Presentation is loading. Please wait.

Presentation is loading. Please wait.

Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.

Similar presentations


Presentation on theme: "Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College."— Presentation transcript:

1 Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College beaumoc@hope.ac.uk

2 http://www.hope.ac.uk/ Agenda  What is PBL?  Why use PBL?  How did we use it?  Example  Issues  Success  Questions, comments … insults?

3 http://www.hope.ac.uk/ Problem-Based Learning (PBL) In teams, students are given a problem they don’t know how to solve. & they devise a strategy to solve it. In teams, students are given a problem they don’t know how to solve. & they devise a strategy to solve it.

4 http://www.hope.ac.uk/ Why PBL?  Starts where they are  Learning is relevant & effective  They learn what they need to solve the problem  Develop skills:  problem solving, critical analysis, team work, reasoning, reflection, manage uncertainty  Employability Motivational

5 http://www.hope.ac.uk/ PBL and security  PBL works best with ill-defined (messy) real-world problems that have a number of alternative solutions and are open ended.  Security provides a rich environment for such scenarios

6 http://www.hope.ac.uk/ How? - Example  Systems & network Security module  15 credit final year undergraduate module  2 hours per week PBL tutorial / Lab session  4/5 weeks in lab  Teams of 5 students  Coursework + Seen exam  Prior knowledge – LAN module

7 http://www.hope.ac.uk/ Learning Outcomes  Critically and systematically analyse the exposure to security threats of a networked computer system  Formulate a reasoned and appropriate plan to address the risks in a networked computer system  Use appropriate tools to implement aspects of security in a networked computer system

8 http://www.hope.ac.uk/ Key skills assessed  Problem-solving  Communication  Working with others  Improving own learning and performance

9 http://www.hope.ac.uk/ PBL Scenario  Ace Training Ltd – IT training company with head office Liverpool, Training centre: Manchester  Small 100BaseT LAN in each office (one server) + 802.11g in Liverpool for Laptops.  Restricted Internet access (mgt only). No internal email

10 http://www.hope.ac.uk/ PBL Scenario  Liverpool office:  Sales dept (11) use Sage Act! and MS Office.  Accounts Dept use Sage Line 50  Personnel data also stored.  Marketing dept use QuarkXPress

11 http://www.hope.ac.uk/ PBL Scenario  The board of directors has now decided to extend the network with the following requirements:  Email and internet access for all staff in Liverpool.  Host its own Web site in Liverpool (with a view to ultimately incorporating some form of e-commerce & on-line course booking).  Enable the Training Centre manager and administrators to access various company data on the Liverpool server

12 http://www.hope.ac.uk/ PBL Scenario The board are aware that they do not have the expertise to develop an ISMS and have called you in to help them. Your terms of reference are:  To perform a systematic risk assessment of the security threats to the company assets, and provide recommendations for risk treatment.  To design and present a proposal for a secure network architecture to meet the present requirements and construct a demonstration network to show proof of concept

13 http://www.hope.ac.uk/ Expected Clarification Issues  Eg:  Company Assets  Policies  Email requirements  Availability requirements  Network details (eg resilience features)  Laptop usage

14 http://www.hope.ac.uk/ Expected Learning Issues  What should an ISMS consist of?  Confidentiality, Availability, Integrity  BS 7799  Threats and Vulnerabilities  Risk Assessment & treatment  Legal Issues

15 http://www.hope.ac.uk/ Expected Learning Issues  IP subnetting and NAT  Security architecture/ technology  Firewalls, DMZ, IDS  Encryption  Authentication and Authorization  Secure transmission – VPN / SSL

16 http://www.hope.ac.uk/ Expected Learning Issues  Configuring Software for demonstration  CheckPoint  Win2k Routing  IIS

17 http://www.hope.ac.uk/ Resources  Set book  Panko (2004) Corporate Computer & Network Security  BS7799 parts 1 & 2  Internet resources  Lab session on routing and CheckPoint configuration  Seminar on subnetting

18 http://www.hope.ac.uk/ Deliverables (assessed)  Reports  Risk assessment  Proposed architecture / technologies used with justification and consideration of alternatives.  Demonstration network (5 PCs)  Individual research reports  Team Presentation

19 http://www.hope.ac.uk/ Lab resources  Each team has 5 hard disks/ caddies + 5 PCs with several NICs in each, connected to patch panel.  Team has two switches.  Hard disks pre-installed with Win2k Server, one has CheckPoint firewall.

20 Example solution for similar scenario - Firewall rules also provided

21 http://www.hope.ac.uk/ Typical team lab setup

22 http://www.hope.ac.uk/ Issues  Level of detail  Can be superficial - need to question thoroughly  Lab issues – configuration problems with routers/ CheckPoint

23 http://www.hope.ac.uk/ Successes  Team work  Motivation  Research-based solutions  Variation in solutions

24 http://www.hope.ac.uk/ The Secret of success?


Download ppt "Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College."

Similar presentations


Ads by Google