1 / 11

Wrap-up

Wrap-up. Goals. Have fun! Teach you about Cyber Defense so that you can: Interest your students in Cyber Defense Teach your students about Cyber Defense Cyber Defense Clubs CyberPatriot Program (http://www.uscyberpatriot.org/). Exercises.

larrypowell
Télécharger la présentation

Wrap-up

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wrap-up

  2. Goals • Have fun! • Teach you about Cyber Defense so that you can: • Interest your students in Cyber Defense • Teach your students about Cyber Defense • Cyber Defense Clubs • CyberPatriot Program (http://www.uscyberpatriot.org/)

  3. Exercises • Virtual machines (VMs) are great for hands-on Cyber Defense exercises • You can create and use VMs with your students using free software: • VirtualBox (https://www.virtualbox.org/) • VMWare Player (http://www.vmware.com/products/player/)

  4. Why You (and Your Students) Should Not Be Attackers • It is illegal: • United States Code, Title 18, Section 1030 (and others) • USA Patriot Act, Homeland Security Act, PROTECT Act • www.cybercrime.gov • Basically: • Unauthorized access or use of a computer or network system is illegal • Unintentional attacks are illegal too

  5. Understanding the Systems You are Defending • You cannot effectively defend what you don't understand • Think about what needs to be defended (security triad)

  6. Understanding Your Adversaries • Can evaluate systems you defend as attackers will • Can implement countermeasures designed to thwart attackers • Better understand the implications of certain decisions

  7. Understanding Tools and Techniques at Your Disposal • What security policies and mechanisms you will employ? • What are your goals? • Prevention • Detection • Recovery • What policies and mechanisms are justified?

  8. Cyber Defense • Prepare • Protect • Detect • Triage • Respond

  9. Useful Links • csrc.nist.gov/nice/ - NICE is a national campaign designed to improve the cyber behavior, skills, and knowledge of every segment of the population, enabling a safer cyberspace. • securingourecity.org/- Securing Our eCity organization provides awareness of potential issues and offers free cybersecurity information and education. • www.onguardonline.gov/- OnGuardOnline.gov is the federal government’s website to help you be safe, secure and responsible online. • www.mysecurecyberspace.com- A Free Educational Resource Created by Carnegie Mellon University to Empower You to Secure Your Part of Cyberspace • http://www.carnegiecyberacademy.com/ - At the Carnegie Cyber Academy, cadets complete several training missions in Cyberspace that equip them with the skills they need to be good cybercitizens and Cyber Defenders of the Internet.

  10. Useful Links (cont) http://www.playbeseen.com/ - BeSeen is provided by Carnegie Mellon University and Web Wise Kids to teach youth how to be responsible in social networks by securing their private and personal information, protecting their online reputation and defending their peers. http://www.netsupportschool.com/- NetSupport School is the class-leading training software solution, providing teachers with the ability to instruct and visually/audibly monitor, as well as interact with their students, individually, as a pre-defined group or to the whole class. http://www.consumer.ftc.gov/features/feature-0014-identity-theft- Federal trade commission provides several resources in identity theft, file sharing, and others. http://www.us-cert.gov/ - US-CERT’s mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation while protecting the constitutional rights of Americans. http://www.sans.org/ - The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world.

  11. Final Thoughts • Thank you for your participation! • We hope you can use what we have learned to interest your students in Cyber Defense • If we can be of assistance in the future, just ask • Things to do before you leave: • I9 forms for stipends • Survey so that the DoD knows we didn’t waste their money: • Bookmarked in browser: • http://jmu.qualtrics.com/SE/?SID=SV_cwHzj95KkF9gprT

More Related