Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2591708.2591741acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

Empowering faculty to embed security topics into computer science courses

Published: 21 June 2014 Publication History

Abstract

Security illiteracy is a very common problem among Computer Science (CS) graduates entering the nation's digital workforce, which has contributed to a national cyber-infrastructure that could and should be more resilient to cyber-enemies than it is now. The Security Knitting Kit (SecKnitKit) project aims to improve security awareness, knowledge, and interest of undergraduate CS students by exposing them to computer security concepts and issues in their regular course of study. The project is developing, deploying, and disseminating a multi-faceted out-of-the-box instructional support system to empower non-security faculty. These are faculty who have no experience in teaching security but recognize the importance of security in today's world and want to broaden their teaching repertoire. This project enables them to weave relevant security topics traditional computer science courses seamlessly and effectively. The project is organized by the CS department at Tennessee Tech University (TTU) and supported by the National Science Foundation under grant DUE-1140864.

References

[1]
ACM/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013. ACM Press and IEEE Computer Society Press. http://ai.stanford.edu/users/sahami/CS2013/final-draft/CS2013-final-report.pdf
[2]
Bransford, J. D., Brown, A. L. and Cocking, R. R. How People Learn: Brain, Mind, Experience, and School. National Academy Press, Washington, D.C., 1999.
[3]
Computer Security Institute. The 14th Annual CSI Computer Crime and Security Survey Report. Retrieved September 3, 2013 from http://gocsi.com/survey_2009.
[4]
Irvine, C., Chin, S. and Frincke, D. Integrating Security into the Curriculum. IEEE Computer, 31(12). pp. 25--30.
[5]
Irvine, C.E., Challenges in Computer Security Education. IEEE Software, Sept./Oct. 1997, pp. 110--111. Retrieved September 3, 2013 from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA484034&Location=U2&doc=GetTRDoc.pdf.
[6]
Markham, S.A., Expanding Security Awareness in Introductory Computer Science Courses. in Proceedings: Information Security Curriculum Development Conference, (Kennesaw, GA, 2009).
[7]
Mullins, P., Wynters, E., Wolfe, J., Calhoun, W., Oblitey, W., Fry, M. and Montante, R., Panel on Integrating Security Concepts into Existing Computer Courses. in Proceedings of SIGCSE 2002, (Covington, KN, 2002), ACM, pp. 365--366.
[8]
National Security Agency and Central Security Service. 2012. National Centers of Academic Excellence in IA Education (CAE/IAE) Criteria for Measurement. Retrieved September 3, 2013 from http://www.nsa.gov/ia/academic_outreach/nat_cae/ cae_iae_program_criteria.shtml
[9]
National Security Agency and Central Security Service. 2013. National Centers of Academic Excellence. Retrieved September 3, 2013 from http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml.
[10]
Null, L. Integrating Security Across the Computer Science Curriculum. Journal of Computing Sciences in Colleges, 19(5). pp. 170--178.
[11]
Perrone, L. F., Aburdene, M. and Meng, X., Approaches to Undergraduate Instruction in Computer Security. in Proceedings of the American Society for Engineering Educational Annual Conference and Exhibition, (2005), ASEE. Retrieved September 3, 2013 from http://www.ists.dartmouth.edu/library/116.pdf.
[12]
Roberts, B., Cress, D. and Simmons, J. Towards a Security-Aware Undergraduate Computer Science Curriculum at UMBC. Retrieved September 3, 2013 from http://www.csee.umbc.edu/~cress1/ia/341-stuff/Questions-341-profs.doc
[13]
Taylor, B., Kaza, S., Security Injections: Modules to Help Students Remember, Understand, and Apply Secure Coding Techniques. in Proceedings of the 16th Annual Conference on Innovation and Technology in Computer Science, (Darmstadt, Germany, 2011).
[14]
Towson University. Security Injections. Retrieved September 3, 2013 from http://cis1.towson.edu/~cssecinj/.
[15]
Towson University. Security Injections Workshop -- January 2010. Retrieved September 3, 2013 from
[16]
Vaughn, R., Application of Security to the Computing Science Classroom. in Proceedings of the 31st SIGCSE Technical Symposium, (Austin, TX, 2000), ACM, pp. 90--94.
[17]
White, G. and Nordstrom, G., Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles. in Proceedings of the 19th National Information Systems Security Conference, (Baltimore, MD, 1996), pp. 483--488.
[18]
Yang, T. Computer Security and Impact on Computer Education. Journal of Computing in Small Colleges, 16(4). pp. 233--246.

Cited By

View all
  • (2023)"Security is not my field, I'm a stats guy"Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620448(3763-3780)Online publication date: 9-Aug-2023
  • (2022)Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security ClassProceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 110.1145/3502718.3524806(470-476)Online publication date: 7-Jul-2022
  • (2018)CReST-Security Knitting KitProceedings of the 49th ACM Technical Symposium on Computer Science Education10.1145/3159450.3162355(1058-1058)Online publication date: 21-Feb-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ITiCSE '14: Proceedings of the 2014 conference on Innovation & technology in computer science education
June 2014
378 pages
ISBN:9781450328333
DOI:10.1145/2591708
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. acm/ieee-cs 2013 curricula
  2. security
  3. security education

Qualifiers

  • Research-article

Conference

ITICSE '14
Sponsor:

Acceptance Rates

ITiCSE '14 Paper Acceptance Rate 36 of 164 submissions, 22%;
Overall Acceptance Rate 552 of 1,613 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)"Security is not my field, I'm a stats guy"Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620448(3763-3780)Online publication date: 9-Aug-2023
  • (2022)Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security ClassProceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 110.1145/3502718.3524806(470-476)Online publication date: 7-Jul-2022
  • (2018)CReST-Security Knitting KitProceedings of the 49th ACM Technical Symposium on Computer Science Education10.1145/3159450.3162355(1058-1058)Online publication date: 21-Feb-2018
  • (2016)Hands-on exercises about DNS attacksJournal of Computing Sciences in Colleges10.5555/3007225.300725132:1(117-125)Online publication date: 1-Oct-2016
  • (2016)Hands-on computer security with a Raspberry PiJournal of Computing Sciences in Colleges10.5555/2904446.290444731:6(4-10)Online publication date: 1-Jun-2016
  • (2016)Mobile authentication for software engineering: A case study of research and development student projects2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)10.1109/TALE.2016.7851804(260-264)Online publication date: Dec-2016
  • (2015)Integrating security in the computer science curriculumACM Inroads10.1145/27664576:2(77-81)Online publication date: 29-May-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media