Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/971300.971438acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

Designing and implementing a cyberwar laboratory exercise for a computer security course

Published: 01 March 2004 Publication History

Abstract

The development of a cyberwar laboratory exercise for a computer security course raises many pedagogical and management issues relating to the structure of the laboratory, its network and the exercise itself. We have designed, implemented and given such an exercise, and faced many of these issues. Evaluation of this exercise leads to multiple insights about the proper goals, structure and implementation of such an exercise.

References

[1]
Hill, John, Carver, Curtis, Humphries, Jeffrey and Pooch, Udo, Using an Isolated Laboratory to Teach Advanced Networks and Security; SIGCSE Bulletin: Proc. 32nd Technical Symposium on Computer Science Education, v.33, n.1, March 2001, pp. 36--40.
[2]
Jackson, William, Cadets Keep NSA Crackers At Bay; Government Computer News, May 20, 2002.
[3]
Mateti, Prabhaker, A Laboratory-Based Course on Internet Security; SIGCSE Bulletin: Proc. 34th Technical Symposium on Computer Science Education, v.35, n.1, March 2003, pp. 252--256.
[4]
Micco, Mary and Rossman, Hart, Building a Cyberwar Lab: Lessons Learned; SIGCSE Bulletin: Proc. 33rd Technical Symposium on Computer Science Education, v.34, n.1, March 2002, pp. 23--27.
[5]
Norton Ghost, http://www.symantec.com/ghost
[6]
Redhat Linux, http://www.redhat.com/
[7]
Redhat Network up2date Network Automatic Upgrade System, http://rhn.redhat.com/
[8]
Schneier, Bruce, Security is not a Product; It's a Process; Cryptogram Online Security Newsletter, http://www.schneier.com/crypto-gram-9912.html#SecurityIsNotaProductItsaProcess, December 1999.
[9]
VMWare, http://www.vmware.com

Cited By

View all

Index Terms

  1. Designing and implementing a cyberwar laboratory exercise for a computer security course

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on Computer science education
    March 2004
    544 pages
    ISBN:1581137982
    DOI:10.1145/971300
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 March 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cybersecurity
    2. cyberwar
    3. exercise
    4. laboratory
    5. security

    Qualifiers

    • Article

    Conference

    SIGCSE04
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

    Upcoming Conference

    SIGCSE Virtual 2024
    1st ACM Virtual Global Computing Education Conference
    December 5 - 8, 2024
    Virtual Event , NC , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 26 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Evaluating Augmented Reality for Wireless Network Security Education2021 IEEE Frontiers in Education Conference (FIE)10.1109/FIE49875.2021.9637216(1-9)Online publication date: 13-Oct-2021
    • (2020)Power consumption management under a low-level performance constraint in the Xen hypervisorACM SIGBED Review10.1145/3412821.341282817:1(42-48)Online publication date: 27-Jul-2020
    • (2020)Energy scheduling for task execution on intermittently-powered devicesACM SIGBED Review10.1145/3412821.341282717:1(36-41)Online publication date: 27-Jul-2020
    • (2020)Enabling transparent hardware acceleration on Zynq SoC for scientific computingACM SIGBED Review10.1145/3412821.341282617:1(30-35)Online publication date: 27-Jul-2020
    • (2020)Accessible web devACM SIGACCESS Accessibility and Computing10.1145/3386402.3386404(1-1)Online publication date: 3-Mar-2020
    • (2020)An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW51379.2020.00016(56-65)Online publication date: Sep-2020
    • (2020)Teaching Network Covert Channels using a Hands-on Approach2020 IEEE Global Engineering Education Conference (EDUCON)10.1109/EDUCON45650.2020.9125094(323-328)Online publication date: Apr-2020
    • (2019)Inferring Online Social Ties from Offline Geographical ActivitiesACM Transactions on Intelligent Systems and Technology10.1145/329331910:2(1-21)Online publication date: 12-Jan-2019
    • (2019)Reconstruction of Hidden Representation for Robust Feature ExtractionACM Transactions on Intelligent Systems and Technology10.1145/328417410:2(1-24)Online publication date: 12-Jan-2019
    • (2016)Hands-on computer security with a Raspberry PiJournal of Computing Sciences in Colleges10.5555/2904446.290444731:6(4-10)Online publication date: 1-Jun-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media