QUINTUS SECURITY Final Presentation 4/29/11 Sanjiv KawaJoshua Reynolds Moe HansaChristian Cortes.

Slides:



Advertisements
Similar presentations
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Advertisements

Mr C Johnston ICT Teacher
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Our Group Andrew McGillivray David Collins Tyler Todd.
Trojan Horse Program Presented by : Lori Agrawal.
12/13/20051 Egypt Education Service (EES) Capstone Design Mohammed Khalilia Saif Khairat.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Securing & Sharing a Presentation
Offering your Windows Server Class Online. Tony Basilico Community College of Rhode Island
Sample School Website Sydney Region ITSU School Support
Dynamic Web site With PHP and MySQL. MySQL The combination of MySQL database and PHP scripting language is optimum for building dynamic websites. MySQL.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Website Hardening HUIT IT Security | Sep
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Networking, Hardware Issues, SQL Server and Terminal Services Session VII.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Senior Design – Spring 2009 Richard Gory Focus: Networking & Web.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
BIF713 Operating Systems & Project Management Instructor: Murray Saul
Item Web 2.0 application relevant to teacher’s work.
Tutorial 11 Installing, Updating, and Configuring Software
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Tutorial 4: Working with Hyperlinks. Objectives Session 4.1 – Place bookmarks on a Web page – Create a link to a bookmark – Create a link to another Web.
The In’s and Out’s of the IIS 6.0 Migration Tool The In’s and Out’s of the IIS 6.0 Migration Tool Chris Adams Web Platform Supportability Lead Microsoft.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Online Translation Service Capstone Design Eunyoung Ku Jason Roberts Jennifer Pitts Gregory Woodburn Kim Tran.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
The Filer Proj-354 Apr 29 th, 2010 Group members Henry Au Wayne Choi Jaewon Yoo
By Colin Phan, Ken Lee Marquez, Gyu Beom Choi. Agenda  Introductions  Project Information  Challenges  Successes  Lessons Learned  Budget  The.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Sample School Website. What is wrong with the existing School Webspace Site? Can only host static pages – no dynamic content possible. Can not be edited.
Crystal Reports Training
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
MOE – Experience 1.What do you get 2.It just works 3.Same look and feel across the university 4.Your documents and desktop available.
OmniView® Remote IP Device. OmniView® Remote IP Device – Features and Benefits Control your Server or KVM switch over LAN or WAN The OmniView SMB Remote.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Liberty Mutual Group Asset Management Inc. Group Liberty Mutual Group Asset Management Inc. Business Continuity & Securing Your Data Our responsibilities.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
Ryan Bibby 13/10/2014 Slide 1 Computer Systems Project 1 | Assignment 3 | Tasks 1,2,3 Ryan Bibby.
Web Programming Language
Data Virtualization Tutorial… SSL with CIS Web Data Sources
ZIMBRA DESKTOP USER MANUAL
Chapter 6 Application Hardening
World Wide Web policy.
Creating an Oracle Database
Securing & Sharing a Presentation
Backtrack Metasploit and SET
Content of Presentation
Keeping Member Data Safe
Implementing Client Security on Windows 2000 and Windows XP Level 150
Automated Infrastructure as a Service
Online Translation Service Capstone Design
Database Management Systems
Securing and Sharing a Presentation
In-house Developed Library Solutions
Designing IIS Security (IIS – Internet Information Service)
IT Office hours – 1 Data Sharing 101
Securing and Sharing a Presentation
Presentation transcript:

QUINTUS SECURITY Final Presentation 4/29/11 Sanjiv KawaJoshua Reynolds Moe HansaChristian Cortes

AGENDA  Projects Reasoning and Choice  Server Implementation  Website Structure  Tutorials and Content  Projects Challenges and Successes  Lessons Learned  Questions

WHO ARE WE?  Quintus Security:  Quintus of Smyrna  A tale teller of the original Trojan Horse  Greek Mythology  Invasion of Troy  Information Technology  Major: Computer Systems Image [1]

WHAT IS THE PROJECT?  Security Information Website  Written Tutorials/Papers  Video Demonstrations  Attack Demonstrations  Preventive Demonstrations

WHY DID WE CHOOSE IT?  Lack of understandable Security Information.  Improper Security Practices in the Industry.  A group passion for security and providing awareness.

SPONSORSHIP  Sponsored by Seccuris Inc.  Intellectual Property of the Capstone Project as provided to Seccuris  Experts in Information Security  Internationally recognized by academic and professional institutes  Based out of Winnipeg Image [2]

REQUIREMENTS – BUSINESS PLAN  Due to the nature of the project a Business Plan was required  A formal document that is needed for the pre-approval for a loan  A Business Plan includes:  Business Goals, Description, and Background  Marketing and Advertising  Competition, Growth Program, Risk Assessment

ItemCost Windows Server 2008 R2 Enterprise$3, Windows XP SP3 Professional$ VMware Workstation 7.1$ Camtasia for Mac | Screen Recording & Presentation $99.00 Linux Distributions$0.00 Canon FS200 Camcorder$ LaCie 500GB External HD USB 2.0$99.99 Server System ( HP DL385 G7) $ D-Link DGS-1008G 8-Port Gigabit Desktop Switch$59.99 Samsung BX2240X 21.5" Business LED Monitor$ x14’ CAT6 Ethernet Patch Cable$27.92 Microsoft Wireless Desktop 3000 Keyboard & Mouse Bundle, English $49.99 Blue Microphones | Snowflake$83.99 Total$ RESOURCES – TIME SPENT & MATERIAL

MembersPositionTime Spent RateCost Christian CortesResearch & Technologist75 hours$25.10$ Josh ReynoldsProject Manager88 hours$40.00$ Moe HasnaResearch & Technologist83 hours$25.10$ Sanjiv KawaWeb Designer & Architect86 hours$25.10$ Hourly Total332 hoursCost Total$ Grand Total$17,784.23

SERVER IMPLEMENTATION  HP DL385 G7  Raid 5 Array (6 Drives)  Hard Drive Encryption  Ubuntu Server v10.10  PHP5  apache2  SSH  SFTP  SSL  MySQL

WEBSITE STRUCTURE  The website can be broken down into 2 areas:  Administration Section – Accessed via “hidden” path.  User Section – Available to registered users only.

WEBSITE STRUCTURE - ADMIN  The Administration Area of the Website consists of 3 sections:  Add User – The creation of either a regular user or moderator.  Delete User – The removal of either a regular user or moderator.  Administrative Logs – Tracks if a moderator has logged, specifies IP and Time.

WEBSITE STRUCTURE - ADMIN

WEBSITE STRUCTURE - USER  The User area of the Website consists of 2 sections:  About Us – A brief section about each member.  Tutorials – A section dedicated towards security write ups and videos.

WEBSITE STRUCTURE - USER

WEBSITE STRUCTURE - NAVIGATION  The website implements uniform navigation.  A standard portal for easy roaming.  One location, serving one purpose.  Complete user control.

WEBSITE STRUCTURE - SECURITY  Active User Sessions  MD5 Encryption  Java Script Filtration  No $_GET Requests

TUTORIALS  Basic:  Data Encryption  Malware  Securing Windows  SSL and TLS Image [3]

TUTORIALS  Intermediate:  Cross Site Scripting (XSS)  Local/Remote File Inclusions  Network Encryption  Password Cracking  SSL Strip  SQL Injection Image [4]

TUTORIALS  Advanced:  Buffer Overflows  Wireless Security Image [5]

CHALLENGES & SUCCESSES  Getting video demonstrations to react in an expected manner  Trying not to make mistakes while recording video tutorials  With practice it became more natural  Documentation Format and Flow  Intellectual Property  Group meetings and Long Discussions regarding the distribution of IP  Time constraints  Not being able to demonstrate all topics of interest

LESSONS LEARNED  Planning is key.  Heavy research is required for large projects.  Encryptions algorithms are complicated.  Modern Linux versions have improved security.  Project in itself felt like it was another IT security course.  Most importantly:  Choose a project that you are passionate about, this way it is enjoyable and you will produce your best work.

Thank You Questions are Welcome

REFERENCES  Image [1] - Wikipedia: "File:Theprocessionofthetrojanhorseintroybygiovannidomenicotiepolo.jpg - Wikipedia, the free encyclopedia." Wikipedia, the free encyclopedia. N.p., n.d. Web. [Accessed 13 Apr ]  Image [2] - Seccuris. "Seccuris Inc. - Assured Protection." Seccuris Inc. - Assured Protection. N.p., n.d. Web. [Accessed 13 Apr. 2011].  Image [3-5] – Microsoft PowerPoint Provided Images