skip to main content
10.1145/1095714.1095760acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Web-based interactive courseware for information security

Published:20 October 2005Publication History

ABSTRACT

Interactive courseware encourages student participation and active learning. Prior research and teaching experience has shown that IT students prefer to learn information security in a hands-on manner. How do we offer information security as a distance learning course while give students the similar hands-on teaching and learning style as we do in a traditional classroom or lab? This paper discusses our experience in developing Web-based multimedia and interactive courseware for an undergraduate information security course. The courseware is based on a simple yet powerful software tool called MICS (Multimedia and Interactive Courseware Synthesizer), designed for generating multimedia and interactive courseware for science and engineering students. We report in this paper our experience in designing such a course development tool and in using the courseware in our IT curricula.

References

  1. Computer Emergency Response Team (CERT) Coordination Center, http://www.cert.org/, August 2003.Google ScholarGoogle Scholar
  2. John Viega and Gary McGraw, Building Secure Software, Addison Wesley, 2002.Google ScholarGoogle Scholar
  3. James A. Whittaker and Herbert H. Thompson, "How to Break Software Security", Addison Wesley, 2003.Google ScholarGoogle Scholar
  4. Defense Information Systems Agency, Cyber Protect: Interactive Training Exercise, version 1.1, July 1999, http://iase.disa.mil/ETA.Google ScholarGoogle Scholar
  5. G. Vigna, "Teaching Hands-On Network Security: Testbeds and Live Exercises", Journal of Information Warfare (2003) 2, 3: 8 -- 24.Google ScholarGoogle Scholar
  6. Source: http://www.cert.org/tech_tips/security_tools.htmlGoogle ScholarGoogle Scholar
  7. Matt Bishop, "Computer Security: Art and Science", Addison Wesley, 2003. ISBN: 0-201-44099-7.Google ScholarGoogle Scholar
  8. National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part I: Introduction and General Model", Version 2.1, CCIMB-99-031, August 1999.Google ScholarGoogle Scholar
  9. {CC2 99} National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part II: Security Function Requirements", Version 2.1, CCIMB-99-031, August 1999.Google ScholarGoogle Scholar
  10. {CC3 99} National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part III: Security Assurance Requirements", Version 2.1, CCIMB-99-031, August 1999.Google ScholarGoogle Scholar
  11. {CEC 91} Commission of the European Communities, "Information Technology Security Evaluation Criteria", Version 1.2, 1991.Google ScholarGoogle Scholar
  12. {DOD 85} Department of Defense, "Trusted Computer System Evaluation Criteria", DOD 5200.28-STD, December 1985.Google ScholarGoogle Scholar
  13. C.E. Landwehr, "Formal Models for Computer Security", ACM Computing Surveys, Vol. 13, No. 3, 1981. pp. 247 -- 278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. National Institute of Standards and Technology, "Security Requirements for Cryptographic Modules", PIPS PUB 140-2, May 2001.Google ScholarGoogle Scholar
  15. Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, "Security Metrics Guide for Information Technology Systems", NIST Special Publication 800-55, National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-55/sp800-55.pdf. July 2003.Google ScholarGoogle Scholar
  16. Michael Howard and David LeBlanc, "Writing Secure Code, Microsoft Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. A. Wang, Security Testing in Software Engineering Courses, Proceedings of Frontiers in Education Conference, Session F1C, IEEE Catalog Number 04CH37579C, ISBN: 0-7803-8553-5. October 2004, Savannah, Georgia.Google ScholarGoogle Scholar
  18. J. A. Wang, Information Security Practice, XanEdu Publishing Services, ISBN 1-59399-044-8, May 2003.Google ScholarGoogle Scholar
  19. J. A. Wang, "Information Security Models and Metrics", in Proceedings of 43rd ACM Southeast Conference, Volume 2, pp. 178 - 184. ISBN: 1-59593-059-0. March 2005, Kennesaw, GA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Susan Gerhart, "Driving Home the Buffer Overflow Problem: A Training Module for Programmers and Managers", Embry-Riddle Aeronautical University, 2002.Google ScholarGoogle Scholar

Index Terms

  1. Web-based interactive courseware for information security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGITE '05: Proceedings of the 6th conference on Information technology education
        October 2005
        402 pages
        ISBN:1595932526
        DOI:10.1145/1095714
        • General Chair:
        • Rob Friedman

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 October 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate176of429submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader