CYBERSIM Dec Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC Adam StrawCprE
Outline Introduction Project Overview Project Activities Resources and Schedule Summary
Definitions Confidentiality - the concealment of information or resources from unauthorized entities. Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change. Availability - the ability to access the desired information or resource. *Definitions taken from Computer Security: Art and Science by Matt Bishop
Definitions (cont.) Threat - a potential violation of security Disclosure: unauthorized access to information Deception: acceptance of false data Disruption: interruption or prevention of correct operation ex: viruses, worms, eavesdropping, password cracking, human error
Problem Statement General Background Computer security is becoming increasingly vital. Computer security is still an obscure field of knowledge.
General Solution Design and produce an engaging computer game Evaluate players on their ability to create and secure a simulated network Educate and entertain
Operating Environment Appropriate software installed Microsoft Windows 98 or better DirectX 7.0 Basic 3D graphics card that can support OpenGL graphics.
Intended Users and Uses Intended Users High school students New engineering students Intended Uses Distribution to interested students Educational program in the classroom Entertainment for leisure time
Assumptions Users will possess basic knowledge of and have experience with computers. Users will have a CD-ROM drive. Users will have sufficient processor speed, disk space, and memory. Game will be played by only one player at a time. Users will have access to a Windows based PC.
Limitations Quality art and music for the game will be limited by time. The project must fit on a single CD- ROM (less than 700MB).
End-Product Description and Deliverables A Windows-based computer game. Will allow the user to build a secure computer network. Protect it from simulated attacks. The game will be distributed on a CD- ROM.
Present Accomplishments Familiar with Open GL 3D engine Started building the foundation for the game Have started to implement the attack GUI
Technologies Considered and Used Technologies Considered Macromedia Director OpenGL Alias WaveFront’s Maya 3DMAX Java3D Technologies Used OpenGL with Visual C++
Research and Design Activities Research network architecture to better understanding of the following Networking Possible attacks Possible defenses Design working computer security game Realistic computer networks Random attacks
Implementation Activities Iterative Development Increased Visibility Managed Complexity Develop game in steps Foundation Simulation GUI
Testing Activities Small group testing Get honest feedback Challenge all users Simulation is accurate Difficulty increases Attacks are random
Personnel Effort
Financial Budget ItemEstimatedActual Poster Development Software $40 $200 $48 $0 Total$240$48
Product Schedule Plan Project (2/3/03) Implement Goals 225 days (by 12/13/03) Deliverables 212 days (by 11/13/03)
Project Evaluation Research (90%) Documentation (90%) Implementation(25%) Testing(10%)
Closing Commercialization –Possible distribution by ISU –Owned by Information Assurance Center Add more functionality Lessons Learned –Time Management –Team Communication
Summary Project Goals –Develop working computer network –Implemented various attacks/defenses Approach Taken –Use OpenGL and Visual C++ –Follow iterative model –Develop significant GUI
Questions ?
Thank You! For any further questions contact us at