Search
Excepción capturada (Mon, 16 Dec 2024 19:15:54 +0000): SQLSTATE[08001]: [Microsoft][ODBC Driver 17 for SQL Server]SSL Provider: [error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol] #0 /home2/basqueindustry/public_html/c/themes/bdih/activos/dbupdater.php(321): PDO->__construct('sqlsrv:server=1...', 'userwp', 'wp2018') #1 /home2/basqueindustry/public_html/c/themes/bdih/single.php(120): logo_organizacion(2897) #2 /home2/basqueindustry/public_html/wp-includes/template-loader.php(106): include('/home2/basquein...') #3 /home2/basqueindustry/public_html/wp-blog-header.php(19): require_once('/home2/basquein...') #4 /home2/basqueindustry/public_html/index.php(17): require('/home2/basquein...') #5 {main}
back to search
NAME

Cyber-Ranges Laboratory

DESCRIPTION

A cyber-range is a virtual environment that is used for the training of personnel and for the research and development of cybersecurity technology. The cyber-range includes tools that help strengthen the stability, security and performance of IT / OT systems.
From the physical point of view, there is a room to host a Security Operations Center (SOC), which is the one that controls the cyber-range, and a second room that is where training and training exercises takes place. The SOC has software for monitoring, supervising and preventing IPS, IDS and SIEMS for the supervision of cyber-exercises and cyber-ranges.
On the other hand, the second room includes work stations for the people that will take part in the exercises (students or researchers), screens and video walls with information on the system, as well as the physical equipment needed to replicate the different scenarios of the IT / OT network for the cyber-ranges.
Concerning training, the cyber range allows to perform exercises of the type Capture The Flag (CTF) or Red-VS-Blue type. A CTF is a cybernetic challenge based of about four people that compete to attack servers and, if they manage to control, get points. In the case of Red-VS-Blue exercises, two teams are created, one that attacks a system and the other that defends it. The configuration of the exercise room is therefore flexible, so that it can be configured for one type of exercise as well as for the other.

MOST OUTSTANDING EQUIPMENT AND COMPONENTS

The Cyber Range Master room is the place where Cyber Ranges are held. It allows to carry out Cyber Ranges in which up to a maximum of 10 people can participate. Each participant has a Workstation with a double screen to carry out the Cyber Range.
The Cyber Range is monitored on a wall screen consisting of 10 screens of 55 "model Dell 55 Conference Room.
It also has equipment to create the Cyber Ranges scenarios as:
-2 3D printers with different technology: FDM FlashForge Dreamer Printer and SLA Wanhao duplicator 7 printer
-Virtual Reality Equipment (VR)/Augmented Reality (AR) composed by:
* Alienware Area-51 with Monitor
* Virtual reality glasses brand OCULUS
* Virtual reality glasses brand HTC Live
The Cyber Range supports the use of different software for the execution of Cyber Ranges.

It is composed by the equipment from which the Cyber-range is controlled. It has monitoring, supervision and prevention software for IPS, IDS and SIEM attacks. It is composed by:
- FortiSIEM FSM-2000F: SIEM-specific hardware with perpetual licensing for monitoring 100 devices and 1,000 events per second.
- 3 workstations with Dell equipment, model Optiplex 3050 Mini Tower XCTO, with Dell 22 "monitors, with the following features each workstation:
* Intel Core i5-6400 processor, 4Cores 2.7 GHz
* DVD +/-RW
* 4GB (1x4GB) 2400MHz DDR4
* hard drive 3.5 "500GB 7200rpm SATA
* extra 1GB AMD Radeon R5 430 graphics card (DP/VGA)
* USB keyboard Dell KB-522
* Dell MS116 USB Optical Mouse
* O.S. Español Windows 10 Pro (64bits)
* 2 monitors Dell 22 "S2218H-54, 6cm (21.5 ") Black

SERVICES OFFERED BY THE ASSET

services book icon
668

Cyber range training

services book icon
671

Cybersecurity test environment and product and/or process demonstration in a controlled environment

services book icon
672

Practical training in cybersecurity

services book icon
670

Test and demonstration environment for new cyber range products

services book icon
669

Test and demonstration environment for new security products

ENTITY MANAGING THE ASSET

FUNDACIÓN TECNALIA RESEARCH & INNOVATION

Contact person: Ana Isabel Ayerbe Fernandez-Cuesta

Other related assets

Tell us about your need

Let us get to know you better. If you are looking to implement intelligent technologies and advanced materials that improve the efficiency of your company's production system to offer solutions with more added value, fill in this form.

Scroll To Top