JMU GenCyber Boot Camp Summer, 2015. Welcome Cyber Defense Boot camp for High School Teachers Cyber Defense Lab (ISAT/CS Room 140) Department of Computer.

Slides:



Advertisements
Similar presentations
EBooks and Audiobooks. This class will give you an overview of eBooks and electronic Audiobooks available from the Library. We will also explain the basic.
Advertisements

Welcome Cyber Defense Bootcamp for High School Teacher
Network Security Policy Why do I need a network security policy? Dr. Charles T. Wunker.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Chapter 1 Introduction. Art of War  If you know the enemy and know yourself, you need not fear the result of a hundred battles.  If you know yourself.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Engineering Secure Software. Lottery Story A Threat We Can’t Ignore  Documented incidents are prevalent Carnegie Melon’s SEI has studied over 700 cybercrimes.
Storage Security and Management: Security Framework
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Educational Resources on Secondlife.com Jessica Tormena.
Computer & Network Security
Summer,
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Wrap-up. Goals Have fun! Teach you about Cyber Defense so that you can: –Interest your students in Cyber Defense –Teach your students about Cyber Defense.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Small Business Security Keith Slagle April 24, 2007.
Introduction to Information Security
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Information Warfare Playgrounds to Battlegrounds.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
JMU GenCyber Boot Camp Summer, Introduction to Penetration Testing Elevating privileges – Getting code run in a privileged context Exploiting misconfigurations.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Cybersecurity: Risk Management
JMU GenCyber Boot Camp Summer, 2016
CS457 Introduction to Information Security Systems
Cybersecurity First Principles
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Career JEOPARDY! Cluster: Information Technology
Joe, Larry, Josh, Susan, Mary, & Ken
Cybersecurity: Threat Matrix
Chapter 3: IRS and FTC Data Security Rules
Steven Hartman State Information Security Officer State of Nebraska
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Chapter 1: Introduction
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Understanding your enemy!
JMU GenCyber Boot Camp Wrap up
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity Threat Assessment
Technology Convergence
Cyber Security For Civil Engineering
Presentation transcript:

JMU GenCyber Boot Camp Summer, 2015

Welcome Cyber Defense Boot camp for High School Teachers Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer, 2015 JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 2

Introductions Bryan Conner Kyle Evers Hossain Heydari Andrew Hutchson Matt Jackson Emil Salib Brett Tjaden Xunhua (Steve) Wang JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 3

Goals Have fun! Teach you about Cyber Defense so that you can: Interest your students in Cyber Defense Teach your students about Cyber Defense Cyber Defense Clubs CyberPatriot Program ( JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 4

Schedule JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 5

General Information No food or drinks near the laptops Restrooms: – Out the door and turn left – Right at main hallway – Right at next hallway – Restrooms are on the right If you have a car on campus see us for a parking permit Fill out a W-9 form if you want your money JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 6

Questions Always welcome! JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 7

Cyber Defense JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 8 Prepare Triage Detect Protect Respond

Threats A threat is a potential violation of system security Examples? JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 9

Attackers Perform actions to try to cause security violations Outsiders: Competitors Hackers Organized crime Terrorists Foreign government, military, or law enforcement Insiders: Customers, suppliers, vendors, or business partners Disgruntled current (or former) employees Contractors, temps, or consultants JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 10

Why You Should Not Be an Attacker It is illegal: United States Code, Title 18, Section 1030 (and others) – USA Patriot Act, Homeland Security Act, PROTECT Act – Unauthorized access or use of a computer or network system is illegal Unintentional attacks are illegal too JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 11

Understanding the Tools and Techniques of Attackers Important for defenders: – Can evaluate systems you defend as attackers will – Can implement countermeasures designed to thwart attackers – Better understand the implications of certain decisions JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 12

What do Cyber Defenders Protect? JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 13 Prepare Triage Detect Protect Respond

The Security Triad Confidentiality – information is protected from unauthorized access Example? Integrity – information is protected from unauthorized modification Example? Availability – timely access to information (by authorized people) is ensured Example? JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 14

How do we Protect? Prevention – mechanism(s) that cause attacks to fail – Example? Detection – mechanism(s) that determines that an attack is under way, or has occurred, and reports it – Example? Recovery – mechanism(s) that stop attacks and assess and repair any damage caused – Example? JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 15

GenCyber Cybersecurity First Principles Domain Separation Process Isolation Resource Encapsulation Modularity Least Privilege Abstraction Data Hiding Layering Conceptually Simple JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 16

Getting Started with Cyber Defense What to do first? – Get to know you systems You cannot effectively defend what you don't understand Attackers make it their job to understand systems better than the defenders and leverage their advantage in knowledge “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle” - Sun Tzu JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 17

Getting Started with Cyber Defense What to do first? – Get to know you systems You cannot effectively defend what you don't understand Attackers make it their job to understand systems better than the defenders and leverage their advantage in knowledge “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle” - Sun Tzu “You Don't Know Me” - Elvis JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 18

After You Know Your Systems Think about threats and attackers Think about what needs to be protected (security triad) Think about your goals (prevention, detection, recovery) JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 19

After You Have Thought About Your Systems Start to plan, implement, and test improvements to your systems' security posture Respond to actions by attackers JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 20 Prepare Triage Detect Protect Respond

Hands-On Exercises You will not just be listening, you will be doing Virtual machines (VMs) – a simulated computer running on another computer VMs are great for hands-on Cyber Defense exercises You can create and use VMs with your students using free software: – VirtualBox ( – VMWare Player ( JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 21

Accessing your VM for this Boot Camp Turn on laptop Click on “CyberDefender” account to log in Double click on Firefox icon to open web browser If you are not already on it, go to the following page: JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 22

Accessing your VM for this Boot Camp (cont) Log in with the credentials you were given Click on “Host and Clusters” Expand the items on the left side until you see your “student” VM Click on your student VM to highlight it Power on the VM In the center window click on the “Summary” tab Click on “Launch Console” JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 23