{"title":"Enhance learning through developing network security hands-on lab for online students","authors":"Jianhua Yang, Thomas Reddington","doi":"10.1145/2670739.2670753","DOIUrl":"https://doi.org/10.1145/2670739.2670753","url":null,"abstract":"Our teaching experience tells us that hands-on exercises play a key role in terms of enhancing student learning capabilities, especially when connecting to theories covered in class. In this paper, we describe the challenges faced on graduate level designing hands-on labs of computer network security for online students, and briefly present the contents needed to cover in computer network security course. To meet these challenges, we designed eight hands-on labs to connect our online students from class theory to real-world exercise.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2014 Information Security Curriculum Development Conference","authors":"M. Whitman, Humayun Zafar","doi":"10.1145/2670739","DOIUrl":"https://doi.org/10.1145/2670739","url":null,"abstract":"","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Laboratory projects for embedded and control systems security","authors":"Guillermo A. Francia, J. Snellen","doi":"10.1145/2670739.2670754","DOIUrl":"https://doi.org/10.1145/2670739.2670754","url":null,"abstract":"The ever-increasing trend of our nation's critical infrastructures (CIs) being connected to the Internet ushered the need for a more sophisticated cyber defense mechanism and better educated future workforce. Recognizing this need, we designed and developed an undergraduate embedded and control systems security curriculum that emphasizes a balance between theory and application. To that end, we present hands-on laboratory projects that are envisioned to stimulate learning and motivate critical thinking among students in this area of national need.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124157613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning cloud computing and security through CloudSim simulation","authors":"Ming-jyuan Yang, Rebecca H. Rutherfoord, K. Qian","doi":"10.1145/2670739.2670747","DOIUrl":"https://doi.org/10.1145/2670739.2670747","url":null,"abstract":"Cloud computing is an emerging parallel and distributed service-oriented computing paradigm that provides platform service, software service, and infrastructure service through computing resource virtualization. Cloud computing is fast evolving and growing and is rapidly transforming the IT service industry. Many universities are offering or planning to offer cloud computing courses to meet the growing demand for cloud computing professionals. Some of them focus on big data processing programming using MapReduce with service charges from public cloud service, while many others teach cloud computing as a seminar type class without any hands-on lab exercises. A hands-on labware will be a big plus for teaching and learning cloud computing. This paper proposes a cloud computing labware with the open source CloudSim (Cloud modeling and simulation toolkit) and its extension projects to enhance computer science and information technology student learning. The proposed labware will support learning not only on MapReduce programming model but also on important topics including cloud principles, concepts, architecture, loadbalancing, and task scheduling. The proposed labware has been implemented in a cross-listed course (as both an undergraduate course and a graduate course) in two sections (hybrid section and fully-online section). Survey results show that participating students highly appreciate the proposed labware in promoting their interest and academic progress in studying Cloud computing/security.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Importance of governance with human resources information systems","authors":"K. Moyle","doi":"10.1145/2670739.2670744","DOIUrl":"https://doi.org/10.1145/2670739.2670744","url":null,"abstract":"Information Security Governance is a foundational element that contributes to an organization's success and is foundational in the strategic business objectives. This paper examines the importance of the evolution of Human Resources Information Systems in the direction of an organization's Information Security Governance strategic plan.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123605064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar
{"title":"Teaching privacy in an interactive fashion","authors":"Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar","doi":"10.1145/2670739.2670751","DOIUrl":"https://doi.org/10.1145/2670739.2670751","url":null,"abstract":"With the ever increasing role technology and the Internet plays in the daily lives of humans, it is important for us as educators to bring awareness to and improve understanding of digital privacy topics. In the case of privacy, it is especially important to develop pedagogical material that can be used by all domains of higher education -- even those who traditionally do not cover topics related to technology or privacy. Given its multidimensional aspects and broad coverage, privacy is a complex subject to study, and especially difficult for students to master using the standard pedagogical techniques. In this paper, we propose the use of an interactive approach to teaching privacy. The primary tools used are that of case studies and gaming scenarios. We propose the development of a suite of case studies and scenarios that teach foundational privacy topics to students. The case studies should be designed to present privacy concepts in a manner that makes them accessible to a variety of disciplines of study while still lecturing on the core privacy topics. We believe this method will achieve a high level of success in raising awareness of these important issues and promoting safe and secure use of technology in society.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using contingency planning model to mitigate the impact of the inevitable disaster at the class level","authors":"R. Reid, S. Lambert","doi":"10.1145/2670739.2670748","DOIUrl":"https://doi.org/10.1145/2670739.2670748","url":null,"abstract":"This paper discusses the need to establish a contingency plan at the university class level to mitigate the impacts of a disaster. It places the class room plan in context of the contingency plans of higher organizational units. It related the authors' experience with multiple natural disasters and how those experiences can be used to establish a contingency plan that is appropriate to the reader's environment.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure key management in cloud computing","authors":"Maurice Martin, Wasim Alhamdani","doi":"10.1145/2670739.2670745","DOIUrl":"https://doi.org/10.1145/2670739.2670745","url":null,"abstract":"In this paper, we will discuss Secure Key Management in Cloud Computing. We discuss the basics of what a key is to how it is used in cloud computing. This paper looks at the types and states of a key. It is then followed by the cloud computing model and the overview of Secure Key Management. Data needs to be in plain text or decrypted for processing, and that requires access to the encryption key. In cloud environments, the data owner will often store the key in the cloud alongside the encrypted data for easy access. This practice creates a sizable security risk, since anybody with access to that particular cloud server can also access the encryption keys. Due to this we look at the weakness of Secure Key Management and the strategies used to contest those weaknesses.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}