cybersim dec 03-06 client: information assurance center advisor: dr. doug jacobson group members:...

24
CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan Applegate CprE Saddam Khattak CprE Dan Nguyen CprE/JLMC Adam Straw CprE

Upload: erin-hopkins

Post on 01-Jan-2016

216 views

Category:

Documents


1 download

TRANSCRIPT

CYBERSIM

Dec 03-06

Client: Information Assurance Center

Advisor: Dr. Doug Jacobson

Group Members:

Ryan Applegate CprE

Saddam Khattak CprE

Dan Nguyen CprE/JLMC

Adam Straw CprE

Outline

• Introduction

• Project Overview

• Project Activities

• Resources and Schedule

• Summary

Definitions

• Confidentiality - the concealment of information or resources from unauthorized entities.

• Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change.

• Availability - the ability to access the desired information or resource.

*Definitions taken from Computer Security: Art and Science by Matt Bishop

Definitions (cont.)

Threat - a potential violation of security• Disclosure: unauthorized access to

information• Deception: acceptance of false data• Disruption: interruption or prevention of

correct operation

ex: viruses, worms, eavesdropping, password cracking, human error

Problem Statement

General Background

• Computer security is becoming increasingly vital.

• Computer security is still an obscure field of knowledge.

General Solution

• Design and produce an engaging computer game

• Evaluate players on their ability to create and secure a simulated network

• Educate and entertain

Operating Environment

• Appropriate software installed

• Microsoft Windows 98 or better

• DirectX 7.0

• Basic 3D graphics card that can support OpenGL graphics.

Intended Users and Uses

Intended Users• High school students • New engineering students

Intended Uses• Distribution to interested students• Educational program in the classroom• Entertainment for leisure time

Assumptions

• Users will possess basic knowledge of and have experience with computers.

• Users will have a CD-ROM drive.• Users will have sufficient processor speed,

disk space, and memory.• Game will be played by only one player at a

time.• Users will have access to a Windows based

PC.

Limitations

• Quality art and music for the game will be limited by time.

• The project must fit on a single CD-ROM (less than 700MB).

End-Product Description and Deliverables

• A Windows-based computer game. • Will allow the user to build a secure

computer network.• Protect it from simulated attacks.

• The game will be distributed on a CD-ROM.

Present Accomplishments

• Familiar with Open GL 3D engine

• Started building the foundation for the game

• Have started to implement the attack GUI

Technologies Considered and Used

Technologies Considered• Macromedia Director• OpenGL• Alias WaveFront’s Maya• 3DMAX• Java3D

Technologies Used• OpenGL with Visual C++

Research and Design Activities

• Research network architecture to better understanding of the following• Networking• Possible attacks• Possible defenses

• Design working computer security game• Realistic computer networks• Random attacks

Implementation Activities

• Iterative Development• Increased Visibility• Managed Complexity

• Develop game in steps• Foundation• Simulation• GUI

Testing Activities

• Small group testing• Get honest feedback• Challenge all users

• Simulation is accurate• Difficulty increases• Attacks are random

Personnel Effort

0

20

40

60

80

100

120

RyanApplegate

SaddamKhattak

DanNguyen

AdamStraw

EstimatedActual

Financial Budget

Item Estimated Actual

Poster

Development Software

$40

$200

$48

$0

Total $240 $48

Product Schedule

• Plan Project (2/3/03)

• Implement Goals 225 days (by 12/13/03)

• Deliverables 212 days(by 11/13/03)

Project Evaluation

• Research (90%)

• Documentation (90%)

• Implementation (25%)

• Testing (10%)

Closing

• Commercialization– Possible distribution by ISU– Owned by Information Assurance Center

• Add more functionality

• Lessons Learned– Time Management– Team Communication

Summary

• Project Goals– Develop working computer network– Implemented various attacks/defenses

• Approach Taken– Use OpenGL and Visual C++– Follow iterative model– Develop significant GUI

Questions

?

Thank You!

For any further questions contact us at

[email protected]