by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : June 2014
CASE STUDY TRAINING AND SIMULATION The small town of Al- phaville, Mich., is under attack. Up to 50 hack- ers are trying to shut down the power grid. The local library is being used as a backdoor attack point against city hall. There s an encrypted bug being planted on the local elementary school s mainframe, and residents are finding that their desktop com- puters are being turned into zombie clients, further compro- mising security in this normally quiet village. Thankfully, Alphaville only exists electronically. It s a col- lection of virtual machines and computers networked together and assigned security levels modeled on how real towns across the country are actually configured. It exists as part of the Michigan Cyber Range, a network and classroom designed to enable the testing of cyberse- curity attacks and defense meth- ods in as realistic an environ- ment as possible. Joe Adams, the director of the Cyber Range, explained that cre- ating the facility was part of the state s Cyber Initiative launched last fall by Gov. Rick Snyder. "There are many states that put a focus on different aspects of technology, like Maryland with the federal government or Cali- fornia with Silicon Valley," Ad- ams said. "We want Michigan to become the place where people come to learn how to protect the critical infrastructure." Adams served in the military and used that experience to help build the Cyber Range and give it a real sense of place. He said he based Alphaville on the fa ade-like training towns set up on military bases around the country. Only instead of learn- ing squad tactics and weapons, Alphaville trainees are learning how to secure and protect criti- cal infrastructure like power grids, hospitals, local govern- ment installations and small businesses. UNCLASSIFIED FACILITY One thing that makes the range unique is that it s a totally un- classified facility, meaning that while the latest attacks and de- fenses can be studied, it remains open to everyone from govern- ment and private industry. "About 85 percent of all criti- cal infrastructure in this coun- try is protected by civilians, not feds," Adams said. "By keeping the facility unclassified, it allows anyone to be able to schedule training here. And those groups can bring in people who need to learn the latest defenses, ev- eryone from foreign nationals to first responders, without making them go though a long process of security clearance." Currently, the Michigan Cyber A collection of virtual machines and computers, Alphaville exists as part of the Michigan Cyber Range, a classroom designed to test cybersecurity defenses in a realistic environment In Alphaville, students prep for cyber sieges BY JOHN BREEDEN II 30 GCN JUNE 2014 • GCN.COM If something happens to take down the power grid, students can actually see the lights go off in town and citizens walking around in the dark. -- JOE ADAMS, CYBER RANGE