slide1
Download
Skip this Video
Download Presentation
Potential Collaboration between ITU and Academia on Cyber Security

Loading in 2 Seconds...

play fullscreen
1 / 25

Potential Collaboration between ITU and Academia on Cyber Security - PowerPoint PPT Presentation


  • 88 Views
  • Uploaded on

Imad H. Elhajj American University of Beirut Electrical and Computer Engineering [email protected] ITU Academia Seminar September 28, 2011. Potential Collaboration between ITU and Academia on Cyber Security. Macro. Macro. Micro. Nano. Nano. Play. Office. AUB (Founded in 1866).

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Potential Collaboration between ITU and Academia on Cyber Security' - jela


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1
Imad H. Elhajj

American University of Beirut

Electrical and Computer Engineering

[email protected]

ITU Academia Seminar

September 28, 2011

Potential Collaboration between ITU and Academia on Cyber Security

slide7
Play

Office

electrical and computer engineering
Electrical and Computer Engineering

AUB

  • 7,500 students
  • 73-acre Campus

ECE

  • 620 Undergraduate students
  • 50 Graduate students
  • 26 Full-time faculty members
  • Opportunities for graduate students and collaboration
areas of research
Areas of Research

Synchronization

Multimedia

VoIP

Networking

Security

Security

Intrusion & Spoofing Detection

Localization

Synchronization

Clustering

Robot Integration

Sensor Networks

Control & Instrumentation

Hardware

Medical & Environmental Devices

Algorithms

security group at aub
Security Group At AUB
  • Dr. Ayman Kayssi
  • Dr. Ali Chehab
  • Dr. Imad Elhajj
  • 3 PhD Students
  • 8 MS Students
graduate courses offered
Graduate Courses Offered
  • Cryptography and Computer Security
  • Internet Security
  • Wireless Security
  • Information Security Management
  • Network and Computer Security Laboratory
laboratory description
Laboratory Description

This laboratory addresses advanced network and computer security topics. Experiments include the execution of attacks, the setup of intrusion detection and prevention, securing computers and wired and wireless networks, and digital forensics.

topics covered
Topics Covered
  • Section 1 — Networking Basics - How do networks work?
    • Lab 1: Security Lab Setup and Networking Basics
  • Section 2 — Vulnerabilities and Threats - How can networks be compromised?
    • Lab 2: Scanning and Enumerating the Network for Targets and Address Spoofing
    • Lab 3: Denial of Service Attacks and Network Applications Exploits
    • Lab 4: Malware Analysis and Botnets
    • Lab 5: Escalating Privilege – Sniffing, Keylogging, Password Cracking and Man in the Middle Attacks
    • Lab 6: Security in Wireless Systems
  • Section 3 — Prevention - How do we prevent harm to the networks?
    • Lab 7: Firewalls
    • Lab 8: Hardening the Host Computer and Securing Network Communications
  • Section 4 — Detection and Response – How do we detect and respond to attacks?
    • Lab 9: Preparing for and Detecting Attacks
    • Lab 10: Identify and Mitigate Network Attacks
    • Lab 11: Digital Forensics
lab objectives
Lab Objectives

The objectives of this lab are to give students:

  • An applied understanding of the principles of network and computer security.
  • A hands-on experience in attack execution, and the use of tools in such attacks.
  • A hands-on experience in the use of intrusion detection and prevention systems and techniques.
  • The practical knowledge required to secure computers and networks including the setup of policies and security assessment.
  • The practical knowledge to conduct digital forensics and attack tracing
cabinets
Cabinets

Juniper IPS

potential uses
Potential Uses
  • Customized training for industry
  • Testing and benchmarking of equipment
  • Vendor demonstrations
  • Lab could potentially be virtualized to duplicate at low cost
itu resolutions relevant to aub collaboration
ITU Resolutions Relevant to AUB Collaboration
  • ITU Plenipotentiary Resolution 130: Strengthening the role of ITU in building confidence and security in the use of information and communication technologies (Guadalajara, 2010)
  • ITU WTDC Resolution 45: Mechanisms for enhancing cooperation on cybersecurity, including combating spam (Hyderabad, 2010)
  • ITU WTDC Resolution 69: Creation of national computer incident response teams, particularly for developing countries, and cooperation between them (Hyderabad, 2010)
  • ITU WTSA Resolution 58: Encourage the creation of national computer incident response teams, particularly for developing countries (Johannesburg, 2008)
  • UN Resolutions 57/239 (2002) and 58/199 (2004): Creation of a global culture of cybersecurity and the protection of critical information infrastructures
potential collaboration between itu and aub
Potential Collaboration between ITU and AUB
  • Test lab for ITU-T standards conformance
  • Contributions to standards (ITU-T SG17). Several of the questions for Study Group 17 are areas of research at AUB
  • Organizing events (workshops, seminars)
  • Capacity building and Awareness
  • Help establish CERT (AUB Member of the PAN Arab Cyber Security Observatory)
ad