Applied Cybersecurity
Objectives
The objective of the AppSec course is to leverage technical security tools that enable students to detect, analyze, and respond against cyberattacks to protect themselves and alleviate different cyber threats in real scenarios.
General characterization
Code
100254
Credits
4.0
Responsible teacher
Yasser Mohamed Megahed Youssef Alhelaly
Hours
Weekly - Available soon
Total - Available soon
Teaching language
Portuguese. If there are Erasmus students, classes will be taught in English
Prerequisites
TBC.
Bibliography
Teaching method
The curricular unit includes a theoretical briefing for application security and emphasizes the practical application of cyber defense techniques such as threats identification, vulnerability assessment, risk analysis, and defense countermeasures
Evaluation method
Students will work in groups. Each group will be divided into attack and defense teams. Each group will be given cybersecurity challenges corresponding to the learning unit. The group members will be asked to simulate the cyber-attack and propose their defense mechanism. Each group will present their case and show how they use the learned skills and knowledge and deploy the cybersecurity tool to mitigate and defend against the cyber-attack. The presentation will include concepts, methodology, attacks, defense, and learning lessons.
The evaluation will be based on the following:
Use Case (AppSec Challenge) |
Requirements/Activities |
Weigh |
UC1: Sniffing using Wireshark |
Attackers will simulate network attack; Detect the attack using Wireshark; Defender will secure the detected vulnerabilities. |
10% |
UC2: Password Management |
Attackers will sniff the traffic; capture weak passwords, and use brute force attacks to recover the password; Defenders will apply a strong password policy to mitigate the attack. |
10% |
UC3: Symmetric Encryption |
Attackers will sniff the plain text over the network; Capture plain text; Defenders will encrypt the text using the AES tool (open source); Sniff the network again showing how encryption secures the transferred data. Bonus: students will be awarded if they manage to provide a code showing how AES works from an application perspective. |
10% |
UC4: Asymmetric Encryption |
Attackers will sniff the network; Show how data can be easily captured without encryption. Defenders will use the PGP tool to create public and private keys; Exchange public keys; Encrypt the plain text. Defenders will sniff the network again showing how encryption secures the transferred data. Bonus: Students will be asked to show how PKI and signature work and demonstrate a full scenario using the mail application. |
10% |
UC5: Database Security |
The team will create a simple database; Attackers will simulate an SQL injection attack; Defenders will write an SQL script to protect against SQL injection attacks. Bonus: Using 3rd party tool (open-source) will be awarded. |
10% |
UC6: Social Engineering |
Attackers will create a spear phishing attack engineered to target victims through email; Steal victims’ credentials; Defenders will show how they could alleviate such attacks. Bonus: Adding a trojan horse or key logger is a Bonus; |
10% |
UC7: Safe web |
Attackers will show how cookies work to collect users' information and invade their privacy, Also they will show how hackers could collect personally identifiable information and steal an online identity to commit illicit activities. The defender will use VPN, ToR, and secure web browsers to defend against these attacks. |
5% |
Final Project |
All groups will be required to deliver a comprehensive report and present a final presentation summarizing what they have practiced during the course and suggesting the emerging trends, future directions, and the state of the art in the AppSec domain. |
15% |
Final Exam |
Theoretical Exam on the concepts acquired during the course |
20% |
Practical workload: Use Cases, presentations, final Project (80%)
Theoretical AppSec concepts: Final Exam (20%)
Notes:
- All deliverables including presentations and reports must be submitted within the stated deliverable dates.
- Penalties (1 point/day) will be applied per day of delay.
- Students will only obtain approval if they score a minimum value of 9.5 on the final exam, regardless of the classification attained on a) and b).
- Special examination period (only for students who can apply for this evaluation period, previously accepted by the academic services.
- This course is emphasizing the practical side of application cybersecurity. So, attendance is a must.
- All students must present their cybersecurity case studies using a physical environment depicting the attackers' team and defenders' team using a real network environment.
- Virtual machines, windows OS, Linux OS, and all open-source security tools are accepted in the presentation as long as they serve the objective of the case study.
a) Practical AppSec: Use cases + presentations + Final report (80%)
b) Theoretical AppSec Concepts: Final Exam (20%)
Subject matter
The AppSec is designed in correspondence with the cybersecurity course and organized in 7 Learning Units (LUs) as shown in the below table.
Learning Unit |
Applied Security (AppSec) |
Correspondence LU in Cybersecurity Course |
LU1 |
Sniffing using Wireshark |
Network Security |
LU2 |
Password Management |
End-User Security |
LU3 |
Symmetric Encryption |
Information Security |
LU4 |
Asymmetric Encryption |
|
LU5 |
Database Security |
Application Security |
LU6 |
Social Engineering Attacks |
Threats and Vulnerabilities |
LU7 |
Safe Web; Privacy; Anonymity |
Web Security |
The practical foundation of the course is constructed over NEISA Cybersecurity Framework and NIST cybersecurity framework. The AppSec is a new curricular unit with a more technological focus, in which students can apply theoretical cybersecurity concepts in the real world by applying technological solutions to defend and respond appropriately to cyber-attacks. The instructor will demonstrate practical security use cases using ethical hacking and analysis tools to teach students how to use technical skills and cybersecurity protection tools to learn forensics and cyber defense techniques in real-world scenarios.