CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC.

Slides:



Advertisements
Similar presentations
Security Issues in Mobile Code Systems David M.Chess, High Integrity Computing Lab, IBM T.J. Watson Research Center Hawthorne, NY, USA Mobile code systems.
Advertisements

Companies can suffer numerous problems due to poor management of resources and careless decisions. In real-world decision- making, many organizations lack.
Embedded DSP Spectrum Analyzer May 0104 April 25, 2001 Teradyne Corp Julie Dickerson Bill Black Prihamdhani AmranEE Ryan ButlerCprE Aaron DelaneyEE Nicky.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Dec I/O Laboratory Development Industrial Review Board Presentation December 12 th, 2001 Cpr E 211 Microcontroller Evolution.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
Chapter 1 – Introduction
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #18-1 Chapter 18: Introduction to Assurance Overview Why assurance? Trust and.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Inventory Control in Stores Dec05-09 Team: Jeff Benson Frederick Brown Christopher Reed Brian Wagner Date: December 6, 2005 Client: ISU Senior Design Program.
Operating Environment To be used indoors Stored indoors End Product and Deliverables Handheld Device Computer Monitor Wireless Printer Central Computer.
PIC Evaluation/ Development Board Dec02-12 December 10, 2002 Client: ECpE Department Faculty Advisors: Dr. Rover, Dr. Weber Chad Berg, Luke Bishop, Tyson.
EE 491 Project Presentation May07-04 – PDA Based UAS Remote Video Terminal Team Members: Devin Carney Jonathan Farmer Matt Henkes Rene Rios Faculty Advisor:
Project: May Project Team Members: Edward McDowell, EE Richard Mott, EE / Econ Faculty Advisors: Dr. John.
Fick Observatory - Boone, IA. Observatory Automation ongo02e March 26, 2002 Faculty advisor: Dr. John P. Basart Client: Joe Eitter ISU Physics Department.
Smart Digital Valve Control Simulator May April 25, 2001 Client: Client: Fisher Controls Intl. Inc. Contacts: Contacts: Patrick Ryan and Jeff Seyller.
Abstract Other Resources Financial Resources Project Schedule Personnel Efforts Item DescriptionCost STK300 Microcontrollerdonated (Kanda) GM28 Cellular.
ISU Alumni Association Online Store Abstract The Iowa State University Alumni Association desires a complete overhaul of their online store. The current.
Optical Encoder for a Game Steering Wheel May Team members Sam DahlkeCpr E Peter FecteauCpr E Dan PatesEE Lorenzo SubidoEE Advisors Dr. James Davis.
Alternative Lower Cost Hearing Aid Dec03-10 Client: Herb Harmison Advisor: Edwin Jones Jr. Team Members: Hassan Qureshi Hamdan Al-Mehrezi Trong Do Nathan.
Abstract Evidence can be the key to convicting someone of a crime, or acquitting a person of charges brought against them. To make sure the evidence is.
May05-36: Boone Cemetery Management Software Boone Cemetery Management Software May05-36 Greg Thede, Director, Boone Parks Department Dr. Kothari Joseph.
Educational Laboratory Virtual Instrumentation Suite (ELVIS) May Client: National Instruments Advisors: Dr. Mani Mina, Dr. Diane Rover Group Members:
Senior Design Laboratory Design Dec 05-01
Defining Procedures for Decision Analysis May & Engr A April 30, 2002 Client & Faculty Advisors –Dr. Keith Adams –Dr. John Lamont –Dr. Ralph.
Attack Tool Repository and Player for ISEAGE May Team:Jeremy Brotherton Timothy Hilby Brett Mastbergen Jasen Stoeker Faculty Advisor:Doug Jacobson.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Attack Tool Repository and Player for ISEAGE May06-11 Abstract Today’s world is changing shape as it increases its dependency on computer technology. As.
When buying a product in today’s marketplace, an individual is faced with the challenge of remembering an abundance of information about the product that.
Expert System Job Offer Evaluation Software May Abstract The project’s focus is to decide what criteria should be used to determine which job offer.
Advisor: Dr. Edwin Jones 1 Client: Paul Jewell ISU Engineering Distance Learning Facility May01-13 Design Team: David DouglasCprE Matt EngelbartEE Hank.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Network Enabled Wearable Sensors The Combined Research Curriculum Development (CRCD) project works with the Virtual Reality Applications Center (VRAC)
Abstract Introduction End Product & Deliverables Resources Project Requirements Team Members: Faculty Advisors: Client: Team Members: Faculty Advisors:
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite.
Jin-Ning TiohComputer Engineering Tony RossComputer Engineering Dave ZajicekComputer Engineering Alex BurdsComputer Engineering Abstract In recent years,
Cybot and OSCAR Elementary School Tutorial Dec02-03 December 10, 2002 Client: Electrical and Computer Engineering Department Advisors: Dr. Lamont, Dr.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
GUI For Computer Architecture May01-05 Team Members: Neil HansenCprE Ben JonesCprE Jon MathewsCprE Sergey SannikovCprE Clients/Advisors: Manimaran Govindarasu.
Collection Inventory Software May06-04 (CIST) Eric Anderson Adam Kovar Dustin Lunde Matt Moeller Brian Steger February 28 th, 2006 Advisors Dr. J. Lamont.
Abstract Reiman Gardens is looking to provide more educational material on their website. They are seeking a web program that provides an enjoyable experience.
Alternative Energy Evaluation May06-16 Team Members: Steve ChebuharEE Anhtuan DinhEE Ryan FerneauCprE Justin JorgensenEE Client : Professor Ralph Patterson.
Client Senior Design Electrical and Computer Engineering Iowa State University Introduction Abstract Architectural plans are currently being developed.
PC Based Spectrum Analyzer April 29, 2003 May03-10 Faculty Advisor: Dr. DJ Chen Michael Cain Paul Heil Eric Rasmussen Aung Thuya Client: Teradyne Inc.
OSCAR Octagonal Speech Controlled Autonomous Robot Team Ongo01 Motion Control & End Effector Frerichs, Matt – EE Moudin, Alex – ME Shedek, Tom – ME Wajid,
Equations for Ecademy Client: ISU Computation Center Faculty Advisor: Dr. Robert Anderson Technical Advisor: Dr. Pete Boysen Team Members:  Tim Arganbright,
Clients/Faculty Advisors Dr. Eric Bartlett May01-14 Team Members David Herrick Brian Kerhin Chris Kirk Ayush Sharma Incremental Learning With Neural Networks.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Project May07-14: Restaurant Automation April 24, 2007.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Slide #18-1 Introduction to Assurance CS461/ECE422 Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and Science.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Automated Medical Patient’s Evaluation System Abstract & Background Technical Problem Technical Approach Currently, the doctors at McFarland Clinic record.
CS 395: Topics in Computer Security
Planetarium Resuscitation Ongo-06 May 1, 2002
Chapter 18: Introduction to Assurance
Understand Core Security Principles
Java Embedded Network Intrusion Security
End-Product Description
Prepared By : Binay Tiwari
Resources and Schedule
Globey's World Abstract Design Requirements Introduction
Proposed Approach and Considerations
Planetarium Resuscitation Ongo-06 February 14th, 2002
Presentation transcript:

CYBERSIM Dec Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC Adam StrawCprE

Outline Introduction Project Overview Project Activities Resources and Schedule Summary

Definitions Confidentiality - the concealment of information or resources from unauthorized entities. Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change. Availability - the ability to access the desired information or resource. *Definitions taken from Computer Security: Art and Science by Matt Bishop

Definitions (cont.) Threat - a potential violation of security Disclosure: unauthorized access to information Deception: acceptance of false data Disruption: interruption or prevention of correct operation ex: viruses, worms, eavesdropping, password cracking, human error

Problem Statement General Background Computer security is becoming increasingly vital. Computer security is still an obscure field of knowledge.

General Solution Design and produce an engaging computer game Evaluate players on their ability to create and secure a simulated network Educate and entertain

Operating Environment Appropriate software installed Microsoft Windows 98 or better DirectX 7.0 Basic 3D graphics card that can support OpenGL graphics.

Intended Users and Uses Intended Users High school students New engineering students Intended Uses Distribution to interested students Educational program in the classroom Entertainment for leisure time

Assumptions Users will possess basic knowledge of and have experience with computers. Users will have a CD-ROM drive. Users will have sufficient processor speed, disk space, and memory. Game will be played by only one player at a time. Users will have access to a Windows based PC.

Limitations Quality art and music for the game will be limited by time. The project must fit on a single CD- ROM (less than 700MB).

End-Product Description and Deliverables A Windows-based computer game. Will allow the user to build a secure computer network. Protect it from simulated attacks. The game will be distributed on a CD- ROM.

Present Accomplishments Familiar with Open GL 3D engine Started building the foundation for the game Have started to implement the attack GUI

Technologies Considered and Used Technologies Considered Macromedia Director OpenGL Alias WaveFront’s Maya 3DMAX Java3D Technologies Used OpenGL with Visual C++

Research and Design Activities Research network architecture to better understanding of the following Networking Possible attacks Possible defenses Design working computer security game Realistic computer networks Random attacks

Implementation Activities Iterative Development Increased Visibility Managed Complexity Develop game in steps Foundation Simulation GUI

Testing Activities Small group testing Get honest feedback Challenge all users Simulation is accurate Difficulty increases Attacks are random

Personnel Effort

Financial Budget ItemEstimatedActual Poster Development Software $40 $200 $48 $0 Total$240$48

Product Schedule Plan Project (2/3/03) Implement Goals 225 days (by 12/13/03) Deliverables 212 days (by 11/13/03)

Project Evaluation Research (90%) Documentation (90%) Implementation(25%) Testing(10%)

Closing Commercialization –Possible distribution by ISU –Owned by Information Assurance Center Add more functionality Lessons Learned –Time Management –Team Communication

Summary Project Goals –Develop working computer network –Implemented various attacks/defenses Approach Taken –Use OpenGL and Visual C++ –Follow iterative model –Develop significant GUI

Questions ?

Thank You! For any further questions contact us at