Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Laboratory Experiments | 3 |
Computer Networks | 2 |
Internet | 2 |
Barriers | 1 |
Budgets | 1 |
College Students | 1 |
Computer Literacy | 1 |
Computer Science Education | 1 |
Computer Software | 1 |
Confidentiality | 1 |
More ▼ |
Author
Brustoloni, Jose Carlos | 1 |
Chen, Charlie C. | 1 |
Chou, Te-Shun | 1 |
Harris, Albert L. | 1 |
Hempenius, Nicholas | 1 |
Huang, Hui-Jou | 1 |
Shaw, R. S. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Evaluative | 3 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou – Computers & Education, 2009
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…
Descriptors: Online Courses, Multimedia Materials, Computer Security, Educational Technology
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments