CabSec Integrated Security ANTHONY WARNER NETWORK SECURITY & ELECTRONICS PROGRAM OF AE&T AT EASTERN KENTUCKY UNIVERSITY.

Slides:



Advertisements
Similar presentations
Cloud Computing COMP 1631, Winter 2011 Yanggang Chen.
Advertisements

SUPERCOMPUTER TO THE RESCUE Justin Curry EKU, Dept. of Technology, CEN/CET)
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
Aaron Eastham Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
Copyright 2014 Kenneth M. Chipps Ph.D. Network Management Using Sensors to Monitor Network Equipment Rooms Last Update
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
SM3121 Software Technology Mark Green School of Creative Media.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Unmanned Surveillance Tank Frederick Guilfoil Eastern Kentucky University Dept. of Technology, CEN 499.
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
SKY-PEak: BRIDGING SKYPE Jamie Caudill Eastern Kentucky University.
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
MINI MEDIA CENTER Charles Hayden Network Security and Electronics Department of Applied Engineering and Technology Eastern Kentucky University.
NET 499 Leonard Paul Vinas Network Security and Electronics Department of Technology.
Reliability & Desirability of Data
ANTICLICK: INCREASING DESKTOP SECURITY Jason Petrey Computer Electronic Networking Dept. of Technology Eastern Kentucky University.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Homeland Security System Danny Butler EKU, Dept. of Technology.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
P2P SIP Names & Security Cullen Jennings
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
ANDREW SIX EASTERN KENTUCKY UNIVERSITY RED Rover.
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
SUPER TOASTER Wes Brown Eastern Kentucky University Computer Electronic Networking.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Smart Parking System PREPARED BY : GHADEER AQRAA AND MARAH JABER.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
 people will go through your trash to get credit card numbers. Like old mail that you threw away, had your number on it a lot of the time its with.
Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.
You. are at risk for the fastest growing crimes crime.
TRENDS IN COMPUTING By Sally Allen 9M4 Candidate number:4031 Wildern School
SOLARPACKING Mitch Vernon Eastern Kentucky University.
ALL CAPS TITLE Group Name Presenter Names Affiliation Information.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
MY NETWORK TAP Richard Elswick Easter Kentucky University.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
HONEYPOTS An Intrusion Detection System. Index Intrusion Detection System Host bases Intrusion Detection System Network Based Intrusion Detection System.
HOME SECURITY USING PLC Ryan Badgett EKU, Dept. of Technology, CEN.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
DEFIANA ARNALDY,M.SI ANALYZING NETWORK PACKETS.
Raspberry Pi Garage Door Mark Barron NET 499 Eastern Kentucky University.
HOME SCHOOL FOR NETWORK SECURITY James Coffey Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
PARSLEY PIE BOX James (Kyle) Parsley Network Security & Electronics Program.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
COLDEST BOOM BOX EVER Anthony Mills Eastern Kentucky University.
LEARNBOT Matthew Williams Network Security and Electronics Program Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Jordan Terry Eastern Kentucky University
IT Security  .
Second Eye Project Outline Structure Main Feature Strength
The Claw Alert Feline Training Assistant
Cat Litter Box Ventilation System
USING A RASPBERRY PI AS A WATER DETECTION SYSTEM
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
SEC 572 Enthusiastic Studysnaptutorial.com
The Revenue Cycle Story Board
Combating Tag Cloning with COTS RFID Devices
Perspective on Web Game Tech from the Instant Games team
APNIC Solving problems for our community
APNIC Solving problems for our community
Presentation transcript:

CabSec Integrated Security ANTHONY WARNER NETWORK SECURITY & ELECTRONICS PROGRAM OF AE&T AT EASTERN KENTUCKY UNIVERSITY

OUTLINE  Arcade Cabinet Security is not something someone would think of normally, and in my searches I couldn’t find anything EXACTLY like it.  Notices can be sent through the ether to anyone who has this unit deployed.  Worries can be alleviated when away from your equipment  Expandable! 2

MOTIVATION  I love the idea of arcades.  Venturing around with my dad I saw the need to protect other deployed units from intrusion and theft. 3  To my knowledge there isn’t anything like it.  One of the few ideas I’ve worked that has genuine inspiration.  Learn some new stuff!

INTRODUCTION  There may or may not be an issue here that needs addressed, as arcades are not nearly as popular as they used to be, but I’d imagine this was a major issue.  The good thing is that it isn’t limited to just arcades! 4  Quite a few things about this project lead to other avenues of exploration  Namely integration of security in the form of an IDS for the physical.  Has a huge impact on litigation when you can find your perp. Wow…

PROBLEM STATEMENT  Security, security, security. It’s in our major’s title for cryin out loud.  People love to steal things, and not get caught.  This might help solve the problem! 5

PROBLEM STATEMENT  Security, security, security. It’s in our major’s title for cryin out loud.  People love to steal things, and not get caught.  This might help solve the problem! 6

Assumptions  Operate in a no-power state  Has to use off the shelf parts  Use off the shelf parts 7 This thing has to:  You have a device that needs protectin’  Problems with the thieves exist  You like to keep what you own in good condition I assume that:

PROPOSED SOLUTION  Had to think of something  Vicious attack dogs?  Electric shocks?  Attack …..sheep?  Thoughts return to reason  How about a platform that exists, has well established success, and allows for battery operated environment?  Need internet connection for this device  Easily cleaned Linux distributions….  What device could it be? 8

Gorgeous 9

RESULTS  Was able to quickly detect intrusion (while still accounting for minor tilts that may or may not occur.  Seven second delay was put in to accommodate this and a de-bounce feature was implemented to prevent rocking the unit from tripping it 10  I’d say that is a pretty successful run. Looks like my things are being stolen!  Notifications are sent straight to the phone, from the point of deployment

Source: CabSec : The Full Journey 11 (it’s a fake embed) Warning : Video is 20 minutes long

CONCLUSIONS  This project was ideal for a small business owner or personal arcade enthusiast looking for an off the shelf cheap way to better protect their hardware.  The one thing I can conclude is that in this course I have been through the wringer. It has definitely changed my prospective on project timings and motivation.  Even the best founded ideas run into blockades, you just have to be willing to push the extra mile.  Work with school + project = Bad Time 12

FUTURE WORK 13  Positive Implication :  People will more easily be able to protect what they own  Negative :  It’s another Raspberry Pi Project.  In the future with the expansion of this idea, I would love to integrate an actual GPS unit within the build to reduce the reliance on IP based geolocation.  Anything different?  Thank the audience  Thank you audience! 

REFERENCES Oakes, P. (n.d.). Raspberry PI 2, GPIO, SPI, I2C and OneWire Setup [Video file]. Retrieved from Raspierry Pi Org.. (2013). GPIO: Models A+, B+ and Raspberry Pi 2 - Raspberry Pi Documentation. Retrieved from Vu, N. (2014). Implementation of Linux GPIO Device Driver on Raspberry Pi Platform (Doctoral dissertation, Helsinki Metropolia University of Applied Sciences, Helsinki, Finland). Retrieved from 14