Teaching Computer Security with a Hands-On Component

Conference object English OPEN
Murthy, Narayan;
(2011)
  • Publisher: Springer
  • Related identifiers: doi: 10.1007/978-3-642-39377-8_23
  • Subject: [INFO]Computer Science [cs] | [ INFO ] Computer Science [cs]
    acm: ComputingMilieux_COMPUTERSANDEDUCATION

Part 2: WISE 7; International audience; To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. Our department has introduced computer security courses ... View more
  • References (9)

    1. Boleng, Jeff, and Dino Schweitzer. “A Hands-on Approach to Information Operations Education and Training.” 14th Colloquium for Information Systems Security Education. Baltimore, MD. 7-9 June 2010.

    2. Centers of Academic Excellence-Institutions. National Security Agency, http://www.nsa.gov/ia/academic_outreach/nat_cae/institutions.shtml. (3 Feb. 2011.)

    3. Chen, Li-Chiou, and Chienting Lin. “Combining Theory with Practice in Information Security Education.” 11th Colloquium for Information Systems Security Education, Boston University. Boston, MA. 4-7 June 2007.

    4. Lin, Chienting, and Li-Chiou Chen. “Development of an Interdisciplinary Information Technology Auditing Program.” 13th Colloquium for Information Systems Security Education. Seattle, WA. 1-3 June 2009.

    5. National Centers of Academic Excellence. National Security Agency, http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml. (3 Feb. 2011).

    6. Riabov, Vladimir V., and Bryan J. Higgs. “Running a Computer Security Course: Challenges, Tools and Projects.” River Academic Journal 6.1 (2010).

    7. Sharma, Sushil K., and Joshua Sefchek. “Teaching Information Systems Security Courses: A Hands-On Approach.” Computers & Security 26 (2007): 290-99.

    8. Trend Micro Threat Predictions for 2011. http://affinitypartner.trendmicro.com/announcements/trend-micro-threatpredictions-for-2011.aspx (3 Feb. 2011).

    9. Verizon Business. Anatomy of a Data Breach, http://www.govinfosecurity.com/external/rp_2009-data-breach-investigationssupplemental-report_en_xg.pdf (3 Feb. 2011).

  • Metrics
Share - Bookmark