Tyler Hellard, Taylor Kraft and Zachary Preece.  Project Background  Project Accomplishments  Budget  Conclusion  Acknowledgements  Question and.

Slides:



Advertisements
Similar presentations
RbitPoint Computer Network Monitoring Software Complete Software Solution for Controlling all computers from your desk www. samaysoftware. net.
Advertisements

MD025 Clonezilla Server Andrew Fang. School of Information Technology Computer Systems Major.
Moving Your Computer Lab(s) to the Cloud Rick O’Toole & Dave Hicking University of Connecticut Libraries.
Network Surveillance Apparatus Team WiFiSpi Aaron Collier, Scott Matheson, Steven Tran-Giang.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
1 Secure Your Business PATCH MANAGEMENT STRATEGY.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Redshift for Hotels and Motels Managing your heating and cooling costs whilst supporting your customers.
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
Connect to DeltaV through a remote desktop This procedure is used to allow the PC that does not have DeltaV programs installed to have access to the DeltaV.
By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Ashita Srivastava ISM High Five Corporations Chain of fast food restaurants Using Windows XP for clients and Windows Server 2008 Needs a robust.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
ZACK FESTA, ADAM HOOD AND NATHAN DARLING Refrigerator Scanning System.
EECS 488 – Embedded Systems Design and Specification of a Video Communication Device Based on the Gameboy Advance Glenn Emelko Scott Schmucker April 23.
Solids Modeling System Migration Presented By 3Tech: Ryan Scott, Jimmy Vuong, Samson Tran.
LO2 Understand the key components used in networking
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
SQL Server for Green Building By HCH Servers Ltd..
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Delivery platforms for national and international computer-based surveys History, issues and current status Sam Haldane Australian Council for Educational.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Educational Laboratory Virtual Instrumentation Suite (ELVIS) May Client: National Instruments Advisors: Dr. Mani Mina, Dr. Diane Rover Group Members:
On Demand Internet By The Cool Beans Initiative  Hugh Becking  Gary Chung.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
Contents Introduction Problem Definition Proposed Solution
MDB Connectivity Scalability Tests r11 October 25 th
Agenda Introductions Project Background AccomplishmentsChallenges Lessons Learned Budget The Journey Final Product Recommendations.
Josh Garay Jake Chipperfield Connor Huskins
Jonathan Loving Fermi Lab Computing Division
Bubble Wrap Green Solutions: Kenneth Ho Rajwinder Maan William Wong.
Name of the project and Sub-Objective of the PEOPLE project JAMIE'S COMPUTERS – EVERYBODY ONLINE Social & E-inclusion (SO4) Jamie's Computers is a charitable.
DEA IT CONSULTING THE TEAM: DAVID CLARKE EMMANUEL CAUBALEJO ADAM WHEATON CIITS Server Infrastructure Optimization.
L. A. S. E. R Local Authority Security Enterprise Reporting System Architecture.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
Topic 5a Operating System Fundamentals. What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O,
Development and Implementation of a Honeynet on a University Owned Subnet Erin L. Johnson, John M. Koenig, Dr. Paul Wagner (Faculty Mentor) {johnsone,
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Computer Software Types Three layers of software Operation.
Retina Network Security Scanner
Strategic Capstone Project: Controlling Software Costs in a Virtual Server Environment Kenneth D. Gauvreau MG6970: Summer Term 1 New England College June.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Computer System Support   The costs of installing, operating and maintaining computer systems are called total costs o ownership or TCO  TCO includes.
Harris IPPD Project. WinReality Software.
What is the reason for installing hardware – P1 By Ridjauhn Ryan.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
HOME AUTOMATION Robert Brandenburg EKU, Dept. of Technology, CEN/CET.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
The BEST Citrix/Microsoft RDS alternative
Cost accounting Overheads.
The BEST Citrix/Microsoft RDS alternative
SP-Portal2016 Developed by KRN-2016 Kevin Titong Ricardo Sandrea
By CES Tech Connor Plouffe, Eric Gavlin, and Stephen Costa
Logging into the linux machines
Campus Locator – Definition Phase (May04-04)
Swap or Upgrade it: The beauty of MacBook Rental.
Nessus Vulnerability Scanning
Cost accounting Overheads.
Figure 6-4: Installation and Patching
Low Level Architecture
Issues or problems encountered and solutions:
FY 08 Department of Technology Budget Proposal January 27, 2007
TitaNet Security Flaw Identification
Nicholas Novello, Shayne Gradwell, Nikolas Todd
Restaurant IT Solutions
Presentation transcript:

Tyler Hellard, Taylor Kraft and Zachary Preece

 Project Background  Project Accomplishments  Budget  Conclusion  Acknowledgements  Question and Answer

 There is currently little security testing technology available to the small and medium business market.  Small and medium businesses are particular vulnerable to security threats.  Ted Hellard came to us with a healthy desire and respect for security  There was no reasonably priced all in one security testing solution

 We installed a Linux operating system onto a macbook air as the lone operating system  Hardened Windows Server 2012  Successfully installed and ran Snort  Removed the display for the macbook air, and placed it into the laptop messager bag  Remotely controlled the macbook though a tablet

SpecificationsCost Equipment$ Software$ Operations$ Total$97,279.49

SpecificationsCost Equipment$ Software$ Operations$ Total$

Initial Proposition$97, Actual Cost$ Variance$

 Successful in building a fully functional lightweight security testing tool  Used off the shelf hardware and software.  Proto type item  Successful in hiding the attack machine within a laptop carry case.

 Ted Hellard Sponsor of the project. If it were not for Ted, we would have not been able to complete this project the way we had planned to.  Jason Fisher Was our project advisor, and was also in charge for distributing some of the equipment that we used to complete this project. Jason also provided us with guidance throughout the completion of this project

 Pictures taken courtesy of Taylor Kraft