Abstract This lab will require the student team to build or modify a virtual lab envrionment that would include a Linux, Windows Server 2003, Windows XPService with no service pack and Windows XP with Service Pack3. The student team will…
Category: Purdue
Hey it’s where Sam used to work.
Tech 581W Computer Network Operations, Laboratory 1: Team 3
Abstract
The purpose of this exercise was to create an experimental environment by which penetration testing could be conducted in a controlled way. Four virtual machines, three Microsoft variants and one Linux distribution, were selected and linked together via a virtual subnet in the VMware Workstation software suite. Various sources of penetration tools were found, evaluated, and a subset of these tools were selected for future use. The tool selection was categorized by a nine layer Open Systems Connection (OSI) Model, with a model layer chosen to classify each tool. Additionally, the tools were then assigned to a specific coordinate of the standard McCumber three-space information security model. This ‘laboratory’ setup will be the basis of future penetration testing experiments.
Tech 581W Computer Network Operations, Laboratory 1: Team 2
Abstract Teaching information security defense can be a hot topic. Talking about penetration testing is different than actually showing different attack methods and how they operate as well as protecting themselves. There are risks in teaching intrusion detection, and building…
Tech 581W Computer Network Operations, Laboratory 1: Team 1
ABSTRACT With an ever increasing number of threats to network environments, it has become important for information technology students to be informed and aware of how hacker attacks, viruses, Trojans, and exploits will affect their systems. A virtual test lab…
TECH 581 W Computer Network Operations Laboratory 1
A jailbroken iPhone can be a very powerful weapon in the hands of an attacker: Smart phones can become an attacker’s most camoflashed weapon
Guest blogger Alejandro Chavez looks at the different ways a common popular cell phone can easily be modified to become a hidden method of attacking networks. Mr. Chavez is a student at Purdue University Calumet and we thank him for…
Cyber Warfare: Cyber Warfare and Cyber Terrorism, a growing threat?
Guest blogger Anthony Marszalek discusses in depth some of the concerns with cyber warfare and the ideas on how it exists (if it exists). He also discusses cyber terrorism and tries to make a distinction between the two. Mr. Marszalek…
Is Cyber Terrorism Fact or Fiction?
Guest blogger Aron Okichich Brings up a hot topic to information technology and conflict awareness. As a student at Purdue University Calumet we thank him for allowing us to post his work here. You can download a PDF of his…