Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/364447.364533acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

Using an isolated network laboratory to teach advanced networks and security

Published: 01 February 2001 Publication History

Abstract

This paper discusses the use of an isolated network laboratory to teach computer security using persistent cooperative groups and an active learning approach. Computer security and computer security education are areas of increasing importance as computer systems become more interconnected. When offered, undergraduate and graduate computer security courses are routinely taught using a traditional lecture format. If the course includes a class project, the class project is limited in scope and constitutes a relatively small portion of the student's grade. This paper examines a different approach in which the class project is the dominant factor in the student's grade. The students work in persistent cooperative teams as either a black or gold team. Black teams attempt to break into other black team computers or attack the gold team. The gold team operates Windows NT, LINUX, and Solaris-based servers and attempts to defend their servers and role-play system administrators. The entire exercise takes place in an isolated lab so as to separate student class activities from the rest of the departmental intranet. Four years of experience running the class with this format suggests that the use of persistent cooperative groups and active learning are effective approaches for teaching network security and are preferred over a lecture-based course.

References

[1]
Barnett, S., "Computer Security Training and Education: A Needs Analysis," IEEE Symposium on Security and Privacy, Los Alarnitos, CA, May 6-8, 1996, pp. 26-27.
[2]
Bishop, M., "Computer Security in Introductory Programming Classes," Workshop on Education in Computer Security, Monterey, CA, January 29-31, 1997, pp. 1-2.
[3]
Bishop, M., "The State of INFOSEC Education in Academia: Present and Future Directions," Information Systems Security Education Colloquium, Maryland, April 23-24, 1997, pp. 19-33.
[4]
Bishop, M. and Heberlein, L. T., "An Isolated Network for Research," 19th National Information Systems Security Conference, Baltimore, MD, October 22-25, 1996, pp. 349-360.
[5]
Chin, S.-K., Irvine, C. E., and Frinke, D., "An Information Security Education Initiative for Engineering and Computer Science," Technical Report NPSCS-97-003,Naval Postgraduate School, Monterey, CA, December 1997.
[6]
Clark, D. D., Computers at Risk: Safe Computing in the Information Age, Washington, DC: National Academy Press, 1991.
[7]
Clinton, W., "Executive Order 13010 - Critical Infrastructure Protection," Available at http://www.ciao.gov/PCCIP/PCCIP_index.htm, {September 5, 2000}.
[8]
Higgins, J., "Information Security as a Topic in Undergraduate Education of Computer Scientists," Twelfth National computer Security Conference, Baltimore, MD, October 10, 1989, pp. 553-557.
[9]
Irvine, C. E., Warren, D. F., and Clark, P. C., "The NPS CISR Graduate Program in INFOSEC Education: Six Years of Experience," 20th National Information Systems Security Conference, Baltimore, MD, October, 1997, pp. 22-30.
[10]
Irvine, C. E., Warren, D. F., and Stemp, R., "Teaching Introductory Computer Security at a Department of Defense University," Technical Report NPSCS-97- 002, Naval Postgraduate School, Monterey, CA, April 1997.
[11]
Marsh, R. T., "Critical Foundations: Protecting America's Infrastructure," President's Commission on Critical Infrastructure Protection, October 1997.
[12]
Spafford, E. H., "February 1997 Testimony before the United States House of Representatives' Subcommittee on Technology, Computer and Network Security," Available at http://www.house.gov/science/hearing.htm, {September 8, 2000}.
[13]
Spillman, R. J., "A Computer Security Course in the Undergraduate Computer Science Curriculum," Collegiate Microcomputer, Vol. 10, 1992, pp. 91-96.

Cited By

View all
  • (2024)Remote DasaLAB: datacenter as a laboratory for remote learningInteractive Learning Environments10.1080/10494820.2024.2309277(1-21)Online publication date: 31-Jan-2024
  • (2020)Integration and Evaluation of Spiral Theory based Cybersecurity Modules into core Computer Science and Engineering CoursesProceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366798(9-15)Online publication date: 26-Feb-2020
  • (2020)Investigation to Improve Timeliness and Quality of Assessment Feedback using a Custom Application2020 IEEE Global Engineering Education Conference (EDUCON)10.1109/EDUCON45650.2020.9125132(419-428)Online publication date: Apr-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCSE '01: Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
February 2001
456 pages
ISBN:1581133294
DOI:10.1145/364447
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCSE01
Sponsor:

Acceptance Rates

SIGCSE '01 Paper Acceptance Rate 78 of 225 submissions, 35%;
Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

Upcoming Conference

SIGCSE Virtual 2024
1st ACM Virtual Global Computing Education Conference
December 5 - 8, 2024
Virtual Event , NC , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)2
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Remote DasaLAB: datacenter as a laboratory for remote learningInteractive Learning Environments10.1080/10494820.2024.2309277(1-21)Online publication date: 31-Jan-2024
  • (2020)Integration and Evaluation of Spiral Theory based Cybersecurity Modules into core Computer Science and Engineering CoursesProceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366798(9-15)Online publication date: 26-Feb-2020
  • (2020)Investigation to Improve Timeliness and Quality of Assessment Feedback using a Custom Application2020 IEEE Global Engineering Education Conference (EDUCON)10.1109/EDUCON45650.2020.9125132(419-428)Online publication date: Apr-2020
  • (2020)Android-Based Mobile Apps for Hands-On EducationEncyclopedia of Education and Information Technologies10.1007/978-3-030-10576-1_243(52-65)Online publication date: 14-Jun-2020
  • (2019)Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines2019 IEEE International Conference on Engineering, Technology and Education (TALE)10.1109/TALE48000.2019.9225863(1-6)Online publication date: Dec-2019
  • (2019)Teaching Emerging DDoS Attacks on Firewalls: A Case Study of the BlackNurse Attack2019 IEEE Global Engineering Education Conference (EDUCON)10.1109/EDUCON.2019.8725133(977-985)Online publication date: Apr-2019
  • (2017)Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks2017 International Conference on Software Security and Assurance (ICSSA)10.1109/ICSSA.2017.19(94-99)Online publication date: Jul-2017
  • (2017)Android based mobile apps for information security hands-on educationEducation and Information Technologies10.1007/s10639-015-9439-822:1(125-144)Online publication date: 1-Jan-2017
  • (2016)Ethical Hacking in Information Security CurriculaInternational Journal of Information and Communication Technology Education10.4018/IJICTE.201601010112:1(1-10)Online publication date: 1-Jan-2016
  • (2016)A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic GenerationProceedings of the 17th Annual Conference on Information Technology Education10.1145/2978192.2978229(48-53)Online publication date: 28-Sep-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media