Network Intrusion Detection, Third Edition by Stephen Northcutt, Judy Novak

Total Page:16

File Type:pdf, Size:1020Kb

Network Intrusion Detection, Third Edition by Stephen Northcutt, Judy Novak Network Intrusion Detection, Third Edition By Stephen Northcutt, Judy Novak Publisher : New Riders Publishing Pub Date : August 28, 2002 ISBN : 0-73571-265-4 Pages : 512 • Table of Contents The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters. Table of Contents Copyright About the Authors About the Technical Reviewers Acknowledgments Tell Us What You Think Introduction Part I: TCP/IP Chapter 1. IP Concepts The TCP/IP Internet Model Packaging (Beyond Paper or Plastic) Addresses Service Ports IP Protocols Domain Name System Routing: How You Get There from Here Summary Chapter 2. Introduction to TCPdump and TCP TCPdump Introduction to TCP TCP Gone Awry Summary Chapter 3. Fragmentation Theory of Fragmentation Malicious Fragmentation Summary Chapter 4. ICMP ICMP Theory Mapping Techniques Normal ICMP Activity Malicious ICMP Activity To Block or Not to Block Summary Chapter 5. Stimulus and Response The Expected Protocol Benders Abnormal Stimuli Summary Chapter 6. DNS Back to Basics: DNS Theory Using DNS for Reconnaissance Tainting DNS Responses Summary Part II: Traffic Analysis Chapter 7. Packet Dissection Using TCPdump Why Learn to Do Packet Dissection? Sidestep DNS Queries Introduction to Packet Dissection Using TCPdump Where Does the IP Stop and the Embedded Protocol Begin? Other Length Fields Increasing the Snaplen Dissecting the Whole Packet Freeware Tools for Packet Dissection Summary Chapter 8. Examining IP Header Fields Insertion and Evasion Attacks IP Header Fields The More Fragments (MF) Flag Summary Chapter 9. Examining Embedded Protocol Header Fields TCP UDP ICMP Summary Chapter 10. Real-World Analysis You've Been Hacked! Netbus Scan How Slow Can you Go? RingZero Worm Summary Chapter 11. Mystery Traffic The Event in a Nutshell The Traffic DDoS or Scan Fingerprinting Participant Hosts Summary Part III: Filters/Rules for Network Monitoring Chapter 12. Writing TCPdump Filters The Mechanics of Writing TCPdump Filters Bit Masking TCPdump IP Filters TCPdump UDP Filters TCPdump TCP Filters Summary Chapter 13. Introduction to Snort and Snort Rules An Overview of Running Snort Snort Rules Summary Chapter 14. Snort Rules—Part II Format of Snort Options Rule Options Putting It All Together Summary Part IV: Intrusion Infrastructure Chapter 15. Mitnick Attack Exploiting TCP Detecting the Mitnick Attack Network-Based Intrusion-Detection Systems Host-Based Intrusion-Detection Systems Preventing the Mitnick Attack Summary Chapter 16. Architectural Issues Events of Interest Limits to Observation Low-Hanging Fruit Paradigm Human Factors Limit Detects Severity Countermeasures Calculating Severity Sensor Placement Outside Firewall Push/Pull Analyst Console Host- or Network-Based Intrusion Detection Summary Chapter 17. Organizational Issues Organizational Security Model Defining Risk Risk Defining the Threat Risk Management Is Dollar Driven How Risky Is a Risk? Summary Chapter 18. Automated and Manual Response Automated Response Honeypot Manual Response Summary Chapter 19. Business Case for Intrusion Detection Part One: Management Issues Part Two: Threats and Vulnerabilities Part Three: Tradeoffs and Recommended Solution Repeat the Executive Summary Summary Chapter 20. Future Directions Increasing Threat Defending Against the Threat Defense in Depth Emerging Techniques Summary Part V: Appendixes Appendix A. Exploits and Scans to Apply Exploits False Positives IMAP Exploits Scans to Apply Exploits Single Exploit, Portmap Summary Appendix B. Denial of Service Brute-Force Denial-of-Service Traces Elegant Kills nmap Distributed Denial-of-Service Attacks Summary Appendix C. Detection of Intelligence Gathering Network and Host Mapping NetBIOS-Specific Traces Stealth Attacks Measuring Response Time Worms as Information Gatherers Summary Copyright Copyright © 2003 by New Riders Publishing THIRD EDITION: September 2002 All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Library of Congress Catalog Card Number: 2001099565 06 05 04 03 02 7 6 5 4 3 2 1 Interpretation of the printing code: The rightmost double-digit number is the year of the book's printing; the rightmost single-digit number is the number of the book's printing. For example, the printing code 02-1 shows that the first printing of the book occurred in 2002. Printed in the United States of America Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. New Riders Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Warning and Disclaimer This book is designed to provide information about intrusion detection. Every effort has been made to make this book as complete and as accurate as possible, but no warranty of fitness is implied. The information is provided on an as-is basis. The authors and New Riders Publishing shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. Credits Publisher David Dwyer Associate Publisher Stephanie Wall Production Manager Gina Kanouse Managing Editor Kristy Knoop Senior Acquisitions Editor Linda Anne Bump Senior Marketing Manager Tammy Detrich Publicity Manager Susan Nixon Project Editor Suzanne Pettypiece Copy Editor Kelli Brooks Indexer Larry Sweazy Manufacturing Coordinator Jim Conway Book Designer Louisa Klucznik Cover Designer Brainstorm Design, Inc. Cover Production Aren Howell Proofreader Beth Trudell Composition Gloria Schurick Dedication Network Intrusion Detection, Third Edition is dedicated to Dr. Richard Stevens Stephen Northcutt: I can still see him in my mind quite clearly at lunch in the speaker's room at SANS conferences—long blond hair, ponytail, the slightly fried look of someone who gives his all for his students. I remember the scores from his comment forms. Richard Stevens was the best instructor of us all. I know he is gone and yet, every couple days, I reach for his book TCP/IP Illustrated, Volume 1, usually to glance at the packet headers inside the front cover. I am so thankful to own that book; it helps me understand IP and TCP, the network protocols that drive our world. In three weeks or so, I will teach TCP to some four hundred students. I am so scared. I cannot fill his shoes, not even close, but the knowledge must continue to be passed on. I can't stress "must" enough; there is no magic product that can do intrusion detection for you. In the end, every analyst needs a basic understanding of how IP works so they will be able to detect the anomalies. That was the gift Dr. Stevens left each of us. This book builds upon that foundation! Judy Novak: Of all the influences in the field of security and traffic analysis, none has been more profound than that of the late Dr. Richard Stevens. He was a prolific and accomplished author. The book I'm most familiar with is my dog-eared, garlic saucestained copy of TCP/IP Illustrated, Volume 1. It is an absolute masterpiece because he is the ultimate authority on TCP/IP and Unix, and he had the rare ability to make the subjects coherent. I know several of the instructors at SANS consider this work to be the "bible" of TCP/IP. I once had the opportunity to be a student in a course he taught for SANS, and I think I sat with mouth agape in reverence of someone with such knowledge. Last summer, he agreed to edit a course I had written for SANS in elementary TCP/IP concepts. This was the equivalent of having Shakespeare critically review a grocery list. I carry his book with me everywhere, and I will not soon forget him. About the Authors Stephen Northcutt is a graduate of Mary Washington College. Before entering the field of computer security, he worked as a Navy helicopter search and rescue crewman, white water raft guide, chef, martial arts instructor, cartographer, and network designer. Stephen is author/co- author of Incident Handling Step by Step, Intrusion Signatures and Analysis, Inside Network Perimeter Security, and the previous two editions of this book. He was the original author of the Shadow intrusion detection system and leader of the Department of Defense's Shadow Intrusion Detection team before accepting the position of Chief for Information Warfare at the Ballistic Missile Defense Organization. Stephen currently serves as Director of Training and Certification for the SANS Institute. Judy Novak is currently a senior security analyst working for the Baltimore-based consulting firm of Jacob and Sundstrom, Inc. She primarily works at the Johns Hopkins University Applied Physics Laboratory where she is involved in intrusion detection and
Recommended publications
  • A Humanoid Robot
    NAIN 1.0 – A HUMANOID ROBOT by Shivam Shukla (1406831124) Shubham Kumar (1406831131) Shashank Bhardwaj (1406831117) Department of Electronics & Communication Engineering Meerut Institute of Engineering & Technology Meerut, U.P. (India)-250005 May, 2018 NAIN 1.0 – HUMANOID ROBOT by Shivam Shukla (1406831124) Shubham Kumar (1406831131) Shashank Bhardwaj (1406831117) Submitted to the Department of Electronics & Communication Engineering in partial fulfillment of the requirements for the degree of Bachelor of Technology in Electronics & Communication Meerut Institute of Engineering & Technology, Meerut Dr. A.P.J. Abdul Kalam Technical University, Lucknow May, 2018 DECLARATION I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or other institute of higher learning except where due acknowledgment has been made in the text. Signature Signature Name: Mr. Shivam Shukla Name: Mr. Shashank Bhardwaj Roll No. 1406831124 Roll No. 1406831117 Date: Date: Signature Name: Mr. Shubham Kumar Roll No. 1406831131 Date: ii CERTIFICATE This is to certify that Project Report entitled “Humanoid Robot” which is submitted by Shivam Shukla (1406831124), Shashank Bhardwaj (1406831117), Shubahm Kumar (1406831131) in partial fulfillment of the requirement for the award of degree B.Tech in Department of Electronics & Communication Engineering of Gautam Buddh Technical University (Formerly U.P. Technical University), is record of the candidate own work carried out by him under my/our supervision. The matter embodied in this thesis is original and has not been submitted for the award of any other degree.
    [Show full text]
  • An Introduction to the NASA Robotics Alliance Cadets Program
    Session F An Introduction to the NASA Robotics Alliance Cadets Program David R. Schneider, Clare van den Blink NASA, DAVANNE, & Cornell University / Cornell University CIT [email protected], [email protected] Abstract The 2006 report National Defense Education and Innovation Initiative highlighted this nation’s growing need to revitalize undergraduate STEM education. In response, NASA has partnered with the DAVANNE Corporation to create the NASA Robotics Alliance Cadets Program to develop innovative, highly integrated and interactive curriculum to redesign the first two years of Mechanical Engineering, Electrical Engineering and Computer Science. This paper introduces the NASA Cadets Program and provides insight into the skill areas targeted by the program as well as the assessment methodology for determining the program’s effectiveness. The paper also offers a brief discussion on the capabilities of the program’s robotic platform and a justification for its design into the program. As an example of the integration of the robotic platform with the program’s methodologies, this paper concludes by outlining one of the first educational experiments of NASA Cadets Program at Cornell University to be implemented in the Spring 2007 semester. I. Introduction To be an engineer is to be a designer, a creator of new technology, and the everyday hero that solves society’s problems through innovative methods and products by making ideas become a reality. However, the opportunity to truly explore these key concepts of being an engineer are often withheld from most incoming engineering students until at least their junior year causing many new students to lose motivation and potentially leave the program.
    [Show full text]
  • Towards a Robot Learning Architecture
    From: AAAI Technical Report WS-93-06. Compilation copyright © 1993, AAAI (www.aaai.org). All rights reserved. Towards a Robot Learning Architecture Joseph O’Sullivan* School Of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213 email: josu][email protected] Abstract continuously improves its performance through learning. I summarize research toward a robot learning Such a robot must be capable of aa autonomous exis- architecture intended to enable a mobile robot tence during which its world knowledge is continuously to learn a wide range of find-and-fetch tasks. refined from experience as well as from teachings. In particular, this paper summarizesrecent re- It is all too easy to assumethat a learning agent has search in the Learning Robots Laboratory at unrealistic initial capabilities such as a prepared environ- Carnegie Mellon University on aspects of robot ment mapor perfect knowledgeof its actions. To ground learning, and our current worktoward integrat- our research, we use s Heath/Zenith Hero 2000 robot ing and extending this within a single archi- (named simply "Hero"), a commerc/aI wheeled mobile tecture. In previous work we developed sys- manipulator with a two finger hand, as a testbed on tems that learn action models for robot ma- whichsuccess or failure is judged. nipulation, learn cost-effective strategies for us- In rids paper, I describe the steps being taken to design ing sensors to approach and classify objects, and implement a learning robot agent. In Design Prin- learn models of sonar sensors for map build- ciples, an outline is stated of the believed requirements ing, learn reactive control strategies via rein- for a successful agent.
    [Show full text]
  • College4kids Summer Career Academies 2014
    College4KidsSummer Career Academies 2014 at Piedmont Virginia Community College For Rising 3rd-9th Graders • June 16-Aug. 15, 2014 www.pvcc.edu/academies 1 For Rising 6th-9th Graders Acting for Film Lights! Camera! Action! Want to be a film actor? You’ll “Great teacher. Best computer class yet.” College4Kids have a blast in this workshop learning script analysis, – ComputeR SCIENCE STUDENT experiencing moment-to-moment acting techniques, Summer Career Academies 2014 performing for the camera and establishing a at Piedmont Virginia Community College confident performance through the pursuit of dramatic intention. You’ll be assigned a scene from a Hollywood Building a Computer From Parts • Can you count to two? If yes, then you can build a For Rising 3rd-9th Graders June 16-Aug. 15, 2014 movie to develop a character, work with scene complete computer system from parts and load the partners and perform on camera. Robert Wray is a operating system. Learn about computer system teacher, playwright and actor, with appearances in fundamentals including the binary number system and numerous films and New York City theater productions. logic gates, the elements of any computer system and Explore your interests with new friends. M-F 7/7-7/11 8:45-11:45 a.m. $125 operations at a basic level. Architecture M-F 6/16-6/20 12:30-3:30 p.m. $189 Have fun while you learn! If you could design your own building, what would it M-F 7/14-7/18 12:30-3:30 p.m. $189 look like? Dream big, then design it in detail! Create Computer Numerical Control (CNC): • Enjoy hands-on, project-based learning! architectural drawings by hand, build a physical 3-D model and then create a virtual model with Google Learn to Manufacture! SketchUp.
    [Show full text]
  • Intrusion Detection Systems for Smart Home Iot Devices: Experimental Comparison Study
    Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study Faisal Alsakran1, Gueltoum Bendiab1, Stavros Shiaeles2, and Nicholas Kolokotronis3 1 CSCAN, University of Plymouth, PL4 8AA, Plymouth, UK [email protected], [email protected] 2 School of Computing, University of Portsmouth, PO1 2UP, Portsmouth, UK [email protected] 3 Department of Informatics and Telecommunications, University of Peloponnese, 22131 Tripolis, Greece [email protected] ABSTRACT Smart homes are one of the most promising applications of the 1 INTRODUCTION emerging Internet of Things (IoT) technology. With the growing Smart home technology also often referred to as home automation number of IoT related devices such as smart thermostats, smart allows the entire home to be automated and therefore, the connected fridges, smart speaker, smart light bulbs and smart locks, smart smart home devices can be remotely controlled and operated, from any homes promise to make our lives easier and more comfortable. location in the world, through a smartphone app, iPads or other network However, the increased deployment of such smart devices brings an devices [13]. In recent years, smart home technology is gaining increase in potential security risks and home privacy breaches. In tremendous ground at all levels. Economic reports affirm that connected order to overcome such risks, Intrusion Detection Systems are home market becomes the largest IoT segment at seven billion related presented as pertinent tools that can provide network-level smart devices in 2018, which present 26% of the global IoT devices protection for smart devices deployed in home environments. These market [14]. According to Gartner [32] this segment is expected to grow systems monitor the network activities of the smart home-connected to 20.4 billion devices by 2020.
    [Show full text]
  • POVERTY ALLEVIATION: a Role for Technology and Infrastructure?
    Fondazione per la Collaborazione tra i Popoli Foundation for World Wide Cooperation Presidente Romano Prodi POVERTY ALLEVIATION: A Role for Technology and Infrastructure? CONCEPT NOTE ENERGY CONNECTIVITY (Communication and learning) HEALTH & FOOD ROMA, 2015 MAY Fondazione per la Collaborazione tra i Popoli Foundation for World Wide Cooperation Presidente Romano Prodi CONCEPT NOTE Poverty Alleviation: A Role for Technology and Infrastructure? The goal of the conference is twofold: to assess the results of technology-based poverty alleviation projects and to explore the social and political effects of this technology. In particular, we want to start floating an idea that may be out of the 'mainstream’ of political thinking. We all agree that peace and security are crucial to work for poverty alleviation. The common approach of international aid agencies is to build institutional and governance reform. While this is indispensable, it should not be the only focus. While rushing to create multi-party, parliamentary systems, independent judiciaries and free press, we should not forget the human factor, i.e. the need to build trust and communication among different individuals who will need, quite simply, to work together in order to make those institutions function. Today, in the twenty-first century, some of the most exciting tools available for addressing these issues are technology and innovation. Even with the best of governance and a visionary leadership, if there is no inclusive development, a country cannot move forward. Throughout history technology has been a powerful instrument for economic and social development. Technology played a critical role in reducing poverty in vast areas of the world in the past and can play today a crucial function in the battle against poverty.
    [Show full text]
  • Down-Line Loading on Hero Robot
    University of Wollongong Research Online Department of Computing Science Working Faculty of Engineering and Information Paper Series Sciences 1984 Down-line loading on hero robot John Fulcher University of Wollongong, [email protected] Follow this and additional works at: https://ro.uow.edu.au/compsciwp Recommended Citation Fulcher, John, Down-line loading on hero robot, Department of Computing Science, University of Wollongong, Working Paper 84-13, 1984, 39p. https://ro.uow.edu.au/compsciwp/9 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] Down-line loading on Hero robot John Fulcher Department of Computing Science University of Wollongong ABSTRACT Expansion of ET-18 (Hero 1.0) Educational Robot in order to provide down-line loading capability from the Unix time-shared operating system is described. This expansion has also enabled up-line saving of programs from Hero to Unix. These facilities are implemented in EPROM form (2716) in the optional ROM socket on Hero's CPU board. The program stored in EPROM is essentially the same as the Utility EPROM used on the expanded ET-3400 Microprocessor Trainers in the Department's Microcomputer Laboratory, with minor modifications to run on Hero. As a direct result of incorporating these facilities into Hero, the Unix down-line load program 'dll' has been upgraded (to allow for up- line save), and an r-file for the Unix general-purpose cross-~ssembler 'mac' has been written to allow for the use of Robot Interpreter commands (Hero utilizes unused M6800 op.
    [Show full text]
  • Trade Marks Journal No: 1936 , 13/01/2020 Class 9 2829969 20/10
    Trade Marks Journal No: 1936 , 13/01/2020 Class 9 2829969 20/10/2014 L.A. INTERNATIONAL PVT. LTD. trading as ;L.A. INTERNATIONAL PVT. LTD. B-XXX-788, SHERPUR BYE PASS, LUDHIANA (PB.) MANUFACTURER & MERCHANTS Address for service in India/Agents address: PURI TRADE MARK CO. "BRAND HOUSE",54-55, SUPER CYCLE MARKET, OPP. KWALITY KANDA, GILL ROAD, LUDHIANA-141003 (PUNJAB). Used Since :01/04/2005 DELHI MOBILE & MOBILE PARTS, THEIR FITTINGS & ACCESSORIES 1374 Trade Marks Journal No: 1936 , 13/01/2020 Class 9 RoadReady 2906450 20/02/2015 HERO MOTOCORP LTD. 34 BASANT LOK, VASANT VIHAR, NEW DELHI 110057 MANUFACTURERS AN INDIAN COMPANY INCORPORATED UNDER THE COMPANIES ACT, 1956 Address for service in India/Agents address: ANAND AND ANAND. B-41,NIZAMUDDIN EAST, NEW DELHI - 110 013. Proposed to be Used DELHI HELMETS AND HEAD PROTECTIVE GEARS IN CLASS 9. 1375 Trade Marks Journal No: 1936 , 13/01/2020 Class 9 2916801 04/03/2015 GE INTELLIGENT PLATFORMS, INC. Route 29 North and Route 606, Charlottesville Virginia 22911 Manufacturers & Merchants Address for service in India/Attorney address: K & S PARTNERS 109, SECTOR-44, GURGAON - 122 003, NATIONAL CAPITAL REGION, INDIA Proposed to be Used DELHI Computer software for empirical modeling and statistical analysis of data obtained from and the monitoring of process controls systems in the fields of chemical processes, manufacturing processes, instrumentation processes, continuous manufacturing processes, financial processes, biological processes, machine operations, and data sensor operations. 1376 Trade
    [Show full text]
  • Personal Robots
    Personal Robots 1980-2014 (c) 2014 Patrick H. Stakem PRRB Publishing. 1st edition, 2nd in Series, Robots 1 Contents Table of Contents Introduction..........................................................................................................................4 Introduction..........................................................................................................................6 Time Line.............................................................................................................................6 Drivers .................................................................................................................................7 Star Wars....................................................................................................................7 Transformers...............................................................................................................7 Personal computers.....................................................................................................8 The Historical Units.............................................................................................................8 Conferences................................................................................................................9 Heath Hero................................................................................................................10 Hero-JR.....................................................................................................................16
    [Show full text]
  • Effective Implementation of Dynamic Classification for Network Forensic and Traffic Analysis
    International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 Volume 6 Issue 2 March 2015 EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS Manu Bansal Assistant Professor Department of IT University Institute of Engineering & Technology Panjab University, Sector 25, Chandigarh ABSTRACT Packet capturing is one of classical and most frequently used task performed by the network administrators. This is done to fetch the packets traveling in the network and finally detect any suspicious activity in the network. Finally, any out of the way activity or abnormal activity is analyzed by the intrusion detection system (IDS) tools for classification of attacks or type of the traffic. Enormous IDS tools are available including open source products which can classify the attacks or traffic from the PCAP (Packet Capture) Files fetched from honeypots or servers. This article explains about various aspects of PCAP and the detailed process of analyzing the PCAP using Snort IDS Tool for classification of traffic. Keywords – Network Forensic using Data Mining, PCAP Analysis, Honeypot and Honeynets International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 Volume 6 Issue 2 March 2015 INTRODUCTION Network administrators generally face the regular issues of intrusion in their network by different media. To cope up with such issues, they make use of pcap (packet capture) that is having the application programming interface (API) for capturing the network traffic from different dimensions including ports, IP Addresses and associated parameters. In case of Unix- like systems, pcap is implemented in libpcap library. In case of Windows, it implements a port of libpcap that is known as WinPcap.
    [Show full text]
  • RECF VIQC, VRC, and VEX U Team Guide
    ROBOTICS EDUCATION & COMPETITION FOUNDATION RECF VIQC, VRC, and VEX U Team Guide 2021-2022 For Coaches, Team Members, Teachers, and Parents REC Foundation VIQC, VRC, and VEX U Team Guide 2021-2022 Table of Contents How to Use this Guide .................................................................................................................. 4 Before You Begin, Which Program to Pick? ............................................................................. 5 VEX IQ Challenge (Elementary/Middle School): ................................................................... 5 VEX Robotics Competition (Middle/High School): ............................................................... 5 VEX U (Post-Secondary): ......................................................................................................... 5 Robotics Season – Start to Finish .............................................................................................. 6 Stage 1. Team Registration ..................................................................................................... 6 Option 1 – New School/Organization ..................................................................................... 6 Option 2 – Returning Team at a Returning School/Organization .......................................... 8 Option 3 – New Team at a Returning School/Organization ................................................... 8 Stage 2. Forms, Policies and Procedures............................................................................ 10 Participant
    [Show full text]
  • Gifted and Talented Enrichment Curriculum
    GATE Middle School Program Grades 6-8 GATE is a program for identified gifted middle school students in the Lyme Old Lyme School District. It is designed to meet the educational needs of those children who are intellectually above the norm. The GATE program further strives to provide school wide enrichment activities for all students. The program offers appropriate learning experiences which teach, challenge, and expand the student’s knowledge while simultaneously stressing the development of an independent learner who can continuously question, apply, and generate information. Many of the activities enhance the development of thinking skills and problem solving techniques. Emphasis is placed on providing a flexible environment for self-directed and group activities that enhance, strengthen, broaden, and challenge. 6th grade Digital Photography The students will be given twelve assignments that teach them how to use a digital camera, how to organize pictures, and how to look at objects in unique and creative ways to create great photographs. Photoshop – Using their collection of photos, students will use photoshop to manipulate the photos in a variety of assignments. Assessment – Students will create a picture slideshow with music using their own original photographs and burn it to DVD. Each student will evaluate their photos and pick their favorite one which will be mounted and displayed at the school. Opticall Illusions- We will explore and analyze some of the most famous optical illusions and how they ‘trick the mind’. The students will recreate an optical illusion which we make into a display for the school. Lego Robotics Students will learn how build robust robot designs and learn the programming language to create autonomous robots.
    [Show full text]