Imad H. Elhajj
This presentation is the property of its rightful owner.
Sponsored Links
1 / 25

Potential Collaboration between ITU and Academia on Cyber Security PowerPoint PPT Presentation


  • 48 Views
  • Uploaded on
  • Presentation posted in: General

Imad H. Elhajj American University of Beirut Electrical and Computer Engineering [email protected] ITU Academia Seminar September 28, 2011. Potential Collaboration between ITU and Academia on Cyber Security. Macro. Macro. Micro. Nano. Nano. Play. Office. AUB (Founded in 1866).

Download Presentation

Potential Collaboration between ITU and Academia on Cyber Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Potential collaboration between itu and academia on cyber security

Imad H. Elhajj

American University of Beirut

Electrical and Computer Engineering

[email protected]

ITU Academia Seminar

September 28, 2011

Potential Collaboration between ITU and Academia on Cyber Security


Macro

Macro


Macro1

Macro


Micro

Micro


Potential collaboration between itu and academia on cyber security

Nano


Potential collaboration between itu and academia on cyber security

Nano


Potential collaboration between itu and academia on cyber security

Play

Office


Aub founded in 1866

AUB (Founded in 1866)


Electrical and computer engineering

Electrical and Computer Engineering

AUB

  • 7,500 students

  • 73-acre Campus

    ECE

  • 620 Undergraduate students

  • 50 Graduate students

  • 26 Full-time faculty members

  • Opportunities for graduate students and collaboration


Areas of research

Areas of Research

Synchronization

Multimedia

VoIP

Networking

Security

Security

Intrusion & Spoofing Detection

Localization

Synchronization

Clustering

Robot Integration

Sensor Networks

Control & Instrumentation

Hardware

Medical & Environmental Devices

Algorithms


Security group at aub

Security Group At AUB

  • Dr. Ayman Kayssi

  • Dr. Ali Chehab

  • Dr. Imad Elhajj

  • 3 PhD Students

  • 8 MS Students


Graduate courses offered

Graduate Courses Offered

  • Cryptography and Computer Security

  • Internet Security

  • Wireless Security

  • Information Security Management

  • Network and Computer Security Laboratory


Laboratory description

Laboratory Description

This laboratory addresses advanced network and computer security topics. Experiments include the execution of attacks, the setup of intrusion detection and prevention, securing computers and wired and wireless networks, and digital forensics.


Topics covered

Topics Covered

  • Section 1 — Networking Basics - How do networks work?

    • Lab 1: Security Lab Setup and Networking Basics

  • Section 2 — Vulnerabilities and Threats - How can networks be compromised?

    • Lab 2: Scanning and Enumerating the Network for Targets and Address Spoofing

    • Lab 3: Denial of Service Attacks and Network Applications Exploits

    • Lab 4: Malware Analysis and Botnets

    • Lab 5: Escalating Privilege – Sniffing, Keylogging, Password Cracking and Man in the Middle Attacks

    • Lab 6: Security in Wireless Systems

  • Section 3 — Prevention - How do we prevent harm to the networks?

    • Lab 7: Firewalls

    • Lab 8: Hardening the Host Computer and Securing Network Communications

  • Section 4 — Detection and Response – How do we detect and respond to attacks?

    • Lab 9: Preparing for and Detecting Attacks

    • Lab 10: Identify and Mitigate Network Attacks

    • Lab 11: Digital Forensics


Lab objectives

Lab Objectives

The objectives of this lab are to give students:

  • An applied understanding of the principles of network and computer security.

  • A hands-on experience in attack execution, and the use of tools in such attacks.

  • A hands-on experience in the use of intrusion detection and prevention systems and techniques.

  • The practical knowledge required to secure computers and networks including the setup of policies and security assessment.

  • The practical knowledge to conduct digital forensics and attack tracing


Lab overall diagram

Lab Overall Diagram


Lab group diagram

Lab Group Diagram


Cabinets

Cabinets

Juniper IPS


Photos

Photos


Photos1

Photos


Potential uses

Potential Uses

  • Customized training for industry

  • Testing and benchmarking of equipment

  • Vendor demonstrations

  • Lab could potentially be virtualized to duplicate at low cost


Itu resolutions relevant to aub collaboration

ITU Resolutions Relevant to AUB Collaboration

  • ITU Plenipotentiary Resolution 130: Strengthening the role of ITU in building confidence and security in the use of information and communication technologies (Guadalajara, 2010)

  • ITU WTDC Resolution 45: Mechanisms for enhancing cooperation on cybersecurity, including combating spam (Hyderabad, 2010)

  • ITU WTDC Resolution 69: Creation of national computer incident response teams, particularly for developing countries, and cooperation between them (Hyderabad, 2010)

  • ITU WTSA Resolution 58: Encourage the creation of national computer incident response teams, particularly for developing countries (Johannesburg, 2008)

  • UN Resolutions 57/239 (2002) and 58/199 (2004): Creation of a global culture of cybersecurity and the protection of critical information infrastructures


Research relevance to itu t sg17 questions

Research Relevance to ITU-T SG17 Questions


Potential collaboration between itu and aub

Potential Collaboration between ITU and AUB

  • Test lab for ITU-T standards conformance

  • Contributions to standards (ITU-T SG17). Several of the questions for Study Group 17 are areas of research at AUB

  • Organizing events (workshops, seminars)

  • Capacity building and Awareness

  • Help establish CERT (AUB Member of the PAN Arab Cyber Security Observatory)


Thank you

Thank you

[email protected]


  • Login