
PPPoE Internet Point to Point Protocol over Ethernet
Delivering Distance Learning Experiments in Local Area Networking
Linux Operations and Administration
Lecture9: Embedded Network Operating System: cisco IOS
Test 3 review FTP & Cybersecurity
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

Laboratory Based Courses on Internet Security Prabhaker Mateti Wright State University Dayton, OH 45435 NSF DUE-9951380

Goals Teach security improvement techniques Explain how exploitable errors have been made in the development of software. Raise the level of ethics awareness Bring attention to legal issues

Term or Semester Course Ten or 15 weeks Lectures on topic one per week Lectures on experiment one per week Lab experiments one per week

Short Course 3-days, 18 hrs, 6 lectures Five experiments

Currently Available Material “There is an oceanic amount of material on network security available over the Internet.” -- A Web Page. COAST http://www.cerias.purdue.edu/coast/ Ronald Rivest, theory.lcs.mit.edu/~rivest/crypto-security.html Avi Rubin, www.cs.nyu.edu/~rubin/courses.html …

Text Books on Security Many text books, > 100 Chapman and Zwicky 1995 Cheswick and Bellovin 1994 Cobb 1996 Garfinkel and Spafford 1996 Kaufman et al. 1995 Stein 1997 Stallings 2000

Lab Courses on Internet Security/ pMateti@cs.wright.edu What We Are Developing About 30 lectures, 75 minutes each About 15 lab experiments, 2 hours each A Support web site Lab Courses on Internet Security/ pMateti@cs.wright.edu

Contents of a Lab Handout Title Summary Educational Objectives Background Information Pre-Lab and Suggested Preparation Procedures Appendix A: Acronyms Procedures Step 1, 2, … Report on the Experiment Demo Achievement Test Concluding Activities Notes to TAs Appendix B: Further Reading Links Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Experiments being Developed Experience Serious Nuisance Trojan Horses, Viruses and Worms Experience Selected PC Viruses Password Cracking Privacy and Authentication of a User Proper Conf of Security for Personal Machines Security Fortification for Personal Machines Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Experiments being Developed Virtual Private Networks Buffer Overflow and Other Bug Exploitation Probing a Host for Weakness Security Software Tools Setting Up a Linux PC as a Packet Filtering Router Hostile Applets in Java and ActiveX Commercial Products Lab Courses on Internet Security/ pMateti@cs.wright.edu

Setting the Lab up Lab Operating Systems Operating Systems and Internet Security 26 PC s (PIII 450MHz, 128 MB RAM, 13 GB HDD) 8 Fast Ethernet Switches Operating Systems Linux 2.2.10 Windows NT 4 sp 6 Windows 98 SR2

IP Filtering Router Firewall All the lab PCs are on 192.168.*.* Internet connections are through the Firewall IP masquerading

CEG 499: Internet Security Computer System Security TCP/IP exploits Firewalls Secure e-Commerce Transactions Ethics and Legal Issues

CEG 499: Internet Security/ System Security Booting sequence Passwords User privileges File Permissions

Setting the Lab up/Security Software Secure Shell Sniffing Programs Firewall Kits

Lab Courses on Internet Security/ pMateti@cs.wright.edu Current Status March 2000 Internet Security Lab CEG 499 Internet Security (Winter 2000) Short Course Labs Developed Support Web Site Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Courses on Internet Security/ pMateti@cs.wright.edu Internet Security Lab 429 Russ Engineering Center, WSU November 1999; In continuous use since 26 PCs in the lab for students' use, and one web server, one router + file server, and one PC for re-configuration experimentation. Lab Courses on Internet Security/ pMateti@cs.wright.edu

Internet Security Lab contd All the PCs are on a private LAN One Fast Ethernet switch for connecting a group of 4 PCs. Each PC is loaded with Linux 2.2 kernel (Caldera OpenLinux 2.3) Windows NT with service pack 6, Windows 98. The NT loader boot menu into one these OS. Lab Courses on Internet Security/ pMateti@cs.wright.edu

CEG 499 Internet Security (Winter 2000) Computer System Security (2 weeks) TCP/IP exploits (2) Firewalls (2) Secure e-Commerce Trans. (2) Ethics and Legal Issues (1) Guest Lecture from Mead, Inc. Lab Courses on Internet Security/ pMateti@cs.wright.edu

Short Courses Scheduled NAECON www.NAECON.org AFCEA INFOTEC 2000 http://www.txdirect.net/afcea/ backgrnd/ backgrnd.htm Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Courses on Internet Security/ pMateti@cs.wright.edu Labs Developed Will develop 15 lab experiments Finished 5, need refinements To Do: 10 Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Courses on Internet Security/ pMateti@cs.wright.edu Support Web Site Notes to Instructors Lab Maintenance Collection of Tools (src) Lecture Notes, and Slides Lab Handouts Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Courses on Internet Security/ pMateti@cs.wright.edu Lab Maintenance Reload OS images periodically Forgotten passwords, etc. Lab Courses on Internet Security/ pMateti@cs.wright.edu

Lab Courses on Internet Security/ pMateti@cs.wright.edu Links CEG 499 Home Page www.cs.wright.edu/~pmateti/Courses/499 OSIS Lab Home Page www.cs.wright.edu/~pmateti/OSIS Support Web Site www.cs.wright.edu/~pmateti/InternetSecurity/ Lab Courses on Internet Security/ pMateti@cs.wright.edu