NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Peer reviewed Peer reviewed
Direct linkDirect link
Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon – Journal on Educational Resources in Computing, 2006
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…
Descriptors: Feedback (Response), Curriculum Development, Hospitals, Computer Security