[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2382456.2382499acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
research-article

Security challenges in IT infrastructure for cybersecurity curriculum support

Published: 15 October 2012 Publication History

Abstract

With the evolving challenges in cyberspace there is a need for curriculum development in cybersecurity. Students in a cybersecurity curriculum need to access and learn about topics in cybersecurity such that they have a clear understanding of the sophistication of threats such that they can implement mitigation response. Development of hands on curriculum in cybersecurity therefore poses significant challenges to the information technology infrastructure in an instructional environment. Among the various challenges one of the significant challenges involves attack simulations of a cyber-attack requiring the creation of a walled infrastructure to accommodate the equipment where computing services are hosted. The challenges of containing malicious software which can be released by accident are also significant to the IT infrastructure. In this paper we show how the walled infrastructure with computing service can be created such that cybersecurity curriculum can be institutionalized where students locally and remotely can access this infrastructure. The walled IT infrastructure is based on risk escalation wherein connectivity and access to computing resources is contained as risk to computing infrastructure increases. We also show IT challenges in curriculum development on topics of hardware, software and networking for cybersecurity and how virtualization is a means for solving the challenges in those respective topics.

References

[1]
Stefano Zanero. 2009. Wireless Malware Propagation: A Reality Check. IEEE Security and Privacy 7, 5 (September 2009), 70--74. DOI=10.1109/MSP.2009.142 http://dx.doi.org/10.1109/MSP.2009.142
[2]
Ernest McDuffie. 2011. NICE: National Initiative for Cybersecurity Education. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11), Frederick T. Sheldon, Robert Abercrombie, and Axel Krings (Eds.). ACM, New York, NY, USA, Article 12, 1 pages. DOI=10.1145/2179298.2179311 http://doi.acm.org/10.1145/2179298.2179311
[3]
Victor Piotrowski. 2011. NSF investments in cybersecurity research and education. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11), Frederick T. Sheldon, Robert Abercrombie, and Axel Krings (Eds.). ACM, New York, NY, USA, Article 13, 1 pages. DOI=10.1145/2179298.2179312 http://doi.acm.org/10.1145/2179298.2179312
[4]
Sylvain P. Leblanc, Andrew Partington, Ian Chapman, and Mélanie Bernier. 2011. An overview of cyber attack and computer network operations simulation. In Proceedings of the 2011 Military Modeling & Simulation Symposium (MMS '11). Society for Computer Simulation International, San Diego, CA, USA, 92--100.
[5]
W. Victor Maconachy, Corey D. Schou, Daniel Ragsdale and Don Welch "A Model for Information Assurance: An Integrated Approach" Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY
[6]
Nicky Moss and Andrew Smith. 2010. Large Scale Delivery of Cisco Networking Academy Program by Blended Distance Learning. In Proceedings of the 2010 Sixth International Conference on Networking and Services (ICNS '10). IEEE Computer Society, Washington, DC, USA, 329--334. DOI=10.1109/ICNS.2010.52 http://dx.doi.org/10.1109/ICNS.2010.52
[7]
Weiqing Sun, Varun Katta, Kumar Krishna, and R. Sekar. 2008. V-NetLab: an approach for realizing logically isolated networks for security experiments. In Proceedings of the conference on Cyber security experimentation and test (CSET'08). USENIX Association, Berkeley, CA, USA, Article 5, 6 pages.
[8]
Anthony D. Wood, John A. Stankovic "Security of Distributed, Ubiquitous, and Embedded Computing Platforms" Wiley Handbook of Science and Technology for Homeland Security
[9]
Shari Lawrence Pfleeger "Anatomy of an Intrusion" IT Pro, 2010
[10]
Raheem A. Beyah, *Michael C. Holloway, and John A. Copeland "Invisible Trojan: An Architecture, Implementation and Detection Method"
[11]
IEEE Standard for Localand metropolitan area networks Virtual Bridged Local Area Networks, IEEE Std 802.1Q"-2005
[12]
Mario Ernesto Gomez-Romero, Mario Reyes-Ayala, Edgar Alejandro Andrade-González, and Jose Alfredo Tirado-Mendez. 2010. Design and implementation of a VLAN. In Proceedings of the 2010 international conference on Applied computing conference (ACC'10), Petru Andea and Stefan Kilyeni (Eds.). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, 87--90.
[13]
Julia Allen, "Governing for Enterprise Security" Technical Note Carnegie Mellon University/SEI-2005-TN-023
[14]
Salah Alabady "Design and Implementation of a Network Security Model for Cooperative Network "International Arab Journal of e-Technology, Vol. 1, No. 2, June 2009
[15]
Gurdip Kaur, Meenu Khurana, and Monika Sethi. 2011. Intrusion detection system using honeypots and swarm intelligence. In Proceedings of the International Conference on Advances in Computing and Artificial Intelligence (ACAI '11). ACM, New York, NY, USA, 34--38. DOI=10.1145/2007052.2007060 http://doi.acm.org/10.1145/2007052.2007060
[16]
Ed Crowley. 2006. Open source, live CD based, security lab design: tutorial presentation. J. Comput. Small Coll. 21, 4 (April 2006), 278--279.
[17]
Megumi Nakamura and Seiji Munetoh. 2007. Designing a trust chain for a thin client on a live Linux cd. In Proceedings of the 2007 ACM symposium on Applied computing (SAC '07). ACM, New York, NY, USA, 1605--1606. DOI=10.1145/1244002.1244343 http://doi.acm.org/10.1145/1244002.1244343

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGUCCS '12: Proceedings of the 40th annual ACM SIGUCCS conference on User services
October 2012
262 pages
ISBN:9781450314947
DOI:10.1145/2382456
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. VLAN
  2. attacks
  3. honeynet
  4. honeypot
  5. netlab+
  6. sanitization
  7. virtualized

Qualifiers

  • Research-article

Conference

SIGUCCS '12
Sponsor:
SIGUCCS '12: ACM SIGUCCS Annual Conference
October 15 - 19, 2012
Tennessee, Memphis, USA

Acceptance Rates

Overall Acceptance Rate 123 of 170 submissions, 72%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 311
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media