Download presentation
Presentation is loading. Please wait.
Published byMichael Hamilton Modified over 8 years ago
1
INF526: Secure Systems Administration Team Status Exercise 1 Prof. Clifford Neuman Lecture 5 17 June 2016 OHE100C
2
Announcements Mid-term exam on Friday July 8 th –Material will be on the lectures and assigned readings (of which there have been few so far) –One hour, closed book (if I need you to refer to specific material I will include it on the exam) –Followed by a lecture Office Hours – Changes – –On campus – immediately following lecture – outside lecture hall –Friday 2PM-3PM at Professors ISI office or by phone (310) 448-8736 or by e-mail or teleconference. 1
3
Access to Server VMs Still working on securing access to VM’s in lab on campus –Hope to have that addressed by end of this coming week 2
4
Review of Group Progress Group One –Configuring Servers –Configuring access controls –Simple pen testing –Dynamic DNS set up –Main issue is access to static address for group members to use Is this necessary, is there a way around? Group Zero –Progress on web application – including added functionality –Network and host isolation components in progress –Application of minimization and MAC policies –Main issue is lack of a central machine on which to run VM We are still trying to address this – per earlier note Not clear if anyone was able to use VNC 3
5
Group Exercise For Next Week No major new tasks – continue work on the system as described Try some of the pen-test tools described this week against your own machines. 4
6
Group Report by Wednesday General Progress, as per your report this week. Specific new things to include in your report: –A red-team plan (pen-test) for the tests that you will run against your system once up and stable. 5
7
Banking (for reference) Your organization must: –Maintain a database of account holders –A database of account balances –Enable web access by customers who: Can update their personal information Check their account balance Transfer funds to another account (by number) View transactions on their account Submit an image of a check for deposit –(check should be viewable, but you do not need to scan it or process it) Access is needed –Via web from the open internet –Outbound email confirming transactions –All other interactions may be limited by information flow policies to internal machines. 6
8
Retail (for reference) Your organization must: –Maintain a database of customers –A database of products and prices –A database of customer orders – and status –Support the update of prices in the system –Support inquires by customers of order status –Allow customers to place orders –Accept payment information from customers for submission to a credit card processor –Enable web access by customers who: Can place orders Check order status Cancel orders –Enable access by employees To set prices Perform customer service functions Access is needed –Via web from the open internet for customer facing functions –For employees 7
9
Criminal Enterprises (for reference) Chosen because of differences in the high level principles. –Not because I expect you to implement these kinds of systems in your future endeavors. –But you may be called upon to break some of these systems if later employed by government organizations. Your organization must: –Accept Bitcoin as payment (not really, but it must accept something that stands in for bitcoin) –Manage an inventory of stolen account identifiers with passwords –Control access to such information –Prevent collection of evidence or intelligence by third parties. –Note, do not deal in any illegal goods, but use dummy information to stand in for such goods. Also, do not use terms associated with such illegals goods or information in communications, make up new names for this dummy information. 8
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.