Secure lab setup for cyber security
-
Upload
birju-tank -
Category
Engineering
-
view
96 -
download
1
Transcript of Secure lab setup for cyber security
![Page 1: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/1.jpg)
SECURE LAB SETUP
FOR CYBER SECURITY
Prepared By :
Birju Tank
GTU PG School, BISAG
GANDHINAGAR.
![Page 2: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/2.jpg)
Main Messages
Developing a good cyber security laboratory and related
exercise takes:
Planning
Thought
Resources
Helps to think about goals and structure
![Page 3: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/3.jpg)
Goals
Mixed use laboratory
Not enough space to dedicate to security
Need to be able to connect/disconnect from campus network quickly
Support both Windows and Linux
IUP only supported Linux, real-world environment is heterogeneous
Be able to emulate a real-world enterprise computing environment
![Page 4: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/4.jpg)
Laboratory
![Page 5: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/5.jpg)
One Way to Lower the Cost
Purchase one many-port switch to act as physical switch, all hubs
Can isolate groups of ports
Can bridge groups where needed
Advantages
Significant cost savings
Reduced maintenance need
Disadvantage
Initial setup difficult
![Page 6: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/6.jpg)
Cont’d
Use of Virtual Machines within Physical Machines
Products
Microsoft Virtual PC (used 2005)
Support discontinued for Mac environment in 8/2006
VMWare (used 2006)
Another possibility: Xen
Operating systems must be modified
Higher performance gained
![Page 7: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/7.jpg)
Laboratory – Physical Issues
Want to provide some sense of physical security for each station
Lab furniture is currently 8 cubicles with high walls
Problem: not good for general usage, students tend to “hide” in lab and take over stations
Future: a more open physical environment?
![Page 8: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/8.jpg)
INFRASTRUCTURE
Goals
Heterogeneous and Isolated Network
Same system for each student team
Replicating tool (e.g. Norton Ghost) saves much
time
Don’t forget to give each machine its own identity
![Page 9: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/9.jpg)
Cont’d
Structure of Isolated Network
One zone (all systems off one hub)
Student Team Systems running older Windows
Server, Linux systems
Non-current OSs with known security holes
All tools used in lab exercises
Added several realistic-looking accounts (e.g.
backup, logwd, tomcat) with weak passwords
![Page 10: Secure lab setup for cyber security](https://reader036.fdocuments.in/reader036/viewer/2022081209/55a779a31a28ab5e0a8b49b4/html5/thumbnails/10.jpg)
Cont’d
Structure of Isolated Network (continued)
Several Non-Student Systems
Other variants of Windows and Linux
1 Monitoring system
Additional Available Systems
Host systems can be used for internet access