1 / 8

Information Security at the University of Wisconsin – Eau Claire

Information Security at the University of Wisconsin – Eau Claire. Paul J. Wagner wagnerpj@uwec.edu Department of Computer Science University of Wisconsin - Eau Claire Eau Claire, WI 54701. UW-Eau Claire Project. Goals: Build computer security laboratory

yonah
Télécharger la présentation

Information Security at the University of Wisconsin – Eau Claire

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security at the University of Wisconsin – Eau Claire Paul J. Wagner wagnerpj@uwec.edu Department of Computer Science University of Wisconsin - Eau Claire Eau Claire, WI 54701

  2. UW-Eau Claire Project • Goals: • Build computer security laboratory • Develop two courses (Computer Security, Cryptography and Network Security) • Develop course modules for other CS courses related to security issues • Received NSF Course, Curriculum and Laboratory Improvement (CCLI) Adaptation and Implementation (A&I) grant to do this • Based on security lab and courses (actual and proposed) at Indiana University of Pennsylvania • Term: 6/2003 – 5/2005

  3. Computer Laboratory • Heterogeneous • 8 Windows XP machines, 8 Linux machines • Shared keyboard, video monitor and mouse with KVM switch • 8 stations • Several Cisco PIX firewalls, one 48-port switch • Dual Use • Computer Security and regular usage (general, pair programming) • Normal setup – systems open to internet • Secure setup – all or partially isolated from internet

  4. Computer Laboratory (2) • Use Virtual Machines for Computer Security course • Virtual PC (Microsoft) • Another possibility: VMWare • Fedora images stored on network, downloaded to a Windows system • Advantages • Can give students root, systems easily replaced if trashed • Disadvantages • Storage, network downloads • Labororatory Network is Partitionable • Normal setup – Windows machines on one subnet, Linux machines on another subnet • Cyberwar lab setup – additional subnets emulating secure business

  5. Laboratory Layout

  6. Courses • Computer Security • Principles (technological, physical and social) • Practice (hands-on laboratory exercises each week) • Primarily with Linux tools (ethereal, nmap, nessus, bastille, tripwire, snort, john the ripper) • Culmination – multi-day cyberwar laboratory exercise • Paper presented at SIGCSE 2004 • Cryptography and Network Security • Mathematical background for cryptography • Cryptographic algorithms • Programming using cryptography, SSL

  7. Course Modules • CS1/CS2 • Rail Cipher • Caesar Cipher • Steganography • Biometrics (timing keystrokes) • RSA (simplified and secure, using Java) • Spam Filter / Email Analyzer • Advanced Courses • Buffer Overflow (Computer Architecture / Operating Systems) • Database Security (Database Systems / Software Engineering) • Remote User Authentication (Software Engineering) • Mostly assignments that fit in existing course structure • Just another assignment domain

  8. Goals, Contact Information • Goals • Further development and dissemination of our work • Application for Center of Excellence in Information Assurance Education certification in December 2004 • More information on our work: • http://clics.cs.uwec.edu/ • NSF Project, Andrew Phillips and Paul Wagner, Co-PIs • Email • wagnerpj@uwec.edu

More Related