1 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Amsterdam, DEC 4, 2006 Jörg Keller FernUniversität in Hagen,

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Microsoft IT Academy Server Server 2008 courses 6424 and cr 31
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Using Open-Source Solutions to Teach Computing Skills to Psychology Students David Allbritton DePaul University
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Course 201 – Administration, Content Inspection and SSL VPN
IT 210 The Internet & World Wide Web introduction.
Web Based Applications
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Honeypot and Intrusion Detection System
TeraPaths TeraPaths: establishing end-to-end QoS paths - the user perspective Presented by Presented by Dimitrios Katramatos, BNL Dimitrios Katramatos,
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Wireless Networks and the NetSentron By: Darren Critchley.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA About the Hands-on Lab.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Simplifying Resource Sharing in Voluntary Grid Computing with the Grid Appliance David Wolinsky Renato Figueiredo ACIS Lab University of Florida.
A Study of Wireless Virtual Network Computing Kiran Erra.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Remote Controller & Presenter Make education more efficiently
© 2010 VMware Inc. All rights reserved vSphere 4.1: Install, Configure, Manage.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Virtual Private Grid (VPG) : A Command Shell for Utilizing Remote Machines Efficiently Kenji Kaneda, Kenjiro Taura, Akinori Yonezawa Department of Computer.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
Module 10: Windows Firewall and Caching Fundamentals.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
1 COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Customer Facing Slides Presenting the DEMO.
Computer Security Sample security policy Dr Alexei Vernitski.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
A Study of Wireless Virtual Network Computing
OpenLabs Security Laboratory
Welcome To : Group 1 VC Presentation
CIS 332 Competitive Success-- snaptutorial.com
CIS 332 Education for Service-- snaptutorial.com
NTC 324 RANK Lessons in Excellence-- ntc324rank.com.
CIS 332 Teaching Effectively-- snaptutorial.com
NTC 324 Teaching Effectively-- snaptutorial.com
CIS 332 Inspiring Innovation-- snaptutorial.com
NTC 324 RANK Education for Service-- ntc324rank.com.
Unit 27: Network Operating Systems
Chapter 27: System Security
IS 4506 Server Configuration (HTTP Server)
Radoslaw Jedynak, PhD Poland, Technical University of Radom
An introduction to the Linux environment v
Presentation transcript:

1 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Amsterdam, DEC 4, 2006 Jörg Keller FernUniversität in Hagen, Germany joint work with Ralf Naues A Collaborative Virtual Computer Security Lab

2 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Motivation and Challenges Prototype Design Task Design Conclusion and Future Work Outline

3 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Computer and network security important, hence present in curricula Course work to be complemented by lab work Good training necessary: single flaw can render useless all efforts Distance teaching not really an issue, as security administration remotely performed Introduction and Motivation

4 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Large student numbers - admin tasks prevent sharing of machines - providing many machines prohibitive due to restricted resources - sequence of tasks requires ability to reset to stable configuration Checking completion of tasks - task nature requires tests to support supervisors - simplifies handling of large numbers as a side-eff. Challenges

5 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Basic Design Decision: Use Virtual Machines on the campus site Use student computer at home to access campus site Requires students to run browser, VPN and ssh client Virtualization: VmWare Lab Network Design I

6 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Lab Network Design II

7 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Start with simple tasks: acquire certificate VPN client and SSH client connect to lab server Next: install and configure firewall and IDS systems iptables, tripwire, snort, honeypot Finally: student groups perform complex tasks Task Design I

8 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Tasks designed to be testable by script Example: install firewall so that telnet service is not available to the outside Checking that telnet cannot be used is easy, but not enough Script also checks that other services (like ssh) are still available from the outside Realization: port scan and firewall log file check Task Design II

9 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Tasks available via web-based student interface Includes help pages with links to tool manuals etc Possible to access test script result and supervisor comments Supports self study and self assessment Task Design III

10 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Task Design IV

11 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Collaboration CURE system is used for collaboration Virtual rooms for communication and exchanging Secured through personalized keys Reservation scheme for the virtual server

12 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Lab starts operation in Spring 2007 Use CSCW system for group tasks Integrate lab server with CSCW for single sign-on THANK YOU VERY MUCH FOR YOUR ATTENTION Conclusion and Future Work