[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A portable computer security workshop

Published: 01 December 2006 Publication History

Abstract

We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles as well as an understanding of some of the significant tools and techniques in this area. Evaluations of the workshop have been very positive; we will offer the workshop locally, regionally, and nationally in the next year. The materials from this workshop are available at http://clics.cs.uwec.edu/workshopmaterials.htm.

References

[1]
Aycock, J. and Barker, K. 2005. Viruses 101. In Proceedings of the 36th Technical Symposium on Computer Science Education (SIGCSE 2005, St. Louis, MO, Feb.), ACM, New York, 152--156.
[2]
Bishop, M. and Frincke, D.A. 2005. Teaching secure programming. IEEE Security & Privacy 3, 5, 54--56.
[3]
CLICS. 2005. CLICS: A computational laboratory for information and computer security project. http://clics.cs.uwec.edu
[4]
Hoffman, L.J., Rosenberg, T., Dodge, R., and Ragsdale, D. 2005. Exploring a national cybersecurity exercise for universities. IEEE Security and Privacy 3, 5, 27--33.
[5]
Martin, A. 2002. Increased demand for computer security courses. Atlanta Business Chronicle, Aug. 16. http://www.bizjournals.com/atlanta/stories/2002/08/19/focus10.html
[6]
Mateti, P. 2003. A laboratory-based course on internet security. In Proceedings of the 34th Technical Symposium on Computer Science Education (SIGCSE 2003, Reno, NV, Feb.), ACM, New York, 252--256.
[7]
NSA. 2005. National Security Agency, Center of Academic Excellence in Information Assurance Education certification program. http://www.nsa.gov/ia/academia/caeiae.cfm
[8]
NSF. 2005. National Science Foundation, Federal Cyber Service: Scholarships for Service program. http://www.nsf.gov/pubs/2005/nsf05507/nsf05507.htm
[9]
Schneier, B. 2000. The process of security. Information Security (April). http://infosecuritymag.techtarget.com/articles/april00/columns_cryptorhythms.shtml
[10]
UML. 2005. User-mode Linux. http://user-mode-linux.sourceforge.net/new/index.html
[11]
VMWARE. 2005. VMware virtual computer/server software. VMware Inc., Palo Alto, CA. http://www.vmware.com
[12]
Wagner, P. and Wudi, J. 2004. Designing and implementing a cyberwar laboratory exercise for a computer security course. In Proceedings of the 35th Technical Symposium on Computer Science Education (SIGCSE 2004, Norfolk, VA, March), ACM, New York, 402--406.
[13]
Walden, J. 2005. A real-time information warfare exercise on a virtual network. In Proceedings of the 36th Technical Symposium on Computer Science Education (SIGCSE 2005), ACM, New York, 86--90.

Cited By

View all
  • (2010)Design of a virtual computer lab environment for hands-on information security exercisesJournal of Computing Sciences in Colleges10.5555/1858449.185845726:1(32-39)Online publication date: 1-Oct-2010
  • (2008)Laboratory design for wireless network attacksProceedings of the 5th annual conference on Information security curriculum development10.1145/1456625.1456629(5-12)Online publication date: 26-Sep-2008

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal on Educational Resources in Computing
Journal on Educational Resources in Computing  Volume 6, Issue 4
December 2006
63 pages
ISSN:1531-4278
EISSN:1531-4278
DOI:10.1145/1248453
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2006
Published in JERIC Volume 6, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Computer security
  2. laboratory exercises
  3. portable workshop

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2010)Design of a virtual computer lab environment for hands-on information security exercisesJournal of Computing Sciences in Colleges10.5555/1858449.185845726:1(32-39)Online publication date: 1-Oct-2010
  • (2008)Laboratory design for wireless network attacksProceedings of the 5th annual conference on Information security curriculum development10.1145/1456625.1456629(5-12)Online publication date: 26-Sep-2008

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media