Top Banner
Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer, 2013
27

Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Mar 29, 2015

Download

Documents

Raquel Harvard
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Welcome

• Cyber Defense Bootcamp for High School Teacher

• Cyber Defense Lab (ISAT/CS Room 140)

• Department of Computer Science

• James Madison University

• Summer, 2013

Page 2: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Introductions

• Bryan Conner

• Livia Griffith

• Hossain Heydari

• Andrew Hutchson

• Evan Johnson

• Emil Salib

• Brett Tjaden

• Xunhua (Steve) Wang

Page 3: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Goals

• Have fun!

• Teach you about Cyber Defense so that you can:

– Interest your students in Cyber Defense– Teach your students about Cyber Defense

• Cyber Defense Clubs

• CyberPatriot Program (http://www.uscyberpatriot.org/)

Page 4: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Schedule

• Meet Monday – Friday:– 9:00 – 10:15: Session #1– 10:15 – 10:30: Break– 10:30 – 11:45: Session #2– 11:45 – 1:00: Lunch– 1:00 – 2:15: Session #3– 2:15 – 2:30: Break– 2:30 – 4:45: Session #4

Page 5: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

General Information

• No food or drinks near our brand-new laptops

• Restrooms:– Out the door and turn left

– Right at main hallway

– Right at next hallway

– Restrooms are on the right

• If you have a car on campus see us for a parking permit

• Fill out a W-9 form if you want your money

Page 6: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Questions

• Always welcome!

Page 7: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Cyber Defense

• Prepare

• Protect

• Detect

• Triage

• Respond

Page 8: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

The Information Security Problem

• Over the last couple of decades, our world has rapidly become very dependent on computers:– Store medical information– Guide aircrafts– Handle the majority of financial transactions

• There are flaws in our computers’:– Operating systems– Applications– Protocols

• Result: threats

Page 9: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Exacerbating the Problem

• The problem of how to design secure OSs, applications, and protocols is hard

• Too few security professionals

• Many users do not understand the magnitude of the threat

• Many managers do not understand the magnitude of the threat

Page 10: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Threats

• A threat is a potential violation of system security• Examples (from Shirey):

– Disclosure – unauthorized access to information

– Deception – acceptance of false data

– Disruption – interruption or prevention of correct operation

– Usurpation – unauthorized control of some part of the system

Page 11: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Attackers

• Those who intentionally perform actions that cause security violations– Outsiders:

• Competitors• Hackers• Organized crime• Terrorists• Foreign government, military, or law enforcement

– Insiders• Customers, suppliers, vendors, or business partners• Disgruntled current (or former) employees• Contractors, temps, or consultants

Page 12: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Types of Attackers

• Third tier– “Script kiddies” with little knowledge or skill– Run attack scripts and other software written by more

sophisticated attackers

• Second tier– Moderately knowledgeable and skilled attackers– Discover vulnerabilities; create and disseminate exploit tools

• First tier– Elite attackers– Discover vulnerabilities; create private tools

Page 13: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Why You Should Not Be an Attacker

• It is illegal:– United States Code, Title 18, Section 1030 (and

others)– USA Patriot Act, Homeland Security Act,

PROTECT Act– www.cybercrime.gov

• Basically:– Unauthorized access or use of a computer or

network system is illegal– Unintentional attacks are illegal too

Page 14: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Understanding the Tools and Techniques of Attackers

• Important for defenders– Can evaluate systems you defend as attackers will

– Can implement countermeasures designed to thwart attackers

– Better understand the implications of certain decisions

Page 15: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

The Pillars of Computer Security

• The security “triad”:

– Confidentiality

– Integrity

– Availability

Page 16: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

The Security Triad

• Which is most important?

– Confidentiality

– Integrity

– Availability

Page 17: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Policy and Mechanism

• A security policy is a statement of what is, and what is not, allowed– Examples?

• A security mechanism is a method, tool, or procedure for enforcing a security policy– Examples?

Page 18: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Goals of Security

• Prevention – mechanism(s) that cause attacks to fail– Example?

• Detection – mechanism(s) that determines that an attack is under way, or has occurred, and reports it– Example?

• Recovery – mechanism(s) that stop attacks and assess and repair any damage caused– Example?

Page 19: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Justifying Policy and Mechanism

• The benefits of protection should be justified by the cost of designing, implementing, and using the mechanism– Cost-benefit analysis – the benefits of computer

security is weighed against the cost

– Risk analysis – the level of protection is a function of the probability of an attack occurring and the effect of the attack should it succeed

– Laws and customs

Page 20: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Getting Started

• What to do first?– Get to know you systems

• You cannot effectively defend what you don't understand

• Attackers make it their job to understand systems better than the defenders and leverage their advantage in knowledge

• “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle” - Sun Tzu

Page 21: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Getting Started

• What to do first?– Get to know you systems

• You cannot effectively defend what you don't understand

• Attackers make it their job to understand systems better than the defenders and leverage their advantage in knowledge

• “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle” - Sun Tzu

• “You Don't Know Me” - Elvis

Page 22: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

After You Know Your Systems

• Think about threats and attackers

• Think about what needs to be protected (security triad)

• Think about what security policies and mechanisms you will employ

• Think about your goals (prevention, detection, recovery)

• Think about how what policies and mechanisms are justified

Page 23: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

After You Have Thought About Your Systems

• Start to plan, implement, and test improvements to your systems' security posture

• Respond to actions by attackers

Page 24: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Getting started Defending Computer Systems

• Get to know your systems

• Assess the current security posture of your systems

• Identify what needs to be protected

• Think about how threats, attackers, the security triad, security policies/mechanisms, and security goals relate to your systems

• Plan, implement, and test improvements to your systems' security posture

Page 25: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Bootcamp Exercises

• You will not just be listening, you will be doing

• Virtual machines (VMs) – a simulated computer running on another computer

• VMs are great for hands-on Cyber Defense exercises

• You can create and use VMs with your students using free software:

– VirtualBox (https://www.virtualbox.org/)

– VMWare Player (http://www.vmware.com/products/player/)

Page 26: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Accessing your VM for this Bootcamp

• Turn on laptop

• Click on “CyberDefender” account to log in

• Double click on Firefox icon to open web browser

• Enter this information in the vSphere

• If you are not already on it, go to the following page:

• https://10.0.0.250:9443/vsphere-client/

Page 27: Welcome Cyber Defense Bootcamp for High School Teacher Cyber Defense Lab (ISAT/CS Room 140) Department of Computer Science James Madison University Summer,

Accessing your VM for this Bootcamp (cont)

• Log in with the credentials you were given

• Click on “Host and Clusters”

• Expand the items on the left side until you see your “student” VM

• Click on your student VM to highlight it

• In the center window click on the “Summary” tab

• Click on “Launch Console”

• Power on the VM