Presentation is loading. Please wait.

Presentation is loading. Please wait.

ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite.

Similar presentations


Presentation on theme: "ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite."— Presentation transcript:

1 ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite the popularity of computers and networking, network security is still an obscure subject. The goal of this project is to develop an interactive computer game that shall introduce people to the theory and fundamentals of computer security. CYBER Sim shall be modeled after the Electronic Arts(TM) Sim® games and shall allow the player to purchase equipment and attempt to protect a network. The game shall simulate attacks on the network and the player shall be evaluated on how well he/she has designed the protection system. It is our desire to create a game that will be entertaining yet will educate the user on the importance and the fundamentals of computer security. Team Members Ryan Applegate (CprE) Saddam Khattak (CprE) Dan Nguyen (CprE) Adam Straw (CprE) Faculty Advisor Doug Jacobson Client Information Assurance Department PROJECT REQUIREMENTS Design objectives Easy to install and play Easy learning curve Playing time of up to 2-3 hours (per sitting) High educational value High “fun factor” Functional Requirements Graphical engine Accurate simulation of networks and network attacks In-game help and definitions of network terminology Design Constraints Cost-effective design Flexible for future expansion MILESTONES AND SCHEDULE 1.Problem IdentificationMarch 1512% 2.ResearchMarch 2510% 3.Decision on programming languageMarch 258% 4.Implementation of CVSMarch 255% 5.Framework/Structure Aug 200315% 6.Creation of simulationSept 200314% 7.Graphical user interface and engineOct 200314% 8.Beta testingNov 200312% 9.Project DistributionDec 200310% Total100% RESOURCES AND SCHEDULE Estimated Resources CLOSING SUMMARY It takes more than armed guards and complicated locks to defend against cyber- thieves. Defending a network requires a strong grasp of the latest technological safeguards as well as competent managing of resources. As the world becomes more dependent on the Internet to transmit information, the expertise needed to defend against hackers must increase in response. This is the underlying motive behind CYBER Sim. Network security is still an obscure concept for laymen in general. Our goal is to make the basic concepts of network security accessible to attract new engineering students to and increase the general knowledge of this essential field. INTRODUCTION Problem Statement Students interested in computer engineering are generally unaware of or unable to understand the field of network security Problem Approach Design and produce an engaging computer game that will teach the user how to build a secure network and protect it from simulated attacks Operating Environment Software will be installed on Microsoft Windows computers with basic 3D graphics cards that can support basic OpenGL graphics. Intended Users High school students New engineering students Intended Uses Distribution to interested students Educational program in the classroom Entertainment for leisure time Assumptions Users will possess basic knowledge of and experience with computers Users will have a CD-ROM drive Limitations Lack of skill in creating professional art and music for the game Limited knowledge in graphical programming EXPECTED END PRODUCT AND OTHER DELIVERABLES A Windows-based computer game that will allow the user to build a secure computer network and protect it from simulated attacks. The game will be distributed on a CD- ROM. PROPOSED APPROACH AND CONSIDERATIONS Proposed Approach Research will be conducted to better understand network architecture and the kinds of attacks it is vulnerable to. Program will be developed piece by piece, starting off with the foundation, then the simulation, and then the graphical interface. Technologies considered Macromedia Director OpenGL Alias WaveFront’s Maya 3DMAX Java3D Testing considerations Small group testing Game community beta-distribution Simulation is accurate Personal Effort Adam Straw, 110 Ryan Applegate, 109Saddam Khattak, 111 Dan Nguyen, 111 Other Resources Development Material, 40 Development Software, $200 Tools of History’s Great Robberies Revolver Date: Late 19 th Century Who: Jesse James Robbed: Banks and trains How much: est. $150,000 Naval Cannon Date: 1623 Who: Vice Admiral Piet Heyn Robbed: The Spanish silver fleet How much: 10 million guilders Tommy Gun Date: 1930s Who: Machine Gun Kelly Robbed: Banks How much: est. $300,000 Laptop Date: 1994 Who: Vladimir Levin Robbed: Citibank How much: $12 million


Download ppt "ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite."

Similar presentations


Ads by Google