Link to home
Start Free TrialLog in
Avatar of DuyVH
DuyVH

asked on

Information Security Research Lab

Dear EE,

I'm working for a education institute, we are planning to build a Information Security Research Lab but don't know where and how to start.
Some fields we will focus on the future: Forensics, Web Application Security, Crypto, Security Management, Pentest.
Now we have to send to our partner (the investor):
1. What we need from them.
2. The list of devices we need for the Lab.

So if some of you have experience about this, please help us or send me the link about this.
Tks
DuyVH
Avatar of btan
btan

Location, depth of scope in testing audit requirement, expected role and responsibility of the the project team,  deadline, milestones and phase...these are something you would need to be clear to build up the phases and involvement from them in advisory. Identify point of contact form their point esp the one running if possible.

Actually building a research lab is quite extensive looking at the domain you shared. The infrastructure is critical especially as it is going to be resource intensive and data centre or even private cloud or distributed computing may be required for long running testing like breaking password protected files or simulation. Visualization support is key to run and support all lab access to workstation. Securing this infrastructure from abuse and unauthorized access is another consideration to do first thing right.

This may be a bit out but may help to know how big you will want to go into
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905632
Avatar of DuyVH

ASKER

breadtan,

Could you share with me:
- The typical devices (name of manufacturer) on a lab mapped with the domains we will focus.
- The network topology of the lab.

Tks
ASKER CERTIFIED SOLUTION
Avatar of btan
btan

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial