i-SECURIT

The Benchmark i-SECURIT is a network and data security training system that has been jointly developed by Benchmark Electronic Systems and AU-KBC Research Centre, Anna University, to educate and train users on different real world network security threats and data encryption methods.

    Features

  • Single Trainer solution for practicing several different Network Security & Cryptography topics
  • Comprehensive set of exercises for different security threats and attacks
  • System threats - Identification & hacking, backdoors, virus, worms & trojans
  • Web Vulnerabilities
  • Cryptography
  • Intrusion threats - Sniffing, Spoofing, SQL injection
  • Central Control Unit (CCU) to control and emulate real life network under study
  • Remote login, packet handling, routing, etc.
  • Variable network size - up to 7 nodes in each network (Trusted and Black) can be controlled
  • Comprehensive learning material written by experts and presented by pedagogy experts
  • Instruction Manuals
  • Technical manual emphasizing practical aspects of network and information security. Can be used as reference and for self study
  • Experiment manual - Step-by-step instructions covering all levels of experiments

Description

The Benchmark i-SECURIT is a complete system with two interconnected real life networks - the ''Trusted Network'' and the ''Black Network''. These networks are isolated from the real world i.e. any corporate or campus LAN and the Internet. The i-SECURIT Central Control Unit (CCU) runs the network services, administration and control methods. The Black Network users attempt to compromise the services by different attacks, such as Intrusions, Password Cracking, and Denial of Service. The trusted network users simultaneously work on, and are trained to deploy, suitable counter measures to keep network services running properly. The Benchmark i-SECURIT covers a large gamut of network security threats and its users can obtain hands-on experience with a wide variety of network security issues and cryptography methods. The course design allows the learner to read about a concept, witness a demonstration and then actually practice its execution. This meets the study flow of beginners as well as industry professionals.Through a single Benchmark i-SECURIT, you can connect up to 15 PCs, with one slot reserved for the network administrator, and can start working with as little as two to three PCs.

Experiments

Network Security Fundamentals - An Introduction
  • Networking basics - Setting up and invoking network elements
  • Ethics and Legality - Policies & practices that need to be followed in security practices including exploits, reporting methods, necessity of ethical hacking, social engineering practices, etc.

    Network / System threats
  • Network / System threats
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • Sniffing - Packet / Mail sniffing
  • Spoofing - IP, MAC

    Web Vulnerabilities
  • Web based password capturing, SQL injection (injection discovery, form validations), buffer overflow demo
  • Honeypots - Active, anti-intrusion technique

    Malware
  • Trojans & Backdoors
  • Virus & AV methods

    Network Identification
  • Enumeration - TCP ping, Ping sweep, ICMP ping, NULL Scan, Fast Scan, UDP port scan, Syn Stealth, Fin Stealth
  • OS detection

    Cryptography
  • Symmetric encryption scheme, Stream Cipher - RC4
  • Symmetric encryption scheme, Block Cipher - S-DES, 3-DES
  • Asymmetric encryption scheme, Block Cipher - RSA Hashing scheme - MD5
  • Block Cipher modes - ECB, CBC, CFB, OFBalth

    Web services using crypto techniques
  • PKI
  • Authentication schemes - Different authentication schemes including password based authentication, IP Based Authentication and Challenge Handshake Authentication Protocol (CHAP)
  • Steganography

    Product Specifications
  • Central Control Unit (CCU)
  • Network ports: 100Base-T ports - 2nos
  • One each to connect to switches of Trusted and Black networks
  • RJ45 interface, auto negotiating
  • Remote login to configure the CCU
  • Up to 15 user logins
  • Power input: 220V AC, 50Hz

    System Requirements

    Minimum Setup:
  • No of PC's required - 3 nos
  • Windows - 2 machines
  • Linux with FTP server - 1 machine

    Full Setup:
  • No of PC's required - 14 nos
  • Windows - 7 machines
  • Linux with FTP server - 1 machine
  • Windows / Linux - 6 nos

    System Configuration:
  • Windows 2000 with SP4 or Windows XP with SP2
  • Linux:
  • Redhat Linux ver 7.3 or ver 9.0

    Required Dependencies:
  • Java Runtime Environment ver 1.5 (or above), WinPCap (for Windows)
  • Ethereal Packet Sniffer (for Windows)
  • Internet Explorer 6.0 or above / Netscape Navigator 7 or above / Firefox 1.0 or above
  • Macromedia Flash Player 6.0 or above
  • Additional pictures

    LAN-T -Trainer

    LAN-T Trainer

    Instruments Techno Test inc.

    Instruments Techno Test inc.
    2345, Michelin street, #100
    Laval, Qc
    H7L 5B9

    Téléphone : (450) 681-5777
    Télécopieur : (450) 681-3773

    Printed from: catalogue.techno-test.com/products/6-Educational_Products/43-Telecommunications/305-i_SECURIT-i_SECURIT.html
    Copyright © 2017 | Instruments Techno Test inc. | Reproduction interdite