Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

The IWAR range: a laboratory for undergraduate information assurance education

Published: 20 April 2001 Publication History

Abstract

This paper describes a unique resource at West Point, the Information Analysis and Research Laboratory, referred to as the IWAR range. The IWAR range is an isolated laboratory used by undergraduate students and faculty researchers. The IWAR is a production-system-like, heterogeneous environment. The IWAR has become a vital part of the Information Assurance curriculum at West Point. We use the military range analogy to teach the students in the class that the exploits and other tools used in the laboratory are weapons and should be treated with the same care as rifles and grenades. This paper describes the structure of the laboratory and how it is used in classroom instruction. It also describes the process used to create the IWAR and how an IWAR might be built using limited resources. Finally, this paper describes the future directions of the IWAR project.

References

[1]
Robert R. Tomes, "Boon or Threat? The Information Revolution and U.S. National Security," Naval War College Review, vol. LIII, pp. 21-38, 2000.
[2]
Curtis A. Jr. Carver, "Information Warfare: Our Next Task Force Smith," Unpublished Research Paper. Fort Leavenworth: U.S. Army Command and General Staff College, 1997.
[3]
Terrill D. Maynard, "International Implications and the NIPC," in Proc. InfowarCon 99, Washington, September 6-9 1999.
[4]
Surdu, George, Global Directory of Information Systems, Technology, and Services, Ford Motor Company, personal conversation, October 2000.
[5]
Robert Turk and Shawn Hollingsworth, "Information Assurance: Army prepares for next generation of warfare," Army Communicator, vol. 25, pp. 34-35, 2000.
[6]
John Arquilla and Don Ronfeldt, "In Athena's Camp: Preparing for Conflict in the Information Age," Santa Monica: RAND, 1997.
[7]
Michael I. Handel, Masters of War: Classical Strategic Thought, Second Revised and Expanded ed. London: Frank Cass, 1996.
[8]
Richard M. Felder, "Reaching the Second Tier -- Learning and Teaching Styles in College Science Education," Journal of College Science Teaching, vol. 23, pp. 286-290, 1993.

Cited By

View all

Index Terms

  1. The IWAR range: a laboratory for undergraduate information assurance education

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Journal of Computing Sciences in Colleges
      Journal of Computing Sciences in Colleges  Volume 16, Issue 4
      2001
      366 pages
      ISSN:1937-4771
      EISSN:1937-4763
      • Editor:
      • John G. Meinke
      Issue’s Table of Contents

      Publisher

      Consortium for Computing Sciences in Colleges

      Evansville, IN, United States

      Publication History

      Published: 20 April 2001
      Published in JCSC Volume 16, Issue 4

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)LUCIDACM Inroads10.1145/27464086:2(70-76)Online publication date: 29-May-2015
      • (2008)Building a network testbed for internet security researchJournal of Computing Sciences in Colleges10.5555/1352079.135209323:4(73-79)Online publication date: 1-Apr-2008
      • (2008)SEEDJournal on Educational Resources in Computing (JERIC)10.1145/1348713.13487168:1(1-24)Online publication date: 1-Mar-2008
      • (2005)Technology Education at the US Military AcademyIEEE Security and Privacy10.1109/MSP.2005.523:2(49-53)Online publication date: 1-Mar-2005
      • (2004)Embedding information security curricula in existing programmesProceedings of the 1st annual conference on Information security curriculum development10.1145/1059524.1059529(20-29)Online publication date: 8-Oct-2004
      • (2002)Building a cyberwar lab: lessons learnedACM SIGCSE Bulletin10.1145/563517.56334934:1(23-27)Online publication date: 27-Feb-2002
      • (2002)Building a cyberwar lab: lessons learnedProceedings of the 33rd SIGCSE technical symposium on Computer science education10.1145/563340.563349(23-27)Online publication date: 27-Feb-2002

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media