Cyber-security Research and Education System version 3 (CRESv3) (C4)
Project Homepage: Project Homepage
Developing the skills required to ensure best practice in the Information Technology world starts here. Cyber-criminals, hackers, corporate espionage, and disgruntled employees are everyday annoyances IT professionals will find themselves devoting large amounts of time to, while simultaneously maintaining their respective networks’ functionality for legitimate users. In March 2012, the US Department of Defense (DoD) website reported that the DoD “requested $3.4 billion for Cyber Command”, a centralized command for monitoring and defending Cyber-Infrastructures, “in fiscal 2013” which was one of the few areas of growth in the DoD budget. Hackmageddon.com has reported over 40 attacks on major entities such as Toyota, Siemens, and the University of Cambridge from August 15, 2012 to August 31, 2012 alone. It is worth noting that these are only reported attacks. One can only estimate how many successful cyber-attacks have been identified, and fear how many have yet to be discovered. The CRESv3 framework is designed to educate prospective Computer Science graduates on how to spot and properly defend against many common attacks that plague IT infrastructures around the world. CRESv3 introduces a different perspective on cyber-security from any class room experience by offering students a hands-on experience where they can put into practice principles learned in CS340. Students must familiarize themselves with different software, operating systems, and network security practices in an effort to maximize their chances to successfully repel malicious use of the networks in a year end, two hour cyber-security event known as “Hack Fest”. Past iterations of the Hack Fest have been very successful in defining, implementing, and achieving functional goals of the CRES framework, while this year’s CRESv3 team hopes to build on the success of the earlier generations by addressing key issues with past CRES frameworks by adding more critical functionality to the system.