90 likes | 213 Views
Practical Training of Information Security. Masahito Gotaishi, R & D Initiative, Chuo Universty. About Us. Graduate School of Chuo University Faculty of Science & Engineering 8 major subjects including Information and System Engineering
E N D
Practical Training of Information Security Masahito Gotaishi, R & D Initiative, Chuo Universty
About Us • Graduate School of Chuo University • Faculty of Science & Engineering • 8 major subjects including Information and System Engineering • 5 minor subjects including e-Society & Information Security in the MS Course • Part-time Doctoral Course • Launched the Project of Development of the Information Security Training System, sponsored by the MEXT
Necessity of Training Following curriculum is required as the Technical Training… • Threat (ways of unauthorized access) • OS Security • Network Security • Application Security • User Authentication • Network Technology • Encryption • PKI mandatory
,,, -but for What ? • For the skill of implementing security systems • For the skill of Risk Analysis • For the skill of Self-Learning
Description of our Course • Practical Windows security Course • 15~18 students in each class. 3 classes in 2003 • 5 day intensive course, with practice • Purpose • To teach the tools & methodology used in the real scene of SysAdmin & security management. • To realize students the actual risk of the vulnerabilities and exploits. • To give basic training for researching & discovering new methodologies of attacks and defense technology It is one of the new security courses, planned in the Development of the Information Security Training System, sponsored by the MEXT
101 151 171 The environment Windows 2000 Professional (Attack machine) Windows 2000 Server (Target machine) VMware Workstation 4.0 W2K Pro IP W2K Sv IP RedHat IP Red Hat Linux 9
Among the things which impressed the students • Password Cracking • Offline dictionary attacks by Cain to work out the password from the hash • ARP cache poisoning • One of the “Monkey in the Middle” tricks. Most people are amazed at the ease of eavesdropping ,,,,,, and various other ways of intrusion including dcom.exe (MS03-026)
Follow-up study making use of the graduates' community • Graduates' mailing list • Those who finished the course can join the graduates' mailing list to exchange various information related to security • Follow-up study group • Other workshops about the particular fields including "Buffer Overflow" are held among those who want to do
Acknowledgement This work was supported by “The Special Coordination Funds for Promoting Science and Technology” of the Ministry of Education, Culture, Sports, Science and Technology (MEXT), Japan.