{"title":"利用学生蓝队训练网络防御和保护信息资产","authors":"Scott J. Pack, D. Rowe","doi":"10.1145/2512276.2512290","DOIUrl":null,"url":null,"abstract":"In this paper, we discuss the creation of a student Blue Team to assist campus organizations with security incident response. We also explore approaches for establishing a relationship with university information technology staff, informing blue team members of professional and ethical responsibilities, and aiding system administrators with incident response and system hardening. Finally, we discuss the benefits to students taking part in these activities, as well as their contributions to improving an organizations security posture.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Training cyber-defense and securing information assets using student blue teams\",\"authors\":\"Scott J. Pack, D. Rowe\",\"doi\":\"10.1145/2512276.2512290\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we discuss the creation of a student Blue Team to assist campus organizations with security incident response. We also explore approaches for establishing a relationship with university information technology staff, informing blue team members of professional and ethical responsibilities, and aiding system administrators with incident response and system hardening. Finally, we discuss the benefits to students taking part in these activities, as well as their contributions to improving an organizations security posture.\",\"PeriodicalId\":404291,\"journal\":{\"name\":\"Proceedings of the 14th annual ACM SIGITE conference on Information technology education\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 14th annual ACM SIGITE conference on Information technology education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2512276.2512290\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2512276.2512290","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Training cyber-defense and securing information assets using student blue teams
In this paper, we discuss the creation of a student Blue Team to assist campus organizations with security incident response. We also explore approaches for establishing a relationship with university information technology staff, informing blue team members of professional and ethical responsibilities, and aiding system administrators with incident response and system hardening. Finally, we discuss the benefits to students taking part in these activities, as well as their contributions to improving an organizations security posture.