Proceedings of the 2014 Information Security Curriculum Development Conference最新文献

筛选
英文 中文
Enhance learning through developing network security hands-on lab for online students 通过为在线学生开发网络安全实践实验室来加强学习
Proceedings of the 2014 Information Security Curriculum Development Conference Pub Date : 2014-10-11 DOI: 10.1145/2670739.2670753
Jianhua Yang, Thomas Reddington
{"title":"Enhance learning through developing network security hands-on lab for online students","authors":"Jianhua Yang, Thomas Reddington","doi":"10.1145/2670739.2670753","DOIUrl":"https://doi.org/10.1145/2670739.2670753","url":null,"abstract":"Our teaching experience tells us that hands-on exercises play a key role in terms of enhancing student learning capabilities, especially when connecting to theories covered in class. In this paper, we describe the challenges faced on graduate level designing hands-on labs of computer network security for online students, and briefly present the contents needed to cover in computer network security course. To meet these challenges, we designed eight hands-on labs to connect our online students from class theory to real-world exercise.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the 2014 Information Security Curriculum Development Conference 2014年信息安全课程发展会议论文集
M. Whitman, Humayun Zafar
{"title":"Proceedings of the 2014 Information Security Curriculum Development Conference","authors":"M. Whitman, Humayun Zafar","doi":"10.1145/2670739","DOIUrl":"https://doi.org/10.1145/2670739","url":null,"abstract":"","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Laboratory projects for embedded and control systems security 用于嵌入式和控制系统安全的实验室项目
Proceedings of the 2014 Information Security Curriculum Development Conference Pub Date : 2014-10-11 DOI: 10.1145/2670739.2670754
Guillermo A. Francia, J. Snellen
{"title":"Laboratory projects for embedded and control systems security","authors":"Guillermo A. Francia, J. Snellen","doi":"10.1145/2670739.2670754","DOIUrl":"https://doi.org/10.1145/2670739.2670754","url":null,"abstract":"The ever-increasing trend of our nation's critical infrastructures (CIs) being connected to the Internet ushered the need for a more sophisticated cyber defense mechanism and better educated future workforce. Recognizing this need, we designed and developed an undergraduate embedded and control systems security curriculum that emphasizes a balance between theory and application. To that end, we present hands-on laboratory projects that are envisioned to stimulate learning and motivate critical thinking among students in this area of national need.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124157613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning cloud computing and security through CloudSim simulation 通过CloudSim模拟学习云计算和安全
Proceedings of the 2014 Information Security Curriculum Development Conference Pub Date : 2014-10-11 DOI: 10.1145/2670739.2670747
Ming-jyuan Yang, Rebecca H. Rutherfoord, K. Qian
{"title":"Learning cloud computing and security through CloudSim simulation","authors":"Ming-jyuan Yang, Rebecca H. Rutherfoord, K. Qian","doi":"10.1145/2670739.2670747","DOIUrl":"https://doi.org/10.1145/2670739.2670747","url":null,"abstract":"Cloud computing is an emerging parallel and distributed service-oriented computing paradigm that provides platform service, software service, and infrastructure service through computing resource virtualization. Cloud computing is fast evolving and growing and is rapidly transforming the IT service industry. Many universities are offering or planning to offer cloud computing courses to meet the growing demand for cloud computing professionals. Some of them focus on big data processing programming using MapReduce with service charges from public cloud service, while many others teach cloud computing as a seminar type class without any hands-on lab exercises. A hands-on labware will be a big plus for teaching and learning cloud computing. This paper proposes a cloud computing labware with the open source CloudSim (Cloud modeling and simulation toolkit) and its extension projects to enhance computer science and information technology student learning. The proposed labware will support learning not only on MapReduce programming model but also on important topics including cloud principles, concepts, architecture, loadbalancing, and task scheduling. The proposed labware has been implemented in a cross-listed course (as both an undergraduate course and a graduate course) in two sections (hybrid section and fully-online section). Survey results show that participating students highly appreciate the proposed labware in promoting their interest and academic progress in studying Cloud computing/security.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Importance of governance with human resources information systems 人力资源信息系统治理的重要性
Proceedings of the 2014 Information Security Curriculum Development Conference Pub Date : 2014-10-11 DOI: 10.1145/2670739.2670744
K. Moyle
{"title":"Importance of governance with human resources information systems","authors":"K. Moyle","doi":"10.1145/2670739.2670744","DOIUrl":"https://doi.org/10.1145/2670739.2670744","url":null,"abstract":"Information Security Governance is a foundational element that contributes to an organization's success and is foundational in the strategic business objectives. This paper examines the importance of the evolution of Human Resources Information Systems in the direction of an organization's Information Security Governance strategic plan.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123605064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teaching privacy in an interactive fashion 以互动的方式教授隐私
Proceedings of the 2014 Information Security Curriculum Development Conference Pub Date : 2014-10-11 DOI: 10.1145/2670739.2670751
Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar
{"title":"Teaching privacy in an interactive fashion","authors":"Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar","doi":"10.1145/2670739.2670751","DOIUrl":"https://doi.org/10.1145/2670739.2670751","url":null,"abstract":"With the ever increasing role technology and the Internet plays in the daily lives of humans, it is important for us as educators to bring awareness to and improve understanding of digital privacy topics. In the case of privacy, it is especially important to develop pedagogical material that can be used by all domains of higher education -- even those who traditionally do not cover topics related to technology or privacy. Given its multidimensional aspects and broad coverage, privacy is a complex subject to study, and especially difficult for students to master using the standard pedagogical techniques. In this paper, we propose the use of an interactive approach to teaching privacy. The primary tools used are that of case studies and gaming scenarios. We propose the development of a suite of case studies and scenarios that teach foundational privacy topics to students. The case studies should be designed to present privacy concepts in a manner that makes them accessible to a variety of disciplines of study while still lecturing on the core privacy topics. We believe this method will achieve a high level of success in raising awareness of these important issues and promoting safe and secure use of technology in society.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using contingency planning model to mitigate the impact of the inevitable disaster at the class level 运用应急计划模型,在班级层面上减轻不可避免的灾难的影响
Proceedings of the 2014 Information Security Curriculum Development Conference Pub Date : 2014-10-11 DOI: 10.1145/2670739.2670748
R. Reid, S. Lambert
{"title":"Using contingency planning model to mitigate the impact of the inevitable disaster at the class level","authors":"R. Reid, S. Lambert","doi":"10.1145/2670739.2670748","DOIUrl":"https://doi.org/10.1145/2670739.2670748","url":null,"abstract":"This paper discusses the need to establish a contingency plan at the university class level to mitigate the impacts of a disaster. It places the class room plan in context of the contingency plans of higher organizational units. It related the authors' experience with multiple natural disasters and how those experiences can be used to establish a contingency plan that is appropriate to the reader's environment.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure key management in cloud computing 云计算中的安全密钥管理
Proceedings of the 2014 Information Security Curriculum Development Conference Pub Date : 2014-10-11 DOI: 10.1145/2670739.2670745
Maurice Martin, Wasim Alhamdani
{"title":"Secure key management in cloud computing","authors":"Maurice Martin, Wasim Alhamdani","doi":"10.1145/2670739.2670745","DOIUrl":"https://doi.org/10.1145/2670739.2670745","url":null,"abstract":"In this paper, we will discuss Secure Key Management in Cloud Computing. We discuss the basics of what a key is to how it is used in cloud computing. This paper looks at the types and states of a key. It is then followed by the cloud computing model and the overview of Secure Key Management. Data needs to be in plain text or decrypted for processing, and that requires access to the encryption key. In cloud environments, the data owner will often store the key in the cloud alongside the encrypted data for easy access. This practice creates a sizable security risk, since anybody with access to that particular cloud server can also access the encryption keys. Due to this we look at the weakness of Secure Key Management and the strategies used to contest those weaknesses.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信