Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC.

Similar presentations


Presentation on theme: "CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC."— Presentation transcript:

1 CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC Adam StrawCprE

2 Outline Introduction Project Overview Project Activities Resources and Schedule Summary

3 Definitions Confidentiality - the concealment of information or resources from unauthorized entities. Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change. Availability - the ability to access the desired information or resource. *Definitions taken from Computer Security: Art and Science by Matt Bishop

4 Definitions (cont.) Threat - a potential violation of security Disclosure: unauthorized access to information Deception: acceptance of false data Disruption: interruption or prevention of correct operation ex: viruses, worms, eavesdropping, password cracking, human error

5 Problem Statement General Background Computer security is becoming increasingly vital. Computer security is still an obscure field of knowledge.

6 General Solution Design and produce an engaging computer game Evaluate players on their ability to create and secure a simulated network Educate and entertain

7 Operating Environment Appropriate software installed Microsoft Windows 98 or better DirectX 7.0 Basic 3D graphics card that can support OpenGL graphics.

8 Intended Users and Uses Intended Users High school students New engineering students Intended Uses Distribution to interested students Educational program in the classroom Entertainment for leisure time

9 Assumptions Users will possess basic knowledge of and have experience with computers. Users will have a CD-ROM drive. Users will have sufficient processor speed, disk space, and memory. Game will be played by only one player at a time. Users will have access to a Windows based PC.

10 Limitations Quality art and music for the game will be limited by time. The project must fit on a single CD- ROM (less than 700MB).

11 End-Product Description and Deliverables A Windows-based computer game. Will allow the user to build a secure computer network. Protect it from simulated attacks. The game will be distributed on a CD- ROM.

12 Present Accomplishments Familiar with Open GL 3D engine Started building the foundation for the game Have started to implement the attack GUI

13 Technologies Considered and Used Technologies Considered Macromedia Director OpenGL Alias WaveFront’s Maya 3DMAX Java3D Technologies Used OpenGL with Visual C++

14 Research and Design Activities Research network architecture to better understanding of the following Networking Possible attacks Possible defenses Design working computer security game Realistic computer networks Random attacks

15 Implementation Activities Iterative Development Increased Visibility Managed Complexity Develop game in steps Foundation Simulation GUI

16 Testing Activities Small group testing Get honest feedback Challenge all users Simulation is accurate Difficulty increases Attacks are random

17 Personnel Effort

18 Financial Budget ItemEstimatedActual Poster Development Software $40 $200 $48 $0 Total$240$48

19 Product Schedule Plan Project (2/3/03) Implement Goals 225 days (by 12/13/03) Deliverables 212 days (by 11/13/03)

20 Project Evaluation Research (90%) Documentation (90%) Implementation(25%) Testing(10%)

21 Closing Commercialization –Possible distribution by ISU –Owned by Information Assurance Center Add more functionality Lessons Learned –Time Management –Team Communication

22 Summary Project Goals –Develop working computer network –Implemented various attacks/defenses Approach Taken –Use OpenGL and Visual C++ –Follow iterative model –Develop significant GUI

23 Questions ?

24 Thank You! For any further questions contact us at cybersim@iastate.edu


Download ppt "CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC."

Similar presentations


Ads by Google