Abstract
Work is active in many institutes of higher education on utilising virtual computer environments for creating laboratories for practical course-work. Computer Security education is one area where virtual environments are proving to be useful, and where several schools have reported their own schemes for implementing environments for practical exercises. In this study we attempt to take a somewhat broader look at what the use of virtualisation technology can imply terms of a number of factors, i.e. the pedagogy, security, licensing, administration and cost. A simple analysis of the general strengths, weaknesses, opportunities and threats of virtual security laboratories allows us to motivate design choices when implementing yet another of these experimental environments.
Chapter PDF
References
Ramanathan, R., Bruening, F.: Virtualization: Bringing Flexibility and New Capabilities to Computing Platforms. Technical report, Intel Corporation (June 2004)
Davidson, A., Näckros, K.: Practical assignments in IT security for contemporary higher education. In: Futcher, L., Dodge, R. (eds.) World Conference on Information Security Education. IFIP, vol. 237, pp. 25–32. Springer, Heidelberg (2007)
Bullers Jr., W., Burd, S., Seazzu, A.: Virtual machines-an idea whose time has returned: application to network, security, and database courses. In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, pp. 102–106. ACM, New York (2006)
Hay, B., Dodge, R., Nance, K.L.: Using virtualization to create and deploy computer security lab exercises. In: Jajodia, S., Samarati, P., Cimato, S. (eds.) SEC. IFIP, vol. 278, pp. 621–635. Springer, Heidelberg (2008)
Hu, J., Cordel, D., Meinel, C.: A virtual laboratory for IT security education. In: Feltz, F., Oberweis, A., Otjacques, B. (eds.) EMISA. LNI, vol. 56, pp. 60–71. GI (2004)
Hu, J., Meinel, C.: Tele-Lab IT security: A means to build security laboratories on the web. In: AINA (2), pp. 285–288. IEEE Computer Society (2004)
Kato, K.: Modeling and Virtualization for Secure Computing Environments. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 196–197. Springer, Heidelberg (2007)
Keller, J., Naues, R.: A collaborative virtual computer security lab. In: e-Science, p. 126. IEEE Computer Society (2006)
Kuczborski, W.: A computer network laboratory based on the concept of virtual machines. In: Proc. 6th Baltic Region Seminar on Engng. Educ., pp. 145–148.
Sun, W., Katta, V., Krishna, K., Sekar, R.: V-netlab: An approach for realizing logically isolated networks for security experiments. In: Benzel, T. (ed.) CSET. USENIX Association (2008)
Alexander, M., Lee, J.A.: A scalable xen and web-based networking course delivery platform. In: Parker, J. (ed.) Proceedings of the Second IASTED International Conference on Education and Technology, Calgary, Alberta, Canada, pp. 131–134 (July 2006)
Nastu, J.: Software virtualization: Virtual desktops offer ed-tech revolution. eSchool News, 21–27 (May 2008)
Raffetseder, T., Kruegel, C., Kirda, E.: Detecting System Emulators. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 1–18. Springer, Heidelberg (2007)
Kneale, B., De Horta, A., Box, I.: Velnet: virtual environment for learning networking. In: Proceedings of the Sixth Conference on Australasian Computing Education, vol. 30, pp. 161–168. Australian Computer Society, Inc., Darlinghurst (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Davidson, A., de La Puente Martinez, J., Huber, M. (2013). A SWOT Analysis of Virtual Laboratories for Security Education. In: Dodge, R.C., Futcher, L. (eds) Information Assurance and Security Education and Training. WISE WISE WISE 2013 2011 2009. IFIP Advances in Information and Communication Technology, vol 406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39377-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-39377-8_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39376-1
Online ISBN: 978-3-642-39377-8
eBook Packages: Computer ScienceComputer Science (R0)