Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates

  • Authors:
  • Mary Micco;Hart Rossman

  • Affiliations:
  • Indiana University of Pennsylvania;Science Applications International Corporation

  • Venue:
  • SIGCSE '02 Proceedings of the 33rd SIGCSE technical symposium on Computer science education
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

With funding from NSF the Department has set up a stand alone lab for students to learn penetration testing techniques(attack), to harden their networks against these attacks (defense) , and also to gather enough evidence to through careful logging and audit controls to convict a hacker (convict). Linux RedHat 7.1 was used and all the machines were set up as standalone servers in three different subdomains, with 2 perimeter routers and 2 firewalls to allow experimentation with various configurations. In all over 50 software tools were downloaded and tested. Students were screened and asked to sign a disclaimer. They should also have been required to have networking experience. An initial mistake was to run a very minimal server with no services and practically no users. This was not realistic. It made it quick to rebuild systems but much harder to attack.The attacks need to be carefully planned and structured in a specific sequence one at a time, otherwise it becomes very difficult to follow what is going on.