ABSTRACT
Interactive courseware encourages student participation and active learning. Prior research and teaching experience has shown that IT students prefer to learn information security in a hands-on manner. How do we offer information security as a distance learning course while give students the similar hands-on teaching and learning style as we do in a traditional classroom or lab? This paper discusses our experience in developing Web-based multimedia and interactive courseware for an undergraduate information security course. The courseware is based on a simple yet powerful software tool called MICS (Multimedia and Interactive Courseware Synthesizer), designed for generating multimedia and interactive courseware for science and engineering students. We report in this paper our experience in designing such a course development tool and in using the courseware in our IT curricula.
- Computer Emergency Response Team (CERT) Coordination Center, http://www.cert.org/, August 2003.Google Scholar
- John Viega and Gary McGraw, Building Secure Software, Addison Wesley, 2002.Google Scholar
- James A. Whittaker and Herbert H. Thompson, "How to Break Software Security", Addison Wesley, 2003.Google Scholar
- Defense Information Systems Agency, Cyber Protect: Interactive Training Exercise, version 1.1, July 1999, http://iase.disa.mil/ETA.Google Scholar
- G. Vigna, "Teaching Hands-On Network Security: Testbeds and Live Exercises", Journal of Information Warfare (2003) 2, 3: 8 -- 24.Google Scholar
- Source: http://www.cert.org/tech_tips/security_tools.htmlGoogle Scholar
- Matt Bishop, "Computer Security: Art and Science", Addison Wesley, 2003. ISBN: 0-201-44099-7.Google Scholar
- National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part I: Introduction and General Model", Version 2.1, CCIMB-99-031, August 1999.Google Scholar
- {CC2 99} National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part II: Security Function Requirements", Version 2.1, CCIMB-99-031, August 1999.Google Scholar
- {CC3 99} National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part III: Security Assurance Requirements", Version 2.1, CCIMB-99-031, August 1999.Google Scholar
- {CEC 91} Commission of the European Communities, "Information Technology Security Evaluation Criteria", Version 1.2, 1991.Google Scholar
- {DOD 85} Department of Defense, "Trusted Computer System Evaluation Criteria", DOD 5200.28-STD, December 1985.Google Scholar
- C.E. Landwehr, "Formal Models for Computer Security", ACM Computing Surveys, Vol. 13, No. 3, 1981. pp. 247 -- 278. Google ScholarDigital Library
- National Institute of Standards and Technology, "Security Requirements for Cryptographic Modules", PIPS PUB 140-2, May 2001.Google Scholar
- Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, "Security Metrics Guide for Information Technology Systems", NIST Special Publication 800-55, National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-55/sp800-55.pdf. July 2003.Google Scholar
- Michael Howard and David LeBlanc, "Writing Secure Code, Microsoft Press, 2003. Google ScholarDigital Library
- J. A. Wang, Security Testing in Software Engineering Courses, Proceedings of Frontiers in Education Conference, Session F1C, IEEE Catalog Number 04CH37579C, ISBN: 0-7803-8553-5. October 2004, Savannah, Georgia.Google Scholar
- J. A. Wang, Information Security Practice, XanEdu Publishing Services, ISBN 1-59399-044-8, May 2003.Google Scholar
- J. A. Wang, "Information Security Models and Metrics", in Proceedings of 43rd ACM Southeast Conference, Volume 2, pp. 178 - 184. ISBN: 1-59593-059-0. March 2005, Kennesaw, GA. Google ScholarDigital Library
- Susan Gerhart, "Driving Home the Buffer Overflow Problem: A Training Module for Programmers and Managers", Embry-Riddle Aeronautical University, 2002.Google Scholar
Index Terms
- Web-based interactive courseware for information security
Recommendations
Building reusable information security courseware
InfoSecCD '05: Proceedings of the 2nd annual conference on Information security curriculum developmentWell-designed courseware improves teaching effectiveness and encourages active learning. This paper reports our experience in developing a multimedia and interactive courseware for an information security course in our distance education program as well ...
Strategies for Enhancing and Evaluating Interactivity in Web-Based Learning and Teaching
Interactivity is often discussed in constructivist approaches to education, which enable the student to evolve, understand, or construct new ideas from existing concepts. Constructivist approaches rely on active participation in the learning situation. ...
Interactive lectures: Effective teaching and learning in lectures using wireless networks
Among the severe instructional shortcomings of lectures is their lack of interactivity. To overcome these problems, the learning environment of the interactive lecture is introduced, in which students and lecturer interact by using mobile computers in a ...
Comments