ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Companies can suffer numerous problems due to poor management of resources and careless decisions. In real-world decision- making, many organizations lack.
Project 2002 A Proposal Application Project 2002 Actions.
Lesson 10: IT Project and Program Management. Lesson 10 Objectives  Identify resources for technical data  Identify project management fundamentals.
Principles of Information Security, 2nd Edition1 Introduction.
Computer-Based Trading Room Dec04-05 Client: ISU College of Business Advisor: Dr. Gerald B. Sheblé Team Members Steve Saillard Vipul Tiwari Dan Fitch Fahim.
May Team Information Client Department of Electrical and Computer Engineering, Iowa State University Faculty Advisor Professor Gary Tuttle Team Members.
Project: May Project Team Members: Edward McDowell, EE Richard Mott, EE / Econ Faculty Advisors: Dr. John.
Job Offer/Continuing Education Evaluation Labor CostsHoursRate($10.30/Hr) Luke195 $ 2, Stephanie175 $ 1, Matt185 $ 1, Randy205 $ 2,
Java Net Project BUS517 Project Management September 12,
Abstract Other Resources Financial Resources Project Schedule Personnel Efforts Item DescriptionCost STK300 Microcontrollerdonated (Kanda) GM28 Cellular.
ISU Alumni Association Online Store Abstract The Iowa State University Alumni Association desires a complete overhaul of their online store. The current.
Optical Encoder for a Game Steering Wheel May Team members Sam DahlkeCpr E Peter FecteauCpr E Dan PatesEE Lorenzo SubidoEE Advisors Dr. James Davis.
Abstract Proposed Approach Solution Development Project Requirements Estimated Resources Other Resources Financial Resources Project Schedule Computer.
Pump Controller Team Number: May06-12 Team Members Dwayne Stammer CprE Francois Munyakazi EE Dan Paulsen CprE/EE Faculity Advisor Nicola Elia Client Viking.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Computing Fundamentals Module Lesson 19 — Using Technology to Solve Problems Computer Literacy BASICS.
Abstract Evidence can be the key to convicting someone of a crime, or acquitting a person of charges brought against them. To make sure the evidence is.
May05-36: Boone Cemetery Management Software Boone Cemetery Management Software May05-36 Greg Thede, Director, Boone Parks Department Dr. Kothari Joseph.
Educational Laboratory Virtual Instrumentation Suite (ELVIS) May Client: National Instruments Advisors: Dr. Mani Mina, Dr. Diane Rover Group Members:
CYBERSIM Dec Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC.
Senior Design Laboratory Design Dec 05-01
Defining Procedures for Decision Analysis May & Engr A April 30, 2002 Client & Faculty Advisors –Dr. Keith Adams –Dr. John Lamont –Dr. Ralph.
Campus Locator – Cell Phone Interface (May06-05) Dr. John Lamont Prof. Ralph Patterson III Faculty Advisors Iowa State University Senior Design Client.
.NET in a Software Engineering Course: Frameworks and Fun Stephen Wong Dung “Zung” Nguyen Ryan Aipperspach Bryan Lipinski James McDougall Ali Ongun Rice.
Abstract Introduction Project Requirements End Product Description Proposed Technical Approach Approach and Considerations Team Members: Travis Djuren.
Dec Dec Team Members - Bannister, Jacqueline - EE Petersen, Jordan - CprE Holen, Jacob - CprE Harvey, Luke - CprE Members - Bannister, Jacqueline.
Design Objectives The design should fulfill the functional requirements listed below Functional Requirements Hardware design – able to calculate transforms.
Attack Tool Repository and Player for ISEAGE May06-11 Abstract Today’s world is changing shape as it increases its dependency on computer technology. As.
Section 1.1 What is Multimedia?
When buying a product in today’s marketplace, an individual is faced with the challenge of remembering an abundance of information about the product that.
Expert System Job Offer Evaluation Software May Abstract The project’s focus is to decide what criteria should be used to determine which job offer.
A growing problem with university classrooms is the inability to effectively and efficiently record classroom attendance. The solution to this problem.
Network Enabled Wearable Sensors The Combined Research Curriculum Development (CRCD) project works with the Virtual Reality Applications Center (VRAC)
Abstract Evidence can be the key to convicting someone of a crime, or acquitting a person of charges brought against them. To make sure evidence is carefully.
Abstract Introduction End Product & Deliverables Resources Project Requirements Team Members: Faculty Advisors: Client: Team Members: Faculty Advisors:
CSCE 548 Secure Software Development Security Operations.
Cybot and OSCAR Elementary School Tutorial Dec02-03 December 10, 2002 Client: Electrical and Computer Engineering Department Advisors: Dr. Lamont, Dr.
D R A T D R A T ABSTRACT Every semester each department at Iowa State University has to assign its faculty members and teaching assistants (TAs) to the.
Abstract Reiman Gardens is looking to provide more educational material on their website. They are seeking a web program that provides an enjoyable experience.
OSCAR Octagonal Speech Controlled Autonomous Robot ME Seth Alberty Henry Venes EE Matt FrerichsHuy Nguyen Daniel HumkeDavid Staab Daniel MarquisFahad Wajid.
Mathematical Teaching Software System Ames Community Schools (ACS) has been concerned with their student’s performance in problem-solving on nationally.
© 2014 International Technology and Engineering Educators Association STEM  Center for Teaching and Learning™ Game Art and Design Unit 2 Lesson 1 Skills.
Estimated Resources Closing Summary Other Resources Financial Resources Project Schedule Computer Engineers William Hoang Gavin Ripley David Hawley Justin.
An essential part of any business is being able to track inventory and sales. In order for a business to be successful, the inventory control system must.
Client Senior Design Electrical and Computer Engineering Iowa State University Introduction Abstract Architectural plans are currently being developed.
OSCAR Octagonal Speech Controlled Autonomous Robot Team Ongo01 Motion Control & End Effector Frerichs, Matt – EE Moudin, Alex – ME Shedek, Tom – ME Wajid,
Problem Statement The goal of this project is to complete the basic automated functions of the Dream Green putting surface. The objective is to produce.
ELVIS Educational Laboratory Virtual Instrumentation Suite: Phase II Abstract Problem Statement The goal of this project is to convert the EE 201 labs.
In today’s world of ever-increasing energy prices and environmental concerns, alternative energy sources are constantly being researched. This project.
Using Technology to Solve Problems Unit 2 Mod 2 SO 7.
With many families on the road in today’s world, children are often left to entertain themselves. Parents would like to entertain them with something more.
Automated Medical Patient’s Evaluation System Abstract & Background Technical Problem Technical Approach Currently, the doctors at McFarland Clinic record.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Staff Selection and Development
Globey’s World K-6 Teaching Application Support and Software Ongo-08b
A Secure Wireless Interface between Personal Digital Assistants (PDAs)
Software Support Framework
ONGO-08 K-12 Teaching Application
Chair-Mounted Computer Workstation
Ongo-08b: K – 12 Teaching Application Support
End-Product Description
Automated Printed Circuit Board Development
Resources and Schedule
Globey's World Abstract Design Requirements Introduction
Computer Literacy BASICS
Octagonal Speech Controlled Autonomous Robot
Proposed Approach and Considerations
The Rest of Project OSCAR
Joint Application Development (JAD)
Presentation transcript:

ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite the popularity of computers and networking, network security is still an obscure subject. The goal of this project is to develop an interactive computer game that shall introduce people to the theory and fundamentals of computer security. CYBER Sim shall be modeled after the Electronic Arts(TM) Sim® games and shall allow the player to purchase equipment and attempt to protect a network. The game shall simulate attacks on the network and the player shall be evaluated on how well he/she has designed the protection system. It is our desire to create a game that will be entertaining yet will educate the user on the importance and the fundamentals of computer security. Team Members Ryan Applegate (CprE) Saddam Khattak (CprE) Dan Nguyen (CprE) Adam Straw (CprE) Faculty Advisor Doug Jacobson Client Information Assurance Department PROJECT REQUIREMENTS Design objectives Easy to install and play Easy learning curve Playing time of up to 2-3 hours (per sitting) High educational value High “fun factor” Functional Requirements Graphical engine Accurate simulation of networks and network attacks In-game help and definitions of network terminology Design Constraints Cost-effective design Flexible for future expansion MILESTONES AND SCHEDULE 1.Problem IdentificationMarch 1512% 2.ResearchMarch 2510% 3.Decision on programming languageMarch 258% 4.Implementation of CVSMarch 255% 5.Framework/Structure Aug % 6.Creation of simulationSept % 7.Graphical user interface and engineOct % 8.Beta testingNov % 9.Project DistributionDec % Total100% RESOURCES AND SCHEDULE Estimated Resources CLOSING SUMMARY It takes more than armed guards and complicated locks to defend against cyber- thieves. Defending a network requires a strong grasp of the latest technological safeguards as well as competent managing of resources. As the world becomes more dependent on the Internet to transmit information, the expertise needed to defend against hackers must increase in response. This is the underlying motive behind CYBER Sim. Network security is still an obscure concept for laymen in general. Our goal is to make the basic concepts of network security accessible to attract new engineering students to and increase the general knowledge of this essential field. INTRODUCTION Problem Statement Students interested in computer engineering are generally unaware of or unable to understand the field of network security Problem Approach Design and produce an engaging computer game that will teach the user how to build a secure network and protect it from simulated attacks Operating Environment Software will be installed on Microsoft Windows computers with basic 3D graphics cards that can support basic OpenGL graphics. Intended Users High school students New engineering students Intended Uses Distribution to interested students Educational program in the classroom Entertainment for leisure time Assumptions Users will possess basic knowledge of and experience with computers Users will have a CD-ROM drive Limitations Lack of skill in creating professional art and music for the game Limited knowledge in graphical programming EXPECTED END PRODUCT AND OTHER DELIVERABLES A Windows-based computer game that will allow the user to build a secure computer network and protect it from simulated attacks. The game will be distributed on a CD- ROM. PROPOSED APPROACH AND CONSIDERATIONS Proposed Approach Research will be conducted to better understand network architecture and the kinds of attacks it is vulnerable to. Program will be developed piece by piece, starting off with the foundation, then the simulation, and then the graphical interface. Technologies considered Macromedia Director OpenGL Alias WaveFront’s Maya 3DMAX Java3D Testing considerations Small group testing Game community beta-distribution Simulation is accurate Personal Effort Adam Straw, 110 Ryan Applegate, 109Saddam Khattak, 111 Dan Nguyen, 111 Other Resources Development Material, 40 Development Software, $200 Tools of History’s Great Robberies Revolver Date: Late 19 th Century Who: Jesse James Robbed: Banks and trains How much: est. $150,000 Naval Cannon Date: 1623 Who: Vice Admiral Piet Heyn Robbed: The Spanish silver fleet How much: 10 million guilders Tommy Gun Date: 1930s Who: Machine Gun Kelly Robbed: Banks How much: est. $300,000 Laptop Date: 1994 Who: Vladimir Levin Robbed: Citibank How much: $12 million