240 likes | 435 Views
CYBERSIM. Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan Applegate CprE Saddam Khattak CprE Dan Nguyen CprE/JLMC Adam Straw CprE. Outline. Introduction Project Overview Project Activities Resources and Schedule Summary.
E N D
CYBERSIM Dec 03-06 Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan Applegate CprE Saddam Khattak CprE Dan Nguyen CprE/JLMC Adam Straw CprE
Outline • Introduction • Project Overview • Project Activities • Resources and Schedule • Summary
Definitions • Confidentiality - the concealment of information or resources from unauthorized entities. • Integrity - the trustworthiness of data or resources in terms of preventing unauthorized change. • Availability - the ability to access the desired information or resource. *Definitions taken from Computer Security: Art and Science by Matt Bishop
Definitions (cont.) Threat - a potential violation of security • Disclosure: unauthorized access to information • Deception: acceptance of false data • Disruption: interruption or prevention of correct operation ex: viruses, worms, eavesdropping, password cracking, human error
Problem Statement General Background • Computer security is becoming increasingly vital. • Computer security is still an obscure field of knowledge.
General Solution • Design and produce an engaging computer game • Evaluate players on their ability to create and secure a simulated network • Educate and entertain
Operating Environment • Appropriate software installed • Microsoft Windows 98 or better • DirectX 7.0 • Basic 3D graphics card that can support OpenGL graphics.
Intended Users and Uses Intended Users • High school students • New engineering students Intended Uses • Distribution to interested students • Educational program in the classroom • Entertainment for leisure time
Assumptions • Users will possess basic knowledge of and have experience with computers. • Users will have a CD-ROM drive. • Users will have sufficient processor speed, disk space, and memory. • Game will be played by only one player at a time. • Users will have access to a Windows based PC.
Limitations • Quality art and music for the game will be limited by time. • The project must fit on a single CD-ROM (less than 700MB).
End-Product Description and Deliverables • A Windows-based computer game. • Will allow the user to build a secure computer network. • Protect it from simulated attacks. • The game will be distributed on a CD-ROM.
Present Accomplishments • Familiar with Open GL 3D engine • Started building the foundation for the game • Have started to implement the attack GUI
Technologies Considered and Used Technologies Considered • Macromedia Director • OpenGL • Alias WaveFront’s Maya • 3DMAX • Java3D Technologies Used • OpenGL with Visual C++
Research and Design Activities • Research network architecture to better understanding of the following • Networking • Possible attacks • Possible defenses • Design working computer security game • Realistic computer networks • Random attacks
Implementation Activities • Iterative Development • Increased Visibility • Managed Complexity • Develop game in steps • Foundation • Simulation • GUI
Testing Activities • Small group testing • Get honest feedback • Challenge all users • Simulation is accurate • Difficulty increases • Attacks are random
Product Schedule • Plan Project (2/3/03) • Implement Goals 225 days (by 12/13/03) • Deliverables 212 days(by 11/13/03)
Project Evaluation • Research (90%) • Documentation (90%) • Implementation (25%) • Testing (10%)
Closing • Commercialization • Possible distribution by ISU • Owned by Information Assurance Center • Add more functionality • Lessons Learned • Time Management • Team Communication
Summary • Project Goals • Develop working computer network • Implemented various attacks/defenses • Approach Taken • Use OpenGL and Visual C++ • Follow iterative model • Develop significant GUI
Thank You! For any further questions contact us at cybersim@iastate.edu