[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1029533.1029578acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Teaching security best practices by architecting and administering an IT security lab

Published: 28 October 2004 Publication History

Abstract

Information Assurance(IA) can be learned by actively being involved in the "doing" process. Students within a university setting have architected, installed and administered a security lab. The value and need for security <i>best practices</i> becomes self-evident, daily, as the security lab services the needs of information technology (IT) courses and research for both undergraduate and graduate students. Additionally, a need exists to coordinate the administration of the security lab with the ongoing operation of general IT courses and labs. Stability in the infrastructure, lab and research areas can only be achieved by designing good security best practices. A best practice is defined as a process that has performed exceptionally well in industry or the everyday world. Learning to design and implement security <i>best practices</i> is a teaching opportunity for students preparing to be Network Engineers, Security System Engineers or Security Architects. The <i>best practices</i> of the security lab were patterned after IT industry policy concepts that effectively handled change while maintaining a secure and stable infrastructure. The security best practices were developed under the supervision of a student security team and faculty advisor. The use of the IT security lab by undergraduate and graduate students for security projects provided a test of the viability of the security best practices. With the security team and the security policies in place, a working security lab is a realistic learning model in training and educating IT undergraduates and graduates in proper security practices. Furthermore, the experience provides guidance in how to expand security <i>best practices</i> to include the entire educational enterprise of laboratories and IT infrastructure and teaching areas.

References

[1]
U.S.G.A.O. BPR Glossary of Terms. &lt;http://www.gao.gov/special.pubs/bprag/bprgloss.htm. 1998&gt;. Retrieved June 2, 2004.
[2]
Skyrme, D.J. Are Your Best practices Really the Best. I3 Update / Entovation News. &lt;http://www.skyrme.com/updates/u54_f1.htm&gt;. Vol. 54, 2001. Retrieved June 27, 2004.
[3]
Hewlett-Packard Development Company, L.P. &lt;http://h41111.www4.hp.com/solutions/uk/en/lifecycle/best_practices.html&gt;. Gartner best practices. 2004. Retrieved June 7, 2004.
[4]
Coupe, T. Human, all too human. -On the behavior of scientists and universities. Universite' Libre de Bruxelles, &lt;http://homepages.ulb.ac.be/~tcoupe/human.pdf&gt;. 2001. (CHI '00) (The Hague, The Netherlands, April 1-6, 2000). ACM Press, New York, NY, 2000, 526--531. Retrieved June 7, 2004.
[5]
Martinez, I. Luna, L. The Dynamics of Best Practices: A Structural Approach. &lt;http://www.albany.edu/rockefeller/docs/martinez-luna.pdf&gt;. Retrieved June 29, 2004
[6]
Mattord, H.J., Whitman, M.E. Teaching Information Security Policy. 2004 IEEE Information Assurance Conference. West Point, New York. 2004.
[7]
SANS. Internal Lab Security Policy. &lt;http://www.sans.org/resources/policies/Internal_Lab_Security_Policy.pdf&gt;. 2004. Retrieved June 5, 2004.
[8]
CISCO. Network Security Policy: Best practices White Paper. &lt;http://www.cisco.com/warp/public/126/secpol.html.&gt; 2003. Retrieved on June 17, 2004.
[9]
ITIL & ITSM World. &lt;&lt;http://www.itil-itsm-world.com&gt;. 2004. Retrieved on June 29, 2004.
[10]
CISCO. Network Security Policy: Best practices White Paper. &lt;http://www.cisco.com/warp/public/126/secpol.html.&gt; 2003. Retrieved on June 17, 2004.
[11]
Stevenson, Travis. Conversation. Maverik Country Stores, Inc. Conversation June 15, 2004.
[12]
University of Montana. Incident Handling Procedure. &lt;http://www.mtech.edu/netserve/Security_Policies/Incident%20Handling%20Procedures.htm&gt;. Retrieved June 30, 2004.

Cited By

View all
  • (2014)Applying Protection Motivation Theory to Information Security Training for College StudentsJournal of Information Privacy and Security10.1080/15536548.2013.108456729:1(47-67)Online publication date: 7-Jul-2014
  • (2013)The agility, flexibility and efficiency of hypervisors in engineering education2013 12th International Conference on Information Technology Based Higher Education and Training (ITHET)10.1109/ITHET.2013.6671036(1-8)Online publication date: Oct-2013
  • (2009)Developing a virtualization platform for courses in networking, systems administration and cyber security educationProceedings of the 2009 Spring Simulation Multiconference10.5555/1639809.1639877(1-7)Online publication date: 22-Mar-2009
  • Show More Cited By

Index Terms

  1. Teaching security best practices by architecting and administering an IT security lab

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CITC5 '04: Proceedings of the 5th conference on Information technology education
    October 2004
    300 pages
    ISBN:1581139365
    DOI:10.1145/1029533
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 October 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IT infrastructure
    2. business enterprise
    3. educational enterprise
    4. information assurance
    5. network engineer
    6. security architect
    7. security best practices
    8. security laboratory
    9. security system engineer

    Qualifiers

    • Article

    Conference

    SIGITE04
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 176 of 429 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Applying Protection Motivation Theory to Information Security Training for College StudentsJournal of Information Privacy and Security10.1080/15536548.2013.108456729:1(47-67)Online publication date: 7-Jul-2014
    • (2013)The agility, flexibility and efficiency of hypervisors in engineering education2013 12th International Conference on Information Technology Based Higher Education and Training (ITHET)10.1109/ITHET.2013.6671036(1-8)Online publication date: Oct-2013
    • (2009)Developing a virtualization platform for courses in networking, systems administration and cyber security educationProceedings of the 2009 Spring Simulation Multiconference10.5555/1639809.1639877(1-7)Online publication date: 22-Mar-2009
    • (2007)A student-managed networking laboratoryProceedings of the 8th ACM SIGITE conference on Information technology education10.1145/1324302.1324319(67-74)Online publication date: 18-Oct-2007

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media