Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1227310.1227474acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

SEED: a suite of instructional laboratories for computer SEcurity EDucation

Published: 07 March 2007 Publication History

Abstract

To provide students with hands-on exercises in computer security education, we have developed a laboratory environment (SEED) for computer security education. It is based on VMware, Minix, and linux, all of which are free for educational uses. Based on this environment, we have developed ten labs, covering a wide range of security principles. We have used these labs in our three courses in the last four years. This paper presents our SEED lab environment, SEED labs, and our evaluation results.

References

[1]
A. W. Appel and J. Palsberg. Modern Compiler Implentation in Java. Number 0-521-82060-X. Cambridge University Press, 2nd edition, 2002.]]
[2]
W. A. Christopher, S. J. Procter, and T. E. Anderson. The Nachos instructional operating syst. In Proceedings of the Winter 1993 USENIX Conference, pages 481--489, San Diego, CA, January, 25-29 1993.]]
[3]
D. Comer. Operating Syst Design: the XINU Approach. Prentice Hall, 1984.]]
[4]
P. J. Denning. Great principles of computing. Communications of the ACM, 46(11):15--20, 2003.]]
[5]
J. M. D. Hill, C. A. Carver, Jr., J. W. Humphries, and U. W. Pooch. Using an isolated network laboratory to teach advanced networks and security. In Proc. of the 32nd SIGCSE Technical Symposium on Computer Science Education, Charlotte, NC, Feb. 2001.]]
[6]
C. E. Irvine, T. E. Levin, T. D. Nguyen, and G. W. Dinolt. The trusted computing explar project. In Proc. of the 2004 IEEE Systs Man and Cybernetics Information Assurance Workshop, June 2004.]]
[7]
D. Kolb. Experiential learning: Experience as the source of learning and development. Prentice Hall, Englewood Cliffs, NJ, 1984.]]
[8]
W. G. Mitchener and A. Vahdat. A chat room assignment for teaching network security. In Proc. of the 32nd SIGCSE technical symposium on Computer Science Education, Charlotte, NC, 2001.]]
[9]
A. S. Tanenbaum and A. S. Woodhull. Operating Systs Design and Implentation. Prentice Hall, 2nd edition, 1997.]]

Cited By

View all
  • (2014)CS++Proceedings of the 2014 ACM Southeast Conference10.1145/2638404.2638486(1-7)Online publication date: 28-Mar-2014
  • (2013)Two models of a cryptography and computer security class in a liberal arts contextProceeding of the 44th ACM technical symposium on Computer science education10.1145/2445196.2445360(543-548)Online publication date: 6-Mar-2013
  • (2010)Designing and implementing an undergraduate program in information systems securityEducation and Information Technologies10.1007/s10639-010-9123-y15:4(293-315)Online publication date: 1-Dec-2010
  • Show More Cited By

Index Terms

  1. SEED: a suite of instructional laboratories for computer SEcurity EDucation

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCSE '07: Proceedings of the 38th SIGCSE technical symposium on Computer science education
    March 2007
    634 pages
    ISBN:1595933611
    DOI:10.1145/1227310
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 March 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. instructional operating system
    2. laboratory
    3. security

    Qualifiers

    • Article

    Conference

    SIGCSE07
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

    Upcoming Conference

    SIGCSE Virtual 2024
    1st ACM Virtual Global Computing Education Conference
    December 5 - 8, 2024
    Virtual Event , NC , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)CS++Proceedings of the 2014 ACM Southeast Conference10.1145/2638404.2638486(1-7)Online publication date: 28-Mar-2014
    • (2013)Two models of a cryptography and computer security class in a liberal arts contextProceeding of the 44th ACM technical symposium on Computer science education10.1145/2445196.2445360(543-548)Online publication date: 6-Mar-2013
    • (2010)Designing and implementing an undergraduate program in information systems securityEducation and Information Technologies10.1007/s10639-010-9123-y15:4(293-315)Online publication date: 1-Dec-2010
    • (2009)Xen worldsACM SIGCSE Bulletin10.1145/1595496.156296741:3(293-297)Online publication date: 6-Jul-2009
    • (2009)Xen worldsProceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education10.1145/1562877.1562967(293-297)Online publication date: 6-Jul-2009

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media