skip to main content
10.1145/1095714.1095730acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Open source centric information security lab development

Published: 20 October 2005 Publication History

Abstract

In addition to the intellectual effort, information security lab development can require substantial organizational budget and labor commitments. For example, obtaining commercial security software necessitates a significant budget commitment. In an analogous manner, installing security software, setting up user accounts, and configuring lab systems can require a significant labor commitment. In many academic environments, obtaining the necessary budget and labor commitments for effective 'Hands On' information security lab modules is problematic.To mitigate these problems, we developed a security lab development framework with specific technological and pedagogical attributes. These attributes were specifically chosen to mitigate the previously identified constraints. Specifically, two technological attributes and one pedagogical attribute identify the framework. The two technological attributes are the utilization of Open Source Tools and the utilization of LiveCDs. The pedagogical attribute is the utilization of Kolb's Experiential Learning Model.

References

[1]
"Bishop, M., "Computer: Art and Science", Addison Wesley, 2003.
[2]
Bishop, M., "Computer Security Education: Training, Scholarship, and Research," IEEE Computer 35 (4) Privacy and Security Supplement pp. 30--32 (Apr. 2002).
[3]
Crowley, E., "Information System Security Curricula Development", Conference On Information Technology Education, SIGITE, West Lafayette, IN, 2003.
[4]
Fyodor, "Top 75 Security Tools", Retrieved March, 2005 from: http://www.insecure.org/tools.html
[5]
Granneman Scott, Live CD paradise, The Register, 7th May 2005 http://www.theregister.co.uk/2005/05/07/live_cd_paradise/ Retreived 1 June 05.
[6]
Hoffman, L., Dodge, R., Rosenberg, T., Ragsdale, D., "Information Assurance Laboratory Innovations", National Colloquim for Information System Security Education, Washington, D.C., 2003.
[7]
Kolb, D., "Experiential Learning", Prentice Hall, Englewood Cliffs, NJ, 1984.
[8]
Larkin-Hein, T. and Bundy, D., "Styles and Types in Science and Engineering Education", International Conference on Engineering and Computer Education, San Paulo, Brazil, August 2000.
[9]
"The LiveCD List", Retrieved March, 2005 from: http://www.frozentech.com/content/livecd.php
[10]
Millenbah, K., Campa, H., Winterstein, S., "Models for Infusing Experiential Learning into the Curriculum", Retrieved June, 2004, from http://www.snr.missouri.edu/meetings/uenr/millenbah.pdf
[11]
Venkataramanan, G., "Coupling the Laboratory - Real-world Continum into Poser Electronics Education, 2004. Retrieved March 2005, from: http://www.ece.umn.edu/groups/PowerElectronics_Drives/workshop_feb04/poster/index_poster.html/coupling.pdf
[12]
Woods, D., Banfe, P., "Involve Me and I will Understand: Effective Service Learning .. On a Platter", Academic Exchange Extra, Jan 2003. Retrieved June 2004, from http://asstudents.unco.edu/students/AE-Extra/2003/1/indxmain.htm

Cited By

View all
  • (2015)MC-LiveProceedings of the 46th ACM Technical Symposium on Computer Science Education10.1145/2676723.2677216(421-423)Online publication date: 24-Feb-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGITE '05: Proceedings of the 6th conference on Information technology education
October 2005
402 pages
ISBN:1595932526
DOI:10.1145/1095714
  • General Chair:
  • Rob Friedman
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Linux
  2. knoppix
  3. live CD
  4. security

Qualifiers

  • Article

Conference

SIGITE05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 176 of 429 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2015)MC-LiveProceedings of the 46th ACM Technical Symposium on Computer Science Education10.1145/2676723.2677216(421-423)Online publication date: 24-Feb-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media