[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1029533.1029576acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Experiential learning and security lab design

Published: 28 October 2004 Publication History

Abstract

Awareness of the need for Information Systems Security continues to expand. This expansion has created a need for security focused lab modules. By design, these lab modules should optimize student learning experiences. Incorporating Kolb's experiential learning model helps assure an optimum learning experience. This paper, presents procedures and methodologies utilized in developing security lab modules. These modules illustrate the application of Kolb's experiential learning model.

References

[1]
Bishop, M., "Computer Security Education: Training, Scholarship, and Research," IEEE Computer 35 (4) Privacy and Security Supplement pp. 30--32 (Apr. 2002).
[2]
"Cert/CC Overview", CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University Pittsburg, PA, 2003. Retrieved June 2004, from: http://www.cert.org/present/cert-overview-trends/module-1.pdf
[3]
Cole, E., Newfield, M., Millican, J., "GSEC Security Essentials Toolkit", Que Publishing, Indianapolis, IA, 2002.
[4]
Crowley, E., "Information System Security Curricula Development", Conference On Information Technology Education, West Lafayette, IA, 2003.
[5]
Dark, M., and Davis, J., "Report on Information Assurance Curriculum Development", June 2002.
[6]
Davis, J. and Dark, M., "Defining a curriculum framework in Information Assurance and Security", 2003 ASEE Annual Conference, Nashville, TN, June 2003.
[7]
Hoffman, L., Dodge, R., Rosenberg, T., Ragsdale, D., "Information Assurance Laboratory Innovations", National Colloquim for Information System Security Education, Washington, D.C., 2003.
[8]
Kolb, D., "Experiential Learning", Prentice Hall, Englewood Cliffs, NJ, 1984.
[9]
Larkin-Hein, T. and Bundy, D., "Styles and Types in Science and Engineering Education", International Conference on Engineering and Computer Education, San Paulo, Brazil, August 2000.
[10]
Longstaff, T., Ellis, J., Hernan,S., Lipson, H., McMillan,R., Pesante, L., Simmel. D., "Security of the Internet", The Froehlich/Kent Encyclopedia of Telecommunications vol. 15, pp. 231--255, New York: Marcel Dekker, 1997.
[11]
Millenbah, K., Campa, H., Winterstein, S., "Models for Infusing Experiential Learning into the Curriculum", Retrieved June, 2004, from http://www.snr.missouri.edu/meetings/uenr/millenbah.pdf
[12]
Mitre, "Defense-Information Assurance Red Team", The Mitre Digest, 15 Oct 2000. As referenced 20 June at: http://www.mitre.org/news/digest/archives/2000/defense_red_team.html
[13]
Perez-Hardy, S., "A Unique Experiential Model for Teaching Network Administration", Conference On Information Technology Education, West Lafayette, IA, 2003.
[14]
Stice, J., "Using Kolb's Learning Cycle to Improve Student Learning". Engineering Education, Feb 1987, pp. 291--296.
[15]
Venkataramanan, G., "Coupling the Laboratory - Real-world Continum into Power Electronics Education, 2004. Retrieved June 2004, from: http://www.ece.umn.edu/groups/PowerElectronics_Drives/workshop_feb04/poster/coupling.pdf
[16]
Wankat, P. & Oreovicz, "Teaching engineering" New York, McGraw-Hill, 1993. Retrieved June 2004, from: https://engineering.purdue.edu/ChE/News_and_Events/Publications/teaching_engineering
[17]
Wilson, N., Nelson, R., "Experimental Economics in the Agribusiness Classroom", 2000 IAMA Food and Agribusiness Forum, Chicago, IL, 2000.
[18]
Woods, D., Banfe, P., "Involve Me and I will Understand: Effective Service Learning -- On a Platter", Academic Exchange Extra, Jan 2003. Retrieved June 2004, from http://asstudents.unco.edu/students/AE-Extra/2003/1/indxmain.html

Cited By

View all
  • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
  • (2009)Missing factors in teaching cryptography algorithms for information security tracks2009 Information Security Curriculum Development Conference10.1145/1940976.1940982(15-20)Online publication date: 25-Sep-2009
  • (2008)An experimental environment for teaching Java securityProceedings of the 6th international symposium on Principles and practice of programming in Java10.1145/1411732.1411735(13-22)Online publication date: 9-Sep-2008
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CITC5 '04: Proceedings of the 5th conference on Information technology education
October 2004
300 pages
ISBN:1581139365
DOI:10.1145/1029533
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. TCP/IP
  2. internet security
  3. lab design
  4. network security

Qualifiers

  • Article

Conference

SIGITE04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 176 of 429 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
  • (2009)Missing factors in teaching cryptography algorithms for information security tracks2009 Information Security Curriculum Development Conference10.1145/1940976.1940982(15-20)Online publication date: 25-Sep-2009
  • (2008)An experimental environment for teaching Java securityProceedings of the 6th international symposium on Principles and practice of programming in Java10.1145/1411732.1411735(13-22)Online publication date: 9-Sep-2008
  • (2008)SEEDJournal on Educational Resources in Computing10.1145/1348713.13487168:1(1-24)Online publication date: 1-Mar-2008
  • (2007)Developing realistic capstone projects in conjunction with industryProceedings of the 8th ACM SIGITE conference on Information technology education10.1145/1324302.1324309(27-32)Online publication date: 18-Oct-2007
  • (2007)Integrating reflective writing in CS/ISACM SIGCSE Bulletin10.1145/1272848.127288139:2(42-45)Online publication date: 1-Jun-2007
  • (2006)StingrayProceedings of the 7th conference on Information technology education10.1145/1168812.1168827(53-58)Online publication date: 19-Oct-2006
  • (2005)Promoting communication and inclusiveness in the IT classroomProceedings of the 6th conference on Information technology education10.1145/1095714.1095786(311-317)Online publication date: 20-Oct-2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media