cybersim dec 03-06 client: information assurance center advisor: dr. doug jacobson group members:...
TRANSCRIPT
CYBERSIM
Dec 03-06
Client: Information Assurance Center
Advisor: Dr. Doug Jacobson
Group Members:
Ryan Applegate CprE
Saddam Khattak CprE
Dan Nguyen CprE/JLMC
Adam Straw CprE
Definitions
• Confidentiality - the concealment of information or resources from unauthorized entities.
• Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change.
• Availability - the ability to access the desired information or resource.
*Definitions taken from Computer Security: Art and Science by Matt Bishop
Definitions (cont.)
Threat - a potential violation of security• Disclosure: unauthorized access to
information• Deception: acceptance of false data• Disruption: interruption or prevention of
correct operation
ex: viruses, worms, eavesdropping, password cracking, human error
Problem Statement
General Background
• Computer security is becoming increasingly vital.
• Computer security is still an obscure field of knowledge.
General Solution
• Design and produce an engaging computer game
• Evaluate players on their ability to create and secure a simulated network
• Educate and entertain
Operating Environment
• Appropriate software installed
• Microsoft Windows 98 or better
• DirectX 7.0
• Basic 3D graphics card that can support OpenGL graphics.
Intended Users and Uses
Intended Users• High school students • New engineering students
Intended Uses• Distribution to interested students• Educational program in the classroom• Entertainment for leisure time
Assumptions
• Users will possess basic knowledge of and have experience with computers.
• Users will have a CD-ROM drive.• Users will have sufficient processor speed,
disk space, and memory.• Game will be played by only one player at a
time.• Users will have access to a Windows based
PC.
Limitations
• Quality art and music for the game will be limited by time.
• The project must fit on a single CD-ROM (less than 700MB).
End-Product Description and Deliverables
• A Windows-based computer game. • Will allow the user to build a secure
computer network.• Protect it from simulated attacks.
• The game will be distributed on a CD-ROM.
Present Accomplishments
• Familiar with Open GL 3D engine
• Started building the foundation for the game
• Have started to implement the attack GUI
Technologies Considered and Used
Technologies Considered• Macromedia Director• OpenGL• Alias WaveFront’s Maya• 3DMAX• Java3D
Technologies Used• OpenGL with Visual C++
Research and Design Activities
• Research network architecture to better understanding of the following• Networking• Possible attacks• Possible defenses
• Design working computer security game• Realistic computer networks• Random attacks
Implementation Activities
• Iterative Development• Increased Visibility• Managed Complexity
• Develop game in steps• Foundation• Simulation• GUI
Testing Activities
• Small group testing• Get honest feedback• Challenge all users
• Simulation is accurate• Difficulty increases• Attacks are random
Personnel Effort
0
20
40
60
80
100
120
RyanApplegate
SaddamKhattak
DanNguyen
AdamStraw
EstimatedActual
Product Schedule
• Plan Project (2/3/03)
• Implement Goals 225 days (by 12/13/03)
• Deliverables 212 days(by 11/13/03)
Closing
• Commercialization– Possible distribution by ISU– Owned by Information Assurance Center
• Add more functionality
• Lessons Learned– Time Management– Team Communication
Summary
• Project Goals– Develop working computer network– Implemented various attacks/defenses
• Approach Taken– Use OpenGL and Visual C++– Follow iterative model– Develop significant GUI