michigan cyber range
DESCRIPTION
Michigan Cyber Range. Introduction. Introduction. Dr. Joe Adams Vice President of Research and Cyber Security 26 years Army Signal Corps Associate Professor at US Military Academy 3 time winner of the NSA’s Inter-Service Academy CDX Senior Member IEEE. Agenda. Who am I? - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/1.jpg)
Powered byPowered by Connecting Organizations, Building Community
Michigan Cyber Michigan Cyber RangeRange
Michigan Cyber Michigan Cyber RangeRange
![Page 2: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/2.jpg)
Powered by
IntroductionIntroduction
2
![Page 3: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/3.jpg)
Powered by
IntroductionIntroduction
Dr. Joe Adams Vice President of Research and
Cyber Security 26 years Army Signal Corps Associate Professor at US Military
Academy 3 time winner of the NSA’s Inter-
Service Academy CDX Senior Member IEEE
3
![Page 4: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/4.jpg)
Powered by
AgendaAgenda
Who am I? Where is the Threat? How am I at risk? How to prepare?
4
![Page 5: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/5.jpg)
Powered by
Attack SurfaceAttack Surface
5
![Page 6: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/6.jpg)
Powered by
Attack SurfaceAttack Surface
6
![Page 7: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/7.jpg)
Powered by
Attack SurfaceAttack Surface
7
![Page 8: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/8.jpg)
Powered by
Attack SurfaceAttack Surface
8
![Page 9: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/9.jpg)
Powered by
Attack SurfaceAttack Surface
9
![Page 10: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/10.jpg)
Powered by
Why is this so hard?Why is this so hard?
10
![Page 11: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/11.jpg)
Powered by
PlansPlans
11
![Page 12: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/12.jpg)
Powered by
The Price of Doing BusinessThe Price of Doing Business
12
![Page 13: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/13.jpg)
Powered by13
![Page 14: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/14.jpg)
Powered by
Security TheaterSecurity Theater
14
![Page 15: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/15.jpg)
Powered by
An Example of WhyAn Example of Why
15
![Page 16: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/16.jpg)
Powered by
What can we do?What can we do?
16
![Page 17: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/17.jpg)
Powered by
What has to be protected?What has to be protected?
17
![Page 18: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/18.jpg)
Powered by
What can we monitor?What can we monitor?
18
![Page 19: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/19.jpg)
Powered by
What is on its own?What is on its own?
19
![Page 20: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/20.jpg)
Powered by
Make a planMake a plan
20
![Page 21: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/21.jpg)
Powered by
PolicyPolicy
21
![Page 22: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/22.jpg)
Powered by
Education and AwarenessEducation and Awareness
22
![Page 23: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/23.jpg)
Powered by
The ResultThe Result
23
![Page 24: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/24.jpg)
Powered by
But then…But then…
24
![Page 25: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/25.jpg)
Powered by
Practice the planPractice the plan
25
![Page 26: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/26.jpg)
Powered by
CommunicationCommunication
26
![Page 27: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/27.jpg)
Powered by
Fight complacencyFight complacency
27
![Page 28: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/28.jpg)
Powered by
Internal AuditsInternal Audits
28
![Page 29: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/29.jpg)
Powered by
Build HabitsBuild Habits
29
![Page 30: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/30.jpg)
Powered by
It only takes onceIt only takes once
30
![Page 31: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/31.jpg)
Powered by
What we’ve talked aboutWhat we’ve talked about
31
![Page 32: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/32.jpg)
Powered by
What we’ve talked aboutWhat we’ve talked about
32
![Page 33: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/33.jpg)
Powered by
What we’ve talked aboutWhat we’ve talked about
33
![Page 34: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/34.jpg)
Powered by
What we’ve talked aboutWhat we’ve talked about
34
![Page 35: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/35.jpg)
Powered by
Skills training & maintenance
Classes Events Networking
Accessible
Persistent
Using the Cyber RangeUsing the Cyber Range
![Page 36: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/36.jpg)
Powered by
ClassesClasses
17 Certifications Pen Testing, Incident Handling, Ethical Hacking Forensics Leadership Disaster Recovery
Classes held: At Merit or at the customer’s location Online
Cost includes: Tuition Certification Exam
http://www.merit.edu/cyberrange/courses.php
![Page 37: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/37.jpg)
Powered by
Capture the FlagCapture the Flag
Self-Paced Threads of flags to find
Individual skills Penetration testing Forensics SCADA
Scoring engine Encourages competition
![Page 38: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/38.jpg)
Powered by
Force on ForceForce on Force
Paintball Multiple teams; everyone for themselves Penetrate system, plant a flag, secure the system
Red vs Blue Focus on system & service
security and continuity Force on Force
Incident Response Asynchronous Red team creates havoc Blue team diagnoses and
recovers
![Page 39: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/39.jpg)
Powered by
Welcome to AlphavilleWelcome to Alphaville
![Page 40: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/40.jpg)
Powered by
AlphavilleAlphaville
![Page 41: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/41.jpg)
Powered by
AlphavilleAlphaville
A persistent training environment A Network of Things More realistic than an IP range
Every exercise is a separate, customizable copy of the town and its infrastructure
Heterogeneous environment Wide variety of operating systems and services Residents of Alphaville provide “background noise” Bot nets, rootkits, and backdoors
![Page 42: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/42.jpg)
Powered by
Flexible terms & pricing Pay for what you use
Voucher/Credit system
Using the Cyber RangeUsing the Cyber Range
![Page 43: Michigan Cyber Range](https://reader036.vdocument.in/reader036/viewer/2022062719/5681301c550346895d959829/html5/thumbnails/43.jpg)
Powered by
Questions?Questions?
http://www.merit.edu/cyberrange/43