[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Ideas for projects in undergraduate information assurance and security courses

Published: 25 June 2007 Publication History

Abstract

In this work, we present some ideas for projects that can be used in undergraduate Information Assurance and Security (IAS) courses. The projects range from cryptanalysis of ciphertext, network security, security vulnerability analysis, and programming to demonstrate buffer overflow. The projects can be used in IAS courses such as cryptography, network security, and computer security. Alternatively, they can be used as separate modules in computer science courses such as operating systems, networking, and programming. Some of these projects have been piloted by the author and have achieved their objectives.

References

[1]
Schneier, Bruce, Applied Cryptography, second edition, John Wiley and sons, 1996.
[2]
Stallings, William, Cryptography and Network Security, third Edition, Prentice Hall, 2007.

Index Terms

  1. Ideas for projects in undergraduate information assurance and security courses

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM SIGCSE Bulletin
      ACM SIGCSE Bulletin  Volume 39, Issue 3
      Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education (ITiCSE'07)
      September 2007
      366 pages
      ISSN:0097-8418
      DOI:10.1145/1269900
      Issue’s Table of Contents
      • cover image ACM Conferences
        ITiCSE '07: Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education
        June 2007
        386 pages
        ISBN:9781595936103
        DOI:10.1145/1268784
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 June 2007
      Published in SIGCSE Volume 39, Issue 3

      Check for updates

      Author Tag

      1. information assurance and security

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 589
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Dec 2024

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media