Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Using an isolated network laboratory to teach advanced networks and security

Published: 01 February 2001 Publication History

Abstract

This paper discusses the use of an isolated network laboratory to teach computer security using persistent cooperative groups and an active learning approach. Computer security and computer security education are areas of increasing importance as computer systems become more interconnected. When offered, undergraduate and graduate computer security courses are routinely taught using a traditional lecture format. If the course includes a class project, the class project is limited in scope and constitutes a relatively small portion of the student's grade. This paper examines a different approach in which the class project is the dominant factor in the student's grade. The students work in persistent cooperative teams as either a black or gold team. Black teams attempt to break into other black team computers or attack the gold team. The gold team operates Windows NT, LINUX, and Solaris-based servers and attempts to defend their servers and role-play system administrators. The entire exercise takes place in an isolated lab so as to separate student class activities from the rest of the departmental intranet. Four years of experience running the class with this format suggests that the use of persistent cooperative groups and active learning are effective approaches for teaching network security and are preferred over a lecture-based course.

References

[1]
Barnett, S., "Computer Security Training and Education: A Needs Analysis," IEEE Symposium on Security and Privacy, Los Alarnitos, CA, May 6-8, 1996, pp. 26-27.
[2]
Bishop, M., "Computer Security in Introductory Programming Classes," Workshop on Education in Computer Security, Monterey, CA, January 29-31, 1997, pp. 1-2.
[3]
Bishop, M., "The State of INFOSEC Education in Academia: Present and Future Directions," Information Systems Security Education Colloquium, Maryland, April 23-24, 1997, pp. 19-33.
[4]
Bishop, M. and Heberlein, L. T., "An Isolated Network for Research," 19th National Information Systems Security Conference, Baltimore, MD, October 22-25, 1996, pp. 349-360.
[5]
Chin, S.-K., Irvine, C. E., and Frinke, D., "An Information Security Education Initiative for Engineering and Computer Science," Technical Report NPSCS-97-003,Naval Postgraduate School, Monterey, CA, December 1997.
[6]
Clark, D. D., Computers at Risk: Safe Computing in the Information Age, Washington, DC: National Academy Press, 1991.
[7]
Clinton, W., "Executive Order 13010 - Critical Infrastructure Protection," Available at http://www.ciao.gov/PCCIP/PCCIP_index.htm, {September 5, 2000}.
[8]
Higgins, J., "Information Security as a Topic in Undergraduate Education of Computer Scientists," Twelfth National computer Security Conference, Baltimore, MD, October 10, 1989, pp. 553-557.
[9]
Irvine, C. E., Warren, D. F., and Clark, P. C., "The NPS CISR Graduate Program in INFOSEC Education: Six Years of Experience," 20th National Information Systems Security Conference, Baltimore, MD, October, 1997, pp. 22-30.
[10]
Irvine, C. E., Warren, D. F., and Stemp, R., "Teaching Introductory Computer Security at a Department of Defense University," Technical Report NPSCS-97- 002, Naval Postgraduate School, Monterey, CA, April 1997.
[11]
Marsh, R. T., "Critical Foundations: Protecting America's Infrastructure," President's Commission on Critical Infrastructure Protection, October 1997.
[12]
Spafford, E. H., "February 1997 Testimony before the United States House of Representatives' Subcommittee on Technology, Computer and Network Security," Available at http://www.house.gov/science/hearing.htm, {September 8, 2000}.
[13]
Spillman, R. J., "A Computer Security Course in the Undergraduate Computer Science Curriculum," Collegiate Microcomputer, Vol. 10, 1992, pp. 91-96.

Cited By

View all
  • (2022)Teaching Offensive Lab SkillsResearch Anthology on Advancements in Cybersecurity Education10.4018/978-1-6684-3554-0.ch012(273-287)Online publication date: 2022
  • (2021)Revising Computer Science Networking Hands-On Courses in the Context of the Future InternetIEEE Transactions on Education10.1109/TE.2020.301567364:2(133-138)Online publication date: May-2021
  • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 33, Issue 1
March 2001
432 pages
ISSN:0097-8418
DOI:10.1145/366413
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCSE '01: Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
    February 2001
    456 pages
    ISBN:1581133294
    DOI:10.1145/364447
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 2001
Published in SIGCSE Volume 33, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)2
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Teaching Offensive Lab SkillsResearch Anthology on Advancements in Cybersecurity Education10.4018/978-1-6684-3554-0.ch012(273-287)Online publication date: 2022
  • (2021)Revising Computer Science Networking Hands-On Courses in the Context of the Future InternetIEEE Transactions on Education10.1109/TE.2020.301567364:2(133-138)Online publication date: May-2021
  • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
  • (2020)Teaching Offensive Lab SkillsHandbook of Research on Diverse Teaching Strategies for the Technology-Rich Classroom10.4018/978-1-7998-0238-9.ch011(138-152)Online publication date: 2020
  • (2020)Teacher Perceptions of Equity in High School Computer Science ClassroomsACM Transactions on Computing Education10.1145/341063320:3(1-27)Online publication date: 28-Aug-2020
  • (2020)A Recursive Algebraic Coloring Technique for Hardware-efficient Symmetric Sparse Matrix-vector MultiplicationACM Transactions on Parallel Computing10.1145/33997327:3(1-37)Online publication date: 29-Jun-2020
  • (2020)SketchADoodle: Touch-surface Multi-stroke Gesture Handling by Bézier CurvesProceedings of the ACM on Human-Computer Interaction10.1145/33978754:EICS(1-30)Online publication date: 18-Jun-2020
  • (2020)Model-based Testing of Interactive Systems using Interaction SequencesProceedings of the ACM on Human-Computer Interaction10.1145/33978734:EICS(1-37)Online publication date: 18-Jun-2020
  • (2020)Methods in Teaching Computer NetworksACM Transactions on Computing Education10.1145/339496320:3(1-35)Online publication date: 16-Jun-2020
  • (2020)A Deep Learning Architecture for Psychometric Natural Language ProcessingACM Transactions on Information Systems10.1145/336521138:1(1-29)Online publication date: 5-Feb-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media