80 likes | 204 Views
Information Security at the University of Wisconsin – Eau Claire. Paul J. Wagner wagnerpj@uwec.edu Department of Computer Science University of Wisconsin - Eau Claire Eau Claire, WI 54701. UW-Eau Claire Project. Goals: Build computer security laboratory
E N D
Information Security at the University of Wisconsin – Eau Claire Paul J. Wagner wagnerpj@uwec.edu Department of Computer Science University of Wisconsin - Eau Claire Eau Claire, WI 54701
UW-Eau Claire Project • Goals: • Build computer security laboratory • Develop two courses (Computer Security, Cryptography and Network Security) • Develop course modules for other CS courses related to security issues • Received NSF Course, Curriculum and Laboratory Improvement (CCLI) Adaptation and Implementation (A&I) grant to do this • Based on security lab and courses (actual and proposed) at Indiana University of Pennsylvania • Term: 6/2003 – 5/2005
Computer Laboratory • Heterogeneous • 8 Windows XP machines, 8 Linux machines • Shared keyboard, video monitor and mouse with KVM switch • 8 stations • Several Cisco PIX firewalls, one 48-port switch • Dual Use • Computer Security and regular usage (general, pair programming) • Normal setup – systems open to internet • Secure setup – all or partially isolated from internet
Computer Laboratory (2) • Use Virtual Machines for Computer Security course • Virtual PC (Microsoft) • Another possibility: VMWare • Fedora images stored on network, downloaded to a Windows system • Advantages • Can give students root, systems easily replaced if trashed • Disadvantages • Storage, network downloads • Labororatory Network is Partitionable • Normal setup – Windows machines on one subnet, Linux machines on another subnet • Cyberwar lab setup – additional subnets emulating secure business
Courses • Computer Security • Principles (technological, physical and social) • Practice (hands-on laboratory exercises each week) • Primarily with Linux tools (ethereal, nmap, nessus, bastille, tripwire, snort, john the ripper) • Culmination – multi-day cyberwar laboratory exercise • Paper presented at SIGCSE 2004 • Cryptography and Network Security • Mathematical background for cryptography • Cryptographic algorithms • Programming using cryptography, SSL
Course Modules • CS1/CS2 • Rail Cipher • Caesar Cipher • Steganography • Biometrics (timing keystrokes) • RSA (simplified and secure, using Java) • Spam Filter / Email Analyzer • Advanced Courses • Buffer Overflow (Computer Architecture / Operating Systems) • Database Security (Database Systems / Software Engineering) • Remote User Authentication (Software Engineering) • Mostly assignments that fit in existing course structure • Just another assignment domain
Goals, Contact Information • Goals • Further development and dissemination of our work • Application for Center of Excellence in Information Assurance Education certification in December 2004 • More information on our work: • http://clics.cs.uwec.edu/ • NSF Project, Andrew Phillips and Paul Wagner, Co-PIs • Email • wagnerpj@uwec.edu