14th IEEE International Conference on Emerging Technologies

Nov 21-22, 2018, Organized by the Department of Computer Sciences, Quaid-i-Azam University, Islamabad, Pakistan.

Workshop

Professor Dr. Muhammad Yousaf

Dr. Muhammad Yousaf

Associate Professor, Faculty of Computing, Academic Advisor, Riphah Institute of Systems Engineering (RISE), Riphah International University, Islamabad, Pakistan. https://sites.google.com/site/muhyousaf/

Cyber Range: A Shooting Range for Cyber Warriors

Although cybersecurity products are getting more and more sophisticated, however, still cyber security incidents are on the rise. This is and will remain an ongoing war between cyber attackers and cyber defenders. The effectiveness of cybersecurity controls not only depends on the sophistication of these controls but also it largely depends on the awareness and skill set of the cybersecurity operations team. The industry expects that the cybersecurity graduates should be capable enough to handle the seasoned cyber warriors out there and if there is some discrepancy in the skill set due to lack of experience then the graduates will gradually learn that during the real operations of the enterprises. It is like sending a fresh graduate from the academy directly to the front line of the war zone without passing them through the appropriate practice. The cyber range provides a real like virtual environment where cybersecurity professionals can learn, practice and test their cybersecurity skill. This practice prepares them to better cope with the cybersecurity incidents. Many organizations have developed large-scale virtualized cyber ranges. Normally, a cyber range is a complex setup that requires considerable infrastructure and processes in place which makes cyber ranges an expensive product. There is a need to design and deploy scalable cyber ranges. Open source technologies can also help to reduce the cost of the cyber ranges. This talk will cover the design, setup, and services of the cyber range and will also cover the available open source technologies that can be used to build the cost-effective cyber ranges.