Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/330908.331822acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article
Free access

Application of security tot he computing science classroom

Published: 01 March 2000 Publication History

Abstract

The author of this paper was a practicing security professional for over ten years in government and industry before accepting a position in academia where he now teaches software engineering and computer security topics in graduate and undergraduate level programs. Lessons learned in the transition are presented along with some insights with respect to the depth and breath that today's computer science student is exposed to with respect to INFOSEC topics. A recommendation for incorporating computer security training into modern day computer science programs is provided

References

[1]
Abrams, M.D., Jojodia, S., and Podell, H.J. (editors) (1995). Information Security. An Integrated Collection of Essays. IEEE Computer Society Press.
[2]
Anderson, J.P. (1973) Computer Security Technology Planning Study. ESD-TR-73-51, vol 1. Hanscom AFB, Mass
[3]
Bell, D.E. and LaPadula, L.J. (1975) Secure Computer Systems: Unified Exposition and Multics Interpretation. MTR-2997, MITRE Corp.
[4]
Commission of the European Communities. (1991) Information Technology Security Evaluation Criteria (ITSEC), Provisional Harmonized Criteria: version 1.2. Office for Official Publications of the European Communities. Luxembourg.
[5]
Congress, US. (1988). Computer Security Act of 1987, PL 100-235.
[6]
Denning, D. (1982). Cryptography and Data Security. Addison Wesley.
[7]
Denning, D. (1999). Information Warfare and Security, Addison Wesley.
[8]
Dimitrov, R. & Gleeson, M (1998). Challenges and New Technologies for Addressing Security in High Performance Distributed Environments. Proceedings of the 21st National Information Systems Security Conference 457-468.
[9]
DOD 5200.28-STD. (1985) DoD Trusted Computer System Evaluation Criteria.
[10]
Gasser, M. (1988). Building a Secure Computer System. Van Nostrand Reinhold.
[11]
lrvine, C.E., Warren, D.F., and Clark, P.C. (1997) The NPS CIPR Graduate Program in INFOSEC: Six Years of Experience. 20 th National Information Systems Security Conference (Baltimore, MD). 22-30.
[12]
Irvine,C.E., Chin, S., & Frincke, D. (1998), "Integrating Security into the Curriculum", IEEE Computer, December 98, 25-30.
[13]
Johnson, Deborah G. (1994). Computer Ethics, Second Edition, Prentice-Hall, Engelwood Cliffs, New Jersey.
[14]
Lampson, B.W. (1973) A Note on the Confinement Problem. Commun. of the ACM 16,10. 613-615.
[15]
Lunt T.F., et al. (1988) Secure Distributed Data Views: Security Policy and Interpretation for Database Management System for a Class A1 DBMS. RADC-TR-89-313, vol 1. Rome Labs, Rome N.Y.
[16]
Pfleeger, C.P. (1989) Security in Computing, Prentice Hall.
[17]
Pfleeger, C.P. (1997) Security in Computing - 2d edition, Prentice Hall.
[18]
Pfleeger, S.L. (1998) Software Engineering- Theory and Preactice, Prentice Hall.
[19]
Summers, Rita (1997) Secure Computing - Threats and Safeguards, McGraw-Hill.
[20]
Stallings, W. (1998) Cryptography and Network Security, Principles and Practice - 2d ed, Prentice Hall.

Cited By

View all
  • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
  • (2019)Integrating Security into Computer Science Curriculum2019 IEEE Frontiers in Education Conference (FIE)10.1109/FIE43999.2019.9028523(1-8)Online publication date: Oct-2019
  • (2016)Security Injections@TowsonACM Transactions on Computing Education10.1145/289744116:4(1-20)Online publication date: 9-Jun-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCSE '00: Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
May 2000
429 pages
ISBN:1581132131
DOI:10.1145/330908
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2000

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCSE00
Sponsor:

Acceptance Rates

SIGCSE '00 Paper Acceptance Rate 78 of 220 submissions, 35%;
Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

Upcoming Conference

SIGCSE TS 2025
The 56th ACM Technical Symposium on Computer Science Education
February 26 - March 1, 2025
Pittsburgh , PA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)52
  • Downloads (Last 6 weeks)9
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
  • (2019)Integrating Security into Computer Science Curriculum2019 IEEE Frontiers in Education Conference (FIE)10.1109/FIE43999.2019.9028523(1-8)Online publication date: Oct-2019
  • (2016)Security Injections@TowsonACM Transactions on Computing Education10.1145/289744116:4(1-20)Online publication date: 9-Jun-2016
  • (2014)Empowering faculty to embed security topics into computer science coursesProceedings of the 2014 conference on Innovation & technology in computer science education10.1145/2591708.2591741(99-104)Online publication date: 21-Jun-2014
  • (2009)Discovering vulnerabilities in control system human-machine interface softwareJournal of Systems and Software10.5555/1519540.151970382:4(583-589)Online publication date: 1-Apr-2009
  • (2009)Discovering vulnerabilities in control system human–machine interface softwareJournal of Systems and Software10.1016/j.jss.2008.12.04982:4(583-589)Online publication date: Apr-2009
  • (2008)Moving beyond security tracksACM SIGCSE Bulletin10.1145/1352322.135224640:1(320-324)Online publication date: 12-Mar-2008
  • (2008)Moving beyond security tracksProceedings of the 39th SIGCSE technical symposium on Computer science education10.1145/1352135.1352246(320-324)Online publication date: 12-Mar-2008
  • (2008)SEEDJournal on Educational Resources in Computing10.1145/1348713.13487168:1(1-24)Online publication date: 1-Mar-2008
  • (2007)Teaching information systems security coursesComputers and Security10.1016/j.cose.2006.11.00526:4(290-299)Online publication date: 1-Jun-2007
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media