Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Role of Vendor Technologies in the Development of Network Professionals Mak Sharma and Sharon Cox School of Computing, Telecommunications and Networks.
HIPAA Security Standards What’s happening in your office?
Secure Computing Network
1 Positive Learning Outcomes Through Problem-Based Learning Willie Yip Department of Computing.
Security Controls – What Works
Firewall Configuration Strategies
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Term Project Teams of ~3 students Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
SEC835 Database and Web application security Information Security Architecture.
Intranet, Extranet, Firewall. Intranet and Extranet.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
© 2015 MONASH SOUTH AFRICA CONFIDENTIAL & PROPRIETARY.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Joseph Ferracin Director IT Security Solutions Managing Security.
CPMT 1451 IT Essentials: PC Hardware and Software ITCC 1301 Cisco Exploration 1: Network Fundamentals ITCC 1304 Cisco Exploration 2: Routing Protocols.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Module 11: Remote Access Fundamentals
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Networks.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Module 11: Designing Security for Network Perimeters.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Information Security tools for records managers Frank Rankin.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
On completion of the scenario, students will be able to: Learning Outcomes 1 Critically analyse and prioritise information security risks. 2 Systematically.
Technical Business Consultancy Project
Secure Software Confidentiality Integrity Data Security Authentication
Securing the Network Perimeter with ISA 2004
Lecture 14: Business Information Systems - ICT Security
Welcome To : Group 1 VC Presentation
Columbus State University
IS4550 Security Policies and Implementation
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CMGT 431 Teaching Effectively-- snaptutorial.com.
CMGT 431 STUDY Education for Service- -cmgt431study.com.
Unit 27: Network Operating Systems
Design Unit 26 Design a small or home office network
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Security week 1 Introductions Class website Syllabus review
Global One Communications
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College

Agenda  What is PBL?  Why use PBL?  How did we use it?  Example  Issues  Success  Questions, comments … insults?

Problem-Based Learning (PBL) In teams, students are given a problem they don’t know how to solve. & they devise a strategy to solve it. In teams, students are given a problem they don’t know how to solve. & they devise a strategy to solve it.

Why PBL?  Starts where they are  Learning is relevant & effective  They learn what they need to solve the problem  Develop skills:  problem solving, critical analysis, team work, reasoning, reflection, manage uncertainty  Employability Motivational

PBL and security  PBL works best with ill-defined (messy) real-world problems that have a number of alternative solutions and are open ended.  Security provides a rich environment for such scenarios

How? - Example  Systems & network Security module  15 credit final year undergraduate module  2 hours per week PBL tutorial / Lab session  4/5 weeks in lab  Teams of 5 students  Coursework + Seen exam  Prior knowledge – LAN module

Learning Outcomes  Critically and systematically analyse the exposure to security threats of a networked computer system  Formulate a reasoned and appropriate plan to address the risks in a networked computer system  Use appropriate tools to implement aspects of security in a networked computer system

Key skills assessed  Problem-solving  Communication  Working with others  Improving own learning and performance

PBL Scenario  Ace Training Ltd – IT training company with head office Liverpool, Training centre: Manchester  Small 100BaseT LAN in each office (one server) g in Liverpool for Laptops.  Restricted Internet access (mgt only). No internal

PBL Scenario  Liverpool office:  Sales dept (11) use Sage Act! and MS Office.  Accounts Dept use Sage Line 50  Personnel data also stored.  Marketing dept use QuarkXPress

PBL Scenario  The board of directors has now decided to extend the network with the following requirements:  and internet access for all staff in Liverpool.  Host its own Web site in Liverpool (with a view to ultimately incorporating some form of e-commerce & on-line course booking).  Enable the Training Centre manager and administrators to access various company data on the Liverpool server

PBL Scenario The board are aware that they do not have the expertise to develop an ISMS and have called you in to help them. Your terms of reference are:  To perform a systematic risk assessment of the security threats to the company assets, and provide recommendations for risk treatment.  To design and present a proposal for a secure network architecture to meet the present requirements and construct a demonstration network to show proof of concept

Expected Clarification Issues  Eg:  Company Assets  Policies  requirements  Availability requirements  Network details (eg resilience features)  Laptop usage

Expected Learning Issues  What should an ISMS consist of?  Confidentiality, Availability, Integrity  BS 7799  Threats and Vulnerabilities  Risk Assessment & treatment  Legal Issues

Expected Learning Issues  IP subnetting and NAT  Security architecture/ technology  Firewalls, DMZ, IDS  Encryption  Authentication and Authorization  Secure transmission – VPN / SSL

Expected Learning Issues  Configuring Software for demonstration  CheckPoint  Win2k Routing  IIS

Resources  Set book  Panko (2004) Corporate Computer & Network Security  BS7799 parts 1 & 2  Internet resources  Lab session on routing and CheckPoint configuration  Seminar on subnetting

Deliverables (assessed)  Reports  Risk assessment  Proposed architecture / technologies used with justification and consideration of alternatives.  Demonstration network (5 PCs)  Individual research reports  Team Presentation

Lab resources  Each team has 5 hard disks/ caddies + 5 PCs with several NICs in each, connected to patch panel.  Team has two switches.  Hard disks pre-installed with Win2k Server, one has CheckPoint firewall.

Example solution for similar scenario - Firewall rules also provided

Typical team lab setup

Issues  Level of detail  Can be superficial - need to question thoroughly  Lab issues – configuration problems with routers/ CheckPoint

Successes  Team work  Motivation  Research-based solutions  Variation in solutions

The Secret of success?