{"title":"Integrate mobile devices into CS security education","authors":"H. Chi","doi":"10.1145/2885990.2885991","DOIUrl":null,"url":null,"abstract":"Mobile computing, popularized for social media, has emerged as a delivery vehicle of choice for commercial, medical and military applications. The ubiquity of wireless and satellite communication and the rapid evolution of powerful devices that exploit this infrastructure have pushed mobile application development, in many instances, ahead of the capabilities to ensure the secure and safe utilization of these applications. The gap between capabilities and the ability to safeguard information assets must not be ignored, given the documented rise in the number and sophistication of threats and the broadening vulnerabilities of mobile applications and systems worldwide. We are focusing on how to integrate mobile apps/devices into our cyber security courses. In addition, case studies and hands-on labs are discussed in our practice","PeriodicalId":236418,"journal":{"name":"Proceedings of the 2015 Information Security Curriculum Development Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2015 Information Security Curriculum Development Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2885990.2885991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Mobile computing, popularized for social media, has emerged as a delivery vehicle of choice for commercial, medical and military applications. The ubiquity of wireless and satellite communication and the rapid evolution of powerful devices that exploit this infrastructure have pushed mobile application development, in many instances, ahead of the capabilities to ensure the secure and safe utilization of these applications. The gap between capabilities and the ability to safeguard information assets must not be ignored, given the documented rise in the number and sophistication of threats and the broadening vulnerabilities of mobile applications and systems worldwide. We are focusing on how to integrate mobile apps/devices into our cyber security courses. In addition, case studies and hands-on labs are discussed in our practice