Download presentation
Presentation is loading. Please wait.
Published byErin Hopkins Modified over 9 years ago
1
CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC Adam StrawCprE
2
Outline Introduction Project Overview Project Activities Resources and Schedule Summary
3
Definitions Confidentiality - the concealment of information or resources from unauthorized entities. Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change. Availability - the ability to access the desired information or resource. *Definitions taken from Computer Security: Art and Science by Matt Bishop
4
Definitions (cont.) Threat - a potential violation of security Disclosure: unauthorized access to information Deception: acceptance of false data Disruption: interruption or prevention of correct operation ex: viruses, worms, eavesdropping, password cracking, human error
5
Problem Statement General Background Computer security is becoming increasingly vital. Computer security is still an obscure field of knowledge.
6
General Solution Design and produce an engaging computer game Evaluate players on their ability to create and secure a simulated network Educate and entertain
7
Operating Environment Appropriate software installed Microsoft Windows 98 or better DirectX 7.0 Basic 3D graphics card that can support OpenGL graphics.
8
Intended Users and Uses Intended Users High school students New engineering students Intended Uses Distribution to interested students Educational program in the classroom Entertainment for leisure time
9
Assumptions Users will possess basic knowledge of and have experience with computers. Users will have a CD-ROM drive. Users will have sufficient processor speed, disk space, and memory. Game will be played by only one player at a time. Users will have access to a Windows based PC.
10
Limitations Quality art and music for the game will be limited by time. The project must fit on a single CD- ROM (less than 700MB).
11
End-Product Description and Deliverables A Windows-based computer game. Will allow the user to build a secure computer network. Protect it from simulated attacks. The game will be distributed on a CD- ROM.
12
Present Accomplishments Familiar with Open GL 3D engine Started building the foundation for the game Have started to implement the attack GUI
13
Technologies Considered and Used Technologies Considered Macromedia Director OpenGL Alias WaveFront’s Maya 3DMAX Java3D Technologies Used OpenGL with Visual C++
14
Research and Design Activities Research network architecture to better understanding of the following Networking Possible attacks Possible defenses Design working computer security game Realistic computer networks Random attacks
15
Implementation Activities Iterative Development Increased Visibility Managed Complexity Develop game in steps Foundation Simulation GUI
16
Testing Activities Small group testing Get honest feedback Challenge all users Simulation is accurate Difficulty increases Attacks are random
17
Personnel Effort
18
Financial Budget ItemEstimatedActual Poster Development Software $40 $200 $48 $0 Total$240$48
19
Product Schedule Plan Project (2/3/03) Implement Goals 225 days (by 12/13/03) Deliverables 212 days (by 11/13/03)
20
Project Evaluation Research (90%) Documentation (90%) Implementation(25%) Testing(10%)
21
Closing Commercialization –Possible distribution by ISU –Owned by Information Assurance Center Add more functionality Lessons Learned –Time Management –Team Communication
22
Summary Project Goals –Develop working computer network –Implemented various attacks/defenses Approach Taken –Use OpenGL and Visual C++ –Follow iterative model –Develop significant GUI
23
Questions ?
24
Thank You! For any further questions contact us at cybersim@iastate.edu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.