SlideShare a Scribd company logo
3
Most read
4
Most read
7
Most read
SECURE LAB SETUP
FOR CYBER SECURITY
Prepared By :
Birju Tank
GTU PG School, BISAG
GANDHINAGAR.
Main Messages
 Developing a good cyber security laboratory and related
exercise takes:
 Planning
 Thought
 Resources
 Helps to think about goals and structure
Goals
 Mixed use laboratory
 Not enough space to dedicate to
security
 Need to be able to connect/disconnect
from campus network quickly
 Support both Windows and Linux
 IUP only supported Linux, real-world
environment is heterogeneous
 Be able to emulate a real-world enterprise
computing environment
Laboratory
One Way to Lower the Cost
 Purchase one many-port switch to act as physical
switch, all hubs
 Can isolate groups of ports
 Can bridge groups where needed
 Advantages
 Significant cost savings
 Reduced maintenance need
 Disadvantage
 Initial setup difficult
Cont’d
 Use of Virtual Machines within Physical Machines
 Products
 Microsoft Virtual PC (used 2005)
 Support discontinued for Mac environment in
8/2006
 VMWare (used 2006)
 Another possibility: Xen
 Operating systems must be modified
 Higher performance gained
Laboratory – Physical Issues
 Want to provide some sense of physical security for
each station
 Lab furniture is currently 8 cubicles with high walls
 Problem: not good for general usage, students tend to
“hide” in lab and take over stations
 Future: a more open physical environment?
INFRASTRUCTURE
 Goals
 Heterogeneous and Isolated Network
 Same system for each student team
 Replicating tool (e.g. Norton Ghost) saves much
time
 Don’t forget to give each machine its own identity
Cont’d
 Structure of Isolated Network
 One zone (all systems off one hub)
 Student Team Systems running older Windows
Server, Linux systems
 Non-current OSs with known security holes
 All tools used in lab exercises
 Added several realistic-looking accounts (e.g.
backup, logwd, tomcat) with weak passwords
Cont’d
 Structure of Isolated Network (continued)
 Several Non-Student Systems
 Other variants of Windows and Linux
 1 Monitoring system
 Additional Available Systems
 Host systems can be used for internet access

More Related Content

PPT
Cryptography and Network Security William Stallings Lawrie Brown
PDF
Addressing the cyber kill chain
DOCX
Distributed system Tanenbaum chapter 1,2,3,4 notes
PPTX
Vulnerability and Assessment Penetration Testing
PPTX
Penetration testing reporting and methodology
DOC
Naming in Distributed System
PDF
Penetration testing
PPTX
Windows Hacking
Cryptography and Network Security William Stallings Lawrie Brown
Addressing the cyber kill chain
Distributed system Tanenbaum chapter 1,2,3,4 notes
Vulnerability and Assessment Penetration Testing
Penetration testing reporting and methodology
Naming in Distributed System
Penetration testing
Windows Hacking

What's hot (20)

PPT
Consistency protocols
PPTX
cloud computing: Vm migration
PPT
3. distributed file system requirements
PDF
Cyber Domain Security
PDF
Application layer security protocol
PPTX
Linux process management
PPTX
Software Process Models
PDF
Patch and Vulnerability Management
PDF
Security in the Software Development Life Cycle (SDLC)
PDF
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
PDF
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
PPT
Distributed Operating System
PPTX
Protection and security
PPTX
Pen Testing Explained
PDF
Pentest with Metasploit
PDF
Security architecture
PDF
Fault tolerance
PDF
Mikrotik Network Simulator (MUM Presentation Material 2013)
PPTX
Software configuration management
Consistency protocols
cloud computing: Vm migration
3. distributed file system requirements
Cyber Domain Security
Application layer security protocol
Linux process management
Software Process Models
Patch and Vulnerability Management
Security in the Software Development Life Cycle (SDLC)
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Distributed Operating System
Protection and security
Pen Testing Explained
Pentest with Metasploit
Security architecture
Fault tolerance
Mikrotik Network Simulator (MUM Presentation Material 2013)
Software configuration management
Ad

Viewers also liked (20)

DOCX
Forensic laboratory setup requirements
PPT
Computer Forensic
PPT
Forensic laboratory setup requirements
PPT
Forensic Lab Development
PPT
Computer forensics
PPTX
Digital forensics
PPT
Computer +forensics
PPTX
Computer forensics powerpoint presentation
PPTX
Computer forensics ppt
PDF
Cyber Ranges: The (R)evolution in Cybersecurity Training
PDF
File000149
PDF
File000158
PPTX
Building a Cyber Range - Kevin Cardwell
PPTX
The Forensic Lab
PDF
File000120
PPT
Setup Your Personal Malware Lab
PPTX
Introduction to Forensic science labs in India
PPTX
Proposal of lab
PPT
Digital Forensic
PDF
How to Setup A Pen test Lab and How to Play CTF
Forensic laboratory setup requirements
Computer Forensic
Forensic laboratory setup requirements
Forensic Lab Development
Computer forensics
Digital forensics
Computer +forensics
Computer forensics powerpoint presentation
Computer forensics ppt
Cyber Ranges: The (R)evolution in Cybersecurity Training
File000149
File000158
Building a Cyber Range - Kevin Cardwell
The Forensic Lab
File000120
Setup Your Personal Malware Lab
Introduction to Forensic science labs in India
Proposal of lab
Digital Forensic
How to Setup A Pen test Lab and How to Play CTF
Ad

Similar to Secure lab setup for cyber security (20)

PPTX
Sec285 final presentation_joshua_brown
DOCX
ProjectPurposeThe purpose of this project is to provide an o.docx
PPT
wireless lan security.ppt
PPS
Developing an Effective
DOC
7th sem
DOC
7th sem
PPT
wireless lan security for their all details
PDF
CNIT 121: 3 Pre-Incident Preparation
PDF
Don't Get Hacked on Hostile WiFi
PDF
Application Of An Operating System Security
PDF
Netw450 advanced network security with lab entire class
PDF
Netw450 advanced network security with lab entire class
PDF
Netw450 advanced network security with lab entire class
PDF
Netw450 advanced network security with lab entire class
PDF
A University Network Design Exercise
PPTX
DOCX
An organized and Secured Local Area Network in Naval Post Graduate School
DOCX
IS_Syllabus_4_credits_2018.docx
PPTX
Lecture1.pptx
PPTX
LabMan 2012 Presentation - Remote Lab
Sec285 final presentation_joshua_brown
ProjectPurposeThe purpose of this project is to provide an o.docx
wireless lan security.ppt
Developing an Effective
7th sem
7th sem
wireless lan security for their all details
CNIT 121: 3 Pre-Incident Preparation
Don't Get Hacked on Hostile WiFi
Application Of An Operating System Security
Netw450 advanced network security with lab entire class
Netw450 advanced network security with lab entire class
Netw450 advanced network security with lab entire class
Netw450 advanced network security with lab entire class
A University Network Design Exercise
An organized and Secured Local Area Network in Naval Post Graduate School
IS_Syllabus_4_credits_2018.docx
Lecture1.pptx
LabMan 2012 Presentation - Remote Lab

More from Birju Tank (14)

PPTX
Database security
PPTX
Vulnerabilities in Android
PPTX
Blackhole Attck detection in AODV Protocol
PPTX
5 g technology
DOCX
Literature review report
PPTX
Secure routing in DSR
PPTX
J2ME Mobile app
PPTX
Android vs iOS encryption systems
PPTX
Software prototyping
PPTX
Data mining
PPTX
Android operating system
PPT
Virtualization
PPTX
Mobile Broadband Wireless Access
PPTX
Process management
Database security
Vulnerabilities in Android
Blackhole Attck detection in AODV Protocol
5 g technology
Literature review report
Secure routing in DSR
J2ME Mobile app
Android vs iOS encryption systems
Software prototyping
Data mining
Android operating system
Virtualization
Mobile Broadband Wireless Access
Process management

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
DOCX
573137875-Attendance-Management-System-original
PPT
Project quality management in manufacturing
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Well-logging-methods_new................
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Sustainable Sites - Green Building Construction
PPTX
Geodesy 1.pptx...............................................
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
UNIT 4 Total Quality Management .pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
573137875-Attendance-Management-System-original
Project quality management in manufacturing
R24 SURVEYING LAB MANUAL for civil enggi
Well-logging-methods_new................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Foundation to blockchain - A guide to Blockchain Tech
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CYBER-CRIMES AND SECURITY A guide to understanding
Sustainable Sites - Green Building Construction
Geodesy 1.pptx...............................................
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Embodied AI: Ushering in the Next Era of Intelligent Systems
bas. eng. economics group 4 presentation 1.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
UNIT 4 Total Quality Management .pptx

Secure lab setup for cyber security

  • 1. SECURE LAB SETUP FOR CYBER SECURITY Prepared By : Birju Tank GTU PG School, BISAG GANDHINAGAR.
  • 2. Main Messages  Developing a good cyber security laboratory and related exercise takes:  Planning  Thought  Resources  Helps to think about goals and structure
  • 3. Goals  Mixed use laboratory  Not enough space to dedicate to security  Need to be able to connect/disconnect from campus network quickly  Support both Windows and Linux  IUP only supported Linux, real-world environment is heterogeneous  Be able to emulate a real-world enterprise computing environment
  • 5. One Way to Lower the Cost  Purchase one many-port switch to act as physical switch, all hubs  Can isolate groups of ports  Can bridge groups where needed  Advantages  Significant cost savings  Reduced maintenance need  Disadvantage  Initial setup difficult
  • 6. Cont’d  Use of Virtual Machines within Physical Machines  Products  Microsoft Virtual PC (used 2005)  Support discontinued for Mac environment in 8/2006  VMWare (used 2006)  Another possibility: Xen  Operating systems must be modified  Higher performance gained
  • 7. Laboratory – Physical Issues  Want to provide some sense of physical security for each station  Lab furniture is currently 8 cubicles with high walls  Problem: not good for general usage, students tend to “hide” in lab and take over stations  Future: a more open physical environment?
  • 8. INFRASTRUCTURE  Goals  Heterogeneous and Isolated Network  Same system for each student team  Replicating tool (e.g. Norton Ghost) saves much time  Don’t forget to give each machine its own identity
  • 9. Cont’d  Structure of Isolated Network  One zone (all systems off one hub)  Student Team Systems running older Windows Server, Linux systems  Non-current OSs with known security holes  All tools used in lab exercises  Added several realistic-looking accounts (e.g. backup, logwd, tomcat) with weak passwords
  • 10. Cont’d  Structure of Isolated Network (continued)  Several Non-Student Systems  Other variants of Windows and Linux  1 Monitoring system  Additional Available Systems  Host systems can be used for internet access