View
214
Download
0
Category
Tags:
Preview:
Citation preview
ABSTRACTWhen it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite the popularity of computers and networking, network security is still an obscure subject. The goal of this project is to develop an interactive computer game that shall introduce people to the theory and fundamentals of computer security. CYBER Sim shall be modeled after the Electronic Arts(TM) Sim® games and shall allow the player to purchase equipment and attempt to protect a network. The game shall simulate attacks on the network and the player shall be evaluated on how well he/she has designed the protection system. It is our desire to create a game that will be entertaining yet will educate the user on the importance and the fundamentals of computer security.
Team Members
Ryan Applegate (CprE)Saddam Khattak (CprE)Dan Nguyen (CprE)Adam Straw (CprE)
Faculty AdvisorDoug Jacobson
ClientInformation Assurance Department
PROJECT REQUIREMENTS
Design objectives• Easy to install and play• Easy learning curve• Playing time of up to 2-3 hours (per sitting)• High educational value• High “fun factor”
Functional Requirements• Graphical engine• Accurate simulation of networks and network attacks• In-game help and definitions of network terminology
Design Constraints• Cost-effective design• Flexible for future expansion
MILESTONES AND SCHEDULE1. Problem Identification March 15 12%2. Research March 25 10%3. Decision on programming language March 25 8%4. Implementation of CVS March 25 5%5. Framework/Structure Aug 2003 15%6. Creation of simulation Sept 2003 14%7. Graphical user interface and engine Oct 2003 14%8. Beta testing Nov 2003 12%9. Project Distribution Dec 2003 10%
Total 100%
RESOURCES AND SCHEDULEEstimated Resources
CLOSING SUMMARYIt takes more than armed guards and complicated locks to defend against cyber-
thieves. Defending a network requires a strong grasp of the latest technological safeguards as well as competent managing of resources. As the world becomes more dependent on the Internet to transmit information, the expertise needed to defend against hackers must increase in response.
This is the underlying motive behind CYBER Sim. Network security is still an obscure concept for laymen in general. Our goal is to make the basic concepts of network security accessible to attract new engineering students to and increase the general knowledge of this essential field.
INTRODUCTION
Problem Statement• Students interested in computer engineering are generally unaware of or unable to
understand the field of network security
Problem Approach• Design and produce an engaging computer game that will teach the user how to
build a secure network and protect it from simulated attacks
Operating Environment• Software will be installed on Microsoft Windows computers with basic 3D graphics
cards that can support basic OpenGL graphics.
Intended Users • High school students • New engineering students
Intended Uses• Distribution to interested students• Educational program in the classroom• Entertainment for leisure time
Assumptions• Users will possess basic knowledge of and experience with computers• Users will have a CD-ROM drive
Limitations• Lack of skill in creating professional art and music for the game• Limited knowledge in graphical programming
EXPECTED END PRODUCT AND OTHER DELIVERABLES
• A Windows-based computer game that will allow the user to build a secure computer network and protect it from simulated attacks. The game will be distributed on a CD-ROM.
PROPOSED APPROACH AND CONSIDERATIONS
Proposed Approach• Research will be conducted to better understand network architecture and the kinds
of attacks it is vulnerable to.• Program will be developed piece by piece, starting off with the foundation, then the
simulation, and then the graphical interface.
Technologies considered• Macromedia Director• OpenGL• Alias WaveFront’s Maya• 3DMAX• Java3D
Testing considerations• Small group testing• Game community beta-distribution• Simulation is accurate
Personal Effort
Adam Straw, 110
Ryan Applegate, 109Saddam Khattak, 111
Dan Nguyen, 111
Other Resources
Development Material, 40
Development Software, $200
Tools of History’s Great Robberies
Revolver
Date: Late 19th Century
Who: Jesse James
Robbed: Banks and trains
How much: est. $150,000
Naval Cannon
Date: 1623
Who: Vice Admiral Piet Heyn
Robbed: The Spanish silver fleet
How much: 10 million guilders
Tommy Gun
Date: 1930s
Who: Machine Gun Kelly
Robbed: Banks
How much: est. $300,000
Laptop
Date: 1994
Who: Vladimir Levin
Robbed: Citibank
How much: $12 million
Recommended