1 / 24

CYBERSIM

CYBERSIM. Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan Applegate CprE Saddam Khattak CprE Dan Nguyen CprE/JLMC Adam Straw CprE. Outline. Introduction Project Overview Project Activities Resources and Schedule Summary.

camila
Download Presentation

CYBERSIM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan Applegate CprE Saddam Khattak CprE Dan Nguyen CprE/JLMC Adam Straw CprE

  2. Outline • Introduction • Project Overview • Project Activities • Resources and Schedule • Summary

  3. Definitions • Confidentiality - the concealment of information or resources from unauthorized entities. • Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change. • Availability - the ability to access the desired information or resource. *Definitions taken from Computer Security: Art and Science by Matt Bishop

  4. Definitions (cont.) Threat - a potential violation of security • Disclosure: unauthorized access to information • Deception: acceptance of false data • Disruption: interruption or prevention of correct operation ex: viruses, worms, eavesdropping, password cracking, human error

  5. Problem Statement General Background • Computer security is becoming increasingly vital. • Computer security is still an obscure field of knowledge.

  6. General Solution • Design and produce an engaging computer game • Evaluate players on their ability to create and secure a simulated network • Educate and entertain

  7. Operating Environment • Appropriate software installed • Microsoft Windows 98 or better • DirectX 7.0 • Basic 3D graphics card that can support OpenGL graphics.

  8. Intended Users and Uses Intended Users • High school students • New engineering students Intended Uses • Distribution to interested students • Educational program in the classroom • Entertainment for leisure time

  9. Assumptions • Users will possess basic knowledge of and have experience with computers. • Users will have a CD-ROM drive. • Users will have sufficient processor speed, disk space, and memory. • Game will be played by only one player at a time. • Users will have access to a Windows based PC.

  10. Limitations • Quality art and music for the game will be limited by time. • The project must fit on a single CD-ROM (less than 700MB).

  11. End-Product Description and Deliverables • A Windows-based computer game. • Will allow the user to build a secure computer network. • Protect it from simulated attacks. • The game will be distributed on a CD-ROM.

  12. Present Accomplishments • Familiar with Open GL 3D engine • Started building the foundation for the game • Have started to implement the attack GUI

  13. Technologies Considered and Used Technologies Considered • Macromedia Director • OpenGL • Alias WaveFront’s Maya • 3DMAX • Java3D Technologies Used • OpenGL with Visual C++

  14. Research and Design Activities • Research network architecture to better understanding of the following • Networking • Possible attacks • Possible defenses • Design working computer security game • Realistic computer networks • Random attacks

  15. Implementation Activities • Iterative Development • Increased Visibility • Managed Complexity • Develop game in steps • Foundation • Simulation • GUI

  16. Testing Activities • Small group testing • Get honest feedback • Challenge all users • Simulation is accurate • Difficulty increases • Attacks are random

  17. Personnel Effort

  18. Financial Budget

  19. Product Schedule • Plan Project (2/3/03) • Implement Goals 225 days (by 12/13/03) • Deliverables 212 days(by 11/13/03)

  20. Project Evaluation • Research (90%) • Documentation (90%) • Implementation (25%) • Testing (10%)

  21. Closing • Commercialization • Possible distribution by ISU • Owned by Information Assurance Center • Add more functionality • Lessons Learned • Time Management • Team Communication

  22. Summary • Project Goals • Develop working computer network • Implemented various attacks/defenses • Approach Taken • Use OpenGL and Visual C++ • Follow iterative model • Develop significant GUI

  23. Questions ?

  24. Thank You! For any further questions contact us at cybersim@iastate.edu

More Related