Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A laboratory-based course on internet security

Published: 11 January 2003 Publication History

Abstract

We developed a laboratory-based course on Internet Security. The course is aimed at the senior undergraduate. This paper discusses the course and explains how others can set up their own labs to teach this course. All the laboratory work is conducted in a laboratory of PCs running Linux. We developed lecture notes for the course, and a web site to widely disseminate these materials.

References

[1]
Garfinkel, S., and Spafford, G. Practical UNIX & Internet Security, second ed. O'Reilly & Associates, Inc., 1996.
[2]
Howard, J. D. An analysis of security incidents on the internet, 1989 - 1995. Ph. D. Thesis, Carnegie Mellon University, April 1997.
[3]
Mateti, P. CEG429: Internet Security Course website. www.cs.wright.edu/~pmateti/InternetSecurity (2002).
[4]
NCISSE. Sixth National Colloquium for Information Systems Security Education. www.ncisse.org, 2002.
[5]
Oblitey, W., Paul Mullins, Wolfe, J., Fry, M., Wynters, E., Calhoun, W., and Robert Montante. Integrating security concepts into existing computer courses. SIGCSE 2002 (2002).
[6]
Rubin, A. D. White-hat Security Arsenal. Addison Wesley Publishing Company, Inc., 2001.
[7]
Shirey, R. Internet Security glossary. Internet Request for Comment RFC 2828, Internet Engineering Task Force, May 2000.
[8]
Stallings, W. Cryptography and Network Security: Principles and Practice. Prentice Hall, 1998.
[9]
Sutton, S. Windows nt security guidelines. www.trustedsystems.com (1998).
[10]
Zimmerman, C. Hack attacks revealed - a history of famous hacks. SIGCSE 2002 Student Activities (2002).

Cited By

View all
  • (2023)Teaching Ethics in Computing: A Systematic Literature Review of ACM Computer Science Education PublicationsACM Transactions on Computing Education10.1145/363468524:1(1-36)Online publication date: 27-Nov-2023
  • (2021)Incorporating active learning activities to the design and development of an undergraduate software and web security courseJournal of Computers in Education10.1007/s40692-021-00194-9Online publication date: 16-Jun-2021
  • (2020)Integration and Evaluation of Spiral Theory based Cybersecurity Modules into core Computer Science and Engineering CoursesProceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366798(9-15)Online publication date: 26-Feb-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 35, Issue 1
January 2003
406 pages
ISSN:0097-8418
DOI:10.1145/792548
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCSE '03: Proceedings of the 34th SIGCSE technical symposium on Computer science education
    February 2003
    444 pages
    ISBN:158113648X
    DOI:10.1145/611892
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 January 2003
Published in SIGCSE Volume 35, Issue 1

Check for updates

Author Tags

  1. TCP/IP exploits
  2. buffer overflow
  3. ethics
  4. firewalls
  5. internet security
  6. network security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Teaching Ethics in Computing: A Systematic Literature Review of ACM Computer Science Education PublicationsACM Transactions on Computing Education10.1145/363468524:1(1-36)Online publication date: 27-Nov-2023
  • (2021)Incorporating active learning activities to the design and development of an undergraduate software and web security courseJournal of Computers in Education10.1007/s40692-021-00194-9Online publication date: 16-Jun-2021
  • (2020)Integration and Evaluation of Spiral Theory based Cybersecurity Modules into core Computer Science and Engineering CoursesProceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366798(9-15)Online publication date: 26-Feb-2020
  • (2013)A framework for teaching network security in academic environmentsInformation Management & Computer Security10.1108/IMCS-11-2011-005621:4(315-338)Online publication date: 7-Oct-2013
  • (2010)Using VMware VCenter lab manager in undergraduate education for system administration and network securityProceedings of the 2010 ACM conference on Information technology education10.1145/1867651.1867665(43-52)Online publication date: 7-Oct-2010
  • (2004)Maintaining ethical standards for a computer security curriculumProceedings of the 1st annual conference on Information security curriculum development10.1145/1059524.1059534(46-48)Online publication date: 8-Oct-2004
  • (2004)Teaching computer securityACM SIGCSE Bulletin10.1145/1024338.102437436:2(64-67)Online publication date: 1-Jun-2004
  • (2019)Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines2019 IEEE International Conference on Engineering, Technology and Education (TALE)10.1109/TALE48000.2019.9225863(1-6)Online publication date: Dec-2019
  • (2017)Demystifying ad fraud2017 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2017.8190714(1-5)Online publication date: Oct-2017
  • (2014)CS++Proceedings of the 2014 ACM Southeast Conference10.1145/2638404.2638486(1-7)Online publication date: 28-Mar-2014
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media